{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T11:40:19Z","timestamp":1712317219745},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,3,24]],"date-time":"2011-03-24T00:00:00Z","timestamp":1300924800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s11235-011-9433-4","type":"journal-article","created":{"date-parts":[[2011,3,23]],"date-time":"2011-03-23T16:02:27Z","timestamp":1300896147000},"page":"247-257","source":"Crossref","is-referenced-by-count":8,"title":["Topology matters in network coding"],"prefix":"10.1007","volume":"51","author":[{"given":"Lu\u00edsa","family":"Lima","sequence":"first","affiliation":[]},{"given":"Diogo","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Barros","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,3,24]]},"reference":[{"issue":"10","key":"9433_CR1","doi-asserted-by":"crossref","first-page":"4413","DOI":"10.1109\/TIT.2006.881746","volume":"52","author":"T. Ho","year":"2006","unstructured":"Ho, T., M\u00e9dard, M., Koetter, R., Karger, D., Effros, M., Shi, J., & Leong, B. (2006). A random linear network coding approach to multicast. IEEE Transactions on Information Theory, 52(10), 4413\u20134430.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"9433_CR2","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TNET.2003.818197","volume":"11","author":"R. Koetter","year":"2003","unstructured":"Koetter, R., & M\u00e9dard, M. (2003). An algebraic approach to network coding. IEEE\/ACM Transactions on Networking, 11(5), 782\u2013795.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"9433_CR3","first-page":"1848","volume-title":"Proc. of the IEEE ISIT 2005","author":"D. Lun","year":"2005","unstructured":"Lun, D., M\u00e9dard, M., Koetter, R., & Effros, M. (2005). Further results on coding for reliable communication over packet networks. In Proc. of the IEEE ISIT 2005, Adelaide, Australia, September 2005 (pp.\u00a01848\u20131852)."},{"key":"9433_CR4","volume-title":"Proc. of the 41st annual Allerton conference on communication, control, and computing","author":"P. C. Yunnan","year":"2003","unstructured":"Yunnan, P. C., Chou, P. A., Wu, Y., & Jain, K. (2003). Practical network coding. In Proc. of the 41st annual Allerton conference on communication, control, and computing, Monticello, IL, USA, October 2003."},{"key":"9433_CR5","volume-title":"Proc. of IEEE infocom\u201905","author":"C. Gkantsidis","year":"2005","unstructured":"Gkantsidis, C., & Rodriguez, P. (2005). Network coding for large scale content distribution. In Proc. of IEEE infocom\u201905, Miami, USA, March 2005."},{"key":"9433_CR6","volume-title":"Proceedings of the IEEE INFOCOM","author":"A. G. Dimakis","year":"2007","unstructured":"Dimakis, A. G., Godfrey, P. B., Wainwright, M. J., & Ramchandran, K. (2007). Network coding for distributed storage systems. In Proceedings of the IEEE INFOCOM, Anchorage, Alaska, USA, May 2007."},{"key":"9433_CR7","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1145\/1159913.1159942","volume-title":"SIGCOMM 2006: proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications","author":"S. Katti","year":"2006","unstructured":"Katti, S., Rahul, H., Hu, W., Katabi, D., M\u00e9dard, M., & Crowcroft,\u00a0J. (2006). XORs in the air: practical wireless network coding. In SIGCOMM 2006: proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications, Pisa, Italy, September 2006 (pp.\u00a0243\u2013254)."},{"key":"9433_CR8","unstructured":"Widmer, J., & Le Boudec, J.-Y. (2005). Network coding for efficient communication in extreme networks, August 2005 (pp.\u00a0284\u2013291)."},{"issue":"4","key":"9433_CR9","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/MIC.2003.1215663","volume":"7","author":"D. Doval","year":"2003","unstructured":"Doval, D., O\u2019Mahony, D., Coll, T., & Dublin, I. (2003). Overlay networks: a scalable alternative for P2P. IEEE Internet Computing, 7(4), 79\u201382.","journal-title":"IEEE Internet Computing"},{"key":"9433_CR10","volume-title":"18th ACM SOSP","author":"D. G. Andersen","year":"2001","unstructured":"Andersen, D. G., Balakrishnan, H., Kaashoek, F., & Morris, R. (2001). Resilient overlay networks. In 18th ACM SOSP, Banff, Canada, October 2001."},{"key":"9433_CR11","first-page":"14","volume-title":"Proc. of the 4th conference on symposium on operating system design & implementation, USENIX association","author":"J. Jannotti","year":"2000","unstructured":"Jannotti, J., Gifford, D., Johnson, K., Kaashoek, M., & O\u2019Toole, J. Jr. (2000). Overcast: reliable multicasting with an overlay network. In Proc. of the 4th conference on symposium on operating system design & implementation, USENIX association, Berkeley, CA, USA (Vol.\u00a04, pp.\u00a014\u201314)."},{"key":"9433_CR12","volume-title":"Proc. of the IEEE international symposium on information theory","author":"L. Lima","year":"2007","unstructured":"Lima, L., M\u00e9dard, M., & ao\u00a0Barros, J. (2007). Random linear network coding: a free cypher. In Proc. of the IEEE international symposium on information theory, Nice, France, June 2007."