-
1
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung. Network information flow. IEEE Transactions on Information Theory, 46(5):1204-1216, July 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.5
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.R.3
Yeung, R.W.4
-
3
-
-
34548370230
-
Network error correction, part 2: Lower bounds
-
submitted to Communications in Information and Systems
-
N. Cai and R. W. Yeung. Network error correction, part 2: Lower bounds. submitted to Communications in Information and Systems, 2006.
-
(2006)
-
-
Cai, N.1
Yeung, R.W.2
-
4
-
-
44049100993
-
Signatures for network coding
-
Princeton, NJ, USA
-
D. Charles, K. Jain, and K. Lauter. Signatures for network coding. In Proceedings of the fortieth annual Conference on Information Sciences and Systems, Princeton, NJ, USA, 2006.
-
(2006)
Proceedings of the fortieth annual Conference on Information Sciences and Systems
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
5
-
-
0027341860
-
Perfectly secure message transmission
-
January
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. Journal of the Association for Computing Machinery, 40(1):17-47, January 1993.
-
(1993)
Journal of the Association for Computing Machinery
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
8
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
Yokohama, July
-
T. Ho., R. Koetter, M. Médard, D. Karger, and M. Effros. The benefits of coding over routing in a randomized setting. In IEEE International Symposium on Information Theory (ISTT), page 442, Yokohama, July 2003.
-
(2003)
IEEE International Symposium on Information Theory (ISTT)
, pp. 442
-
-
Ho, T.1
Koetter, R.2
Médard, M.3
Karger, D.4
Effros, M.5
-
9
-
-
25844519184
-
On randomized network coding
-
Monticello, IL
-
T. Ho, M. Médard, J. Shi, M. Effros, and D. Karger. On randomized network coding. In Proceