{"id":"https://openalex.org/W2081598909","doi":"https://doi.org/10.1109/icc.2010.5502271","title":"Network Coding for Protection against Multiple Link Failures in Multi-Domain Networks","display_name":"Network Coding for Protection against Multiple Link Failures in Multi-Domain Networks","publication_year":2010,"publication_date":"2010-05-01","ids":{"openalex":"https://openalex.org/W2081598909","doi":"https://doi.org/10.1109/icc.2010.5502271","mag":"2081598909"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2010.5502271","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2010.5502271","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026099888","display_name":"Isil Burcu Barla","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"I. B. Barla","raw_affiliation_strings":["Technical University Munich, Munich, Germany","Tech. Univ. of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University Munich, Munich, Germany","institution_ids":[]},{"raw_affiliation_string":"Tech. Univ. of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082447210","display_name":"Franz Rambach","orcid":null},"institutions":[{"id":"https://openalex.org/I63162264","display_name":"Nokia (Australia)","ror":"https://ror.org/05f2ewd15","country_code":"AU","type":"company","lineage":["https://openalex.org/I2738502077","https://openalex.org/I63162264"]},{"id":"https://openalex.org/I1325886976","display_name":"Siemens (Germany)","ror":"https://ror.org/059mq0909","country_code":"DE","type":"company","lineage":["https://openalex.org/I1325886976"]},{"id":"https://openalex.org/I4210159457","display_name":"Nokia (Germany)","ror":"https://ror.org/05nh5td39","country_code":"DE","type":"company","lineage":["https://openalex.org/I2738502077","https://openalex.org/I4210159457"]}],"countries":["AU","DE"],"is_corresponding":false,"raw_author_name":"F. Rambach","raw_affiliation_strings":["Nokia Siemens Networks, Munich, Germany","[Nokia Siemens Networks, Munich, Germany]"],"affiliations":[{"raw_affiliation_string":"Nokia Siemens Networks, Munich, Germany","institution_ids":["https://openalex.org/I1325886976","https://openalex.org/I4210159457"]},{"raw_affiliation_string":"[Nokia Siemens Networks, Munich, Germany]","institution_ids":["https://openalex.org/I63162264"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024984864","display_name":"Dominic Schupke","orcid":"https://orcid.org/0000-0001-6562-7363"},"institutions":[{"id":"https://openalex.org/I1325886976","display_name":"Siemens (Germany)","ror":"https://ror.org/059mq0909","country_code":"DE","type":"company","lineage":["https://openalex.org/I1325886976"]},{"id":"https://openalex.org/I63162264","display_name":"Nokia (Australia)","ror":"https://ror.org/05f2ewd15","country_code":"AU","type":"company","lineage":["https://openalex.org/I2738502077","https://openalex.org/I63162264"]},{"id":"https://openalex.org/I4210159457","display_name":"Nokia (Germany)","ror":"https://ror.org/05nh5td39","country_code":"DE","type":"company","lineage":["https://openalex.org/I2738502077","https://openalex.org/I4210159457"]}],"countries":["AU","DE"],"is_corresponding":false,"raw_author_name":"D. A. Schupke","raw_affiliation_strings":["Nokia Siemens Networks, Munich, Germany","[Nokia Siemens Networks, Munich, Germany]"],"affiliations":[{"raw_affiliation_string":"Nokia Siemens Networks, Munich, Germany","institution_ids":["https://openalex.org/I1325886976","https://openalex.org/I4210159457"]},{"raw_affiliation_string":"[Nokia Siemens Networks, Munich, Germany]","institution_ids":["https://openalex.org/I63162264"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028789809","display_name":"Mohit Thakur","orcid":"https://orcid.org/0000-0001-8314-500X"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"M. Thakur","raw_affiliation_strings":["Technical University Munich, Munich, Germany","Tech. Univ. of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University Munich, Munich, Germany","institution_ids":[]},{"raw_affiliation_string":"Tech. Univ. of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026099888"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":1.7806,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.85815926,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"9","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7451487183570862},{"id":"https://openalex.org/keywords/protection-mechanism","display_name":"Protection