},{"key":"9433_CR13","volume-title":"Proc. of the 4th USENIX symposium on network systems design and implementation (NSDI)","author":"S. Katti","year":"2007","unstructured":"Katti, S., Cohen, J., & Katabi, D. (2007). Information slicing: anonymity using unreliable overlays. In Proc. of the 4th USENIX symposium on network systems design and implementation (NSDI), Cambridge, MA, USA, April 2007."},{"key":"9433_CR14","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/ICCSC.2008.32","volume-title":"4th IEEE international conference on circuits and systems for communications (ICCSC 2008)","author":"S. Crisostomo","year":"2008","unstructured":"Crisostomo, S., Barros, J., & Bettstetter, C. (2008). Flooding the network: multipoint relays versus network coding. In 4th IEEE international conference on circuits and systems for communications (ICCSC 2008), Shanghai, China, May 2008 (pp.\u00a0119\u2013124)"},{"key":"9433_CR15","first-page":"1","volume-title":"Proc. IEEE international conf. on mobile ad-hoc and sensor systems\u2014MASS","author":"R. Costa","year":"2008","unstructured":"Costa, R., Munaretto, D., Widmer, J., & Barros, J. (2008). Informed network coding for minimum decoding delay. In Proc. IEEE international conf. on mobile ad-hoc and sensor systems\u2014MASS, Atlanta, United States, September 2008 (Vol.\u00a01, pp.\u00a01\u201312)."},{"issue":"5","key":"9433_CR16","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MC.2004.1297243","volume":"37","author":"P. Eugster","year":"2004","unstructured":"Eugster, P., Guerraoui, R., Kermarrec, A., & Massoulie, L. (2004). Epidemic information dissemination in distributed systems. IEEE Computer, 37(5), 60\u201367.","journal-title":"IEEE Computer"},{"key":"9433_CR17","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"M. E. J. Newman","year":"2003","unstructured":"Newman, M. E. J. (2003). The structure and function of complex networks. SIAM Review, 45, 167.","journal-title":"SIAM Review"},{"key":"9433_CR18","unstructured":"Jacquet, P., Laouiti, A., Minet, P., & Viennot, L. (2001). Performance analysis of OLSR multipoint relay flooding in two ad hoc wireless network models. Rapport de recherche\u2014Institut National de Recherche en Informatique et en Automatique."},{"issue":"2","key":"9433_CR19","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/18.825799","volume":"46","author":"P. Gupta","year":"2000","unstructured":"Gupta, P., & Kumar, P. (2000). The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2), 388\u2013404.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9433_CR20","volume-title":"Workshop on spatial stochastic models in wireless networks","author":"R. A. Costa","year":"2007","unstructured":"Costa, R. A., & Barros, J. (2007). Dual radio networks: capacity and connectivity. In Workshop on spatial stochastic models in wireless networks, Limassol, Cyprus, April 2007."},{"key":"9433_CR21","unstructured":"Costa, R. A. (2007). Capacity bounds for small-world and dual radio networks. Master\u2019s thesis, Faculdade de Ci\u00eancias da Universidade do Porto, Portugal, October 2007."},{"key":"9433_CR22","doi-asserted-by":"crossref","unstructured":"Newman, M. (2002). Random graphs as models of networks, Arxiv preprint cond-mat\/0202208 .","DOI":"10.1002\/3527602755.ch2"},{"key":"9433_CR23","volume-title":"Proc. of the IX telecommunications forum, TELFOR","author":"M. Jovanovi\u0107","year":"2001","unstructured":"Jovanovi\u0107, M., Annexstein, F., & Berman, K. (2001). Modeling peer-to-peer network topologies through small-world models and power laws. In Proc. of the IX telecommunications forum, TELFOR."},{"issue":"6684","key":"9433_CR24","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D. J. Watts","year":"1998","unstructured":"Watts, D. J., & Strogatz, S. H. (1998). Collective dynamics of \u2018small-world\u2019 networks. Nature, 393(6684), 440\u2013442.","journal-title":"Nature"},{"key":"9433_CR25","volume-title":"Proc. of the SIMUTOOLS\u201909","author":"D. Ferreira","year":"2009","unstructured":"Ferreira, D., Lima, L., & Barros, J. (2009). NECO: NEtwork COding simulator. In Proc. of the SIMUTOOLS\u201909, Rome, Italy, March 2009."},{"key":"9433_CR26","first-page":"39","volume-title":"Proc. of the 32nd conference on Winter simulation (WSC\u201900)","author":"D. Goldsman","year":"2000","unstructured":"Goldsman, D., & Tokol, G. (2000). Output analysis: output analysis procedures for computer simulations. In Proc. of the 32nd conference on Winter simulation (WSC\u201900) (pp.\u00a039\u201345)."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-011-9433-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-011-9433-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-011-9433-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T10:58:13Z","timestamp":1712314693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-011-9433-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,24]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["9433"],"URL":"https:\/\/doi.org\/10.1007\/s11235-011-9433-4","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3,24]]}}}