메뉴 건너뛰기




Volumn 3, Issue , 2005, Pages 2184-2194

On achieving optimal throughput with network coding

Author keywords

Graph theory; Information theory; Mathematical programming optimization; Simulations

Indexed keywords

COMPUTING STRATEGIES; DATA NETWORKS; NETWORK CODING; NETWORK TOPOLOGIES;

EID: 25844497569     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2005.1498493     Document Type: Conference Paper
Times cited : (127)

References (26)
  • 5
    • 0242334165 scopus 로고    scopus 로고
    • An algebraic approach to network coding
    • October
    • R. Koetter and M. Medard, "An Algebraic Approach to Network Coding," IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782-795, October 2003.
    • (2003) IEEE/ACM Transactions on Networking , vol.11 , Issue.5 , pp. 782-795
    • Koetter, R.1    Medard, M.2
  • 6
    • 0030246198 scopus 로고    scopus 로고
    • Quality of service routing for supporting multimedia applications
    • September
    • Z. Wang and J. Crowcroft, "Quality of Service Routing for Supporting Multimedia Applications," IEEE Journal on Selected Areas in Communications, vol. 14, no. 7, pp. 1228-1234, September 1996.
    • (1996) IEEE Journal on Selected Areas in Communications , vol.14 , Issue.7 , pp. 1228-1234
    • Wang, Z.1    Crowcroft, J.2
  • 12
    • 0011116653 scopus 로고    scopus 로고
    • Informed content delivery across adaptive overlay networks
    • August
    • J. Byers and J. Considine, "Informed Content Delivery Across Adaptive Overlay Networks," in Proc. of ACM SIGCOMM, August 2002.
    • (2002) Proc. of ACM SIGCOMM
    • Byers, J.1    Considine, J.2
  • 14
    • 1242332544 scopus 로고    scopus 로고
    • Making intra-domain routing robust to changing and uncertain traffic demands: Understanding fundamental tradeoffs
    • August
    • D. Applegate and E. Cohen, "Making Intra-Domain Routing Robust to Changing and Uncertain Traffic Demands: Understanding Fundamental Tradeoffs," in Proc. of ACM SIGCOMM, August 2003, pp. 313-324.
    • (2003) Proc. of ACM SIGCOMM , pp. 313-324
    • Applegate, D.1    Cohen, E.2
  • 19
    • 0022093904 scopus 로고
    • Optimal attack and reinforcement of a network
    • W. H. Cunningham, "Optimal Attack and Reinforcement of a Network," Journal of the ACM, vol. 32, pp. 549-561, 1985.
    • (1985) Journal of the ACM , vol.32 , pp. 549-561
    • Cunningham, W.H.1
  • 20
    • 19544369226 scopus 로고    scopus 로고
    • On achieving optimal end-to-end throughput in data networks: Theoretical and empirical studies
    • ECE, University of Toronto
    • Z. Li, B. Li, D. Jiang, and L. C. Lau, "On Achieving Optimal End-to-end Throughput in Data Networks: Theoretical and Empirical Studies," Tech. Rep., ECE, University of Toronto, 2004.
    • (2004) Tech. Rep.
    • Li, Z.1    Li, B.2    Jiang, D.3    Lau, L.C.4
  • 23
    • 25844439424 scopus 로고    scopus 로고
    • Efficient computation of maximum multicast rates
    • Z. Li and B. Li, "Efficient Computation of Maximum Multicast Rates," in Proc. of IEEE INFOCOM, 2005.
    • (2005) Proc. of IEEE INFOCOM
    • Li, Z.1    Li, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.