mechanism","score":0.7021284699440002},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6872960329055786},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.5929670333862305},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5552489757537842},{"id":"https://openalex.org/keywords/interconnection","display_name":"Interconnection","score":0.5233297348022461},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.49225369095802307},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.481880247592926},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.47037357091903687},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35371875762939453},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13402199745178223}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7451487183570862},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.7021284699440002},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6872960329055786},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.5929670333862305},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5552489757537842},{"id":"https://openalex.org/C123745756","wikidata":"https://www.wikidata.org/wiki/Q1665949","display_name":"Interconnection","level":2,"score":0.5233297348022461},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.49225369095802307},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.481880247592926},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.47037357091903687},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35371875762939453},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13402199745178223},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2010.5502271","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2010.5502271","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.4099999964237213,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1496653312","https://openalex.org/W1536656161","https://openalex.org/W2016312880","https://openalex.org/W2040636466","https://openalex.org/W2077419187","https://openalex.org/W2096972229","https://openalex.org/W2105831729","https://openalex.org/W2121715405","https://openalex.org/W2133245616","https://openalex.org/W2140785822","https://openalex.org/W2151893328","https://openalex.org/W2219512116","https://openalex.org/W4205523767","https://openalex.org/W6674361921","https://openalex.org/W6682257778"],"related_works":["https://openalex.org/W2155019192","https://openalex.org/W2212571888","https://openalex.org/W2014709025","https://openalex.org/W2139379087","https://openalex.org/W2766970861","https://openalex.org/W2020805386","https://openalex.org/W3125341812","https://openalex.org/W1991674760","https://openalex.org/W1668171714","https://openalex.org/W2155297398"],"abstract_inverted_index":{"Many":[0],"networks":[1,46],"today":[2,33],"are":[3,16,120],"composed":[4],"of":[5,13,21,26,30,45,75,152],"numerous":[6],"subnetworks":[7],"or":[8,90],"domains.":[9],"The":[10],"connection":[11],"points":[12,29],"these":[14,39],"domains":[15],"important":[17],"and":[18,60,148],"vulnerable":[19],"parts":[20],"the":[22,27,64,69,73,76,84,100,105,135,145,149,153],"communication.":[23],"Therefore,":[24],"one":[25],"key":[28],"protection":[31,48,56,128],"schemes":[32],"is":[34,50,54,79],"being":[35],"able":[36],"to":[37,72,86,111],"protect":[38],"interconnections.":[40],"Hence,":[41],"in":[42,93],"this":[43,67,127],"type":[44],"a":[47,131],"mechanism":[49,129,137],"applied,":[51],"where":[52,108],"there":[53],"1+1":[55],"inside":[57],"each":[58,94,116],"domain":[59],"dual":[61],"homing":[62],"at":[63],"borders.":[65],"With":[66],"mechanism,":[68],"breakdown":[70],"due":[71],"failure":[74,92],"interconnection":[77],"elements":[78],"prohibited.":[80],"This":[81],"system":[82],"enables":[83],"network":[85,124],"survive":[87],"any":[88],"node":[89],"link":[91],"domain.":[95],"However,":[96],"it":[97],"suffers":[98],"from":[99],"high":[101,140],"capacity":[102],"need":[103],"on":[104],"border":[106],"links,":[107],"data":[109],"has":[110],"be":[112],"transmitted":[113],"bidirectionally":[114],"for":[115],"single":[117],"demand.":[118],"We":[119,143],"showing":[121],"that":[122],"combining":[123],"coding":[125],"with":[126],"gives":[130],"realization,":[132],"which":[133],"outperforms":[134],"existing":[136],"by":[138],"providing":[139],"resource":[141],"savings.":[142],"present":[144],"theoretical":[146],"basis":[147],"application":[150],"methodology":[151],"proposed":[154],"method.":[155]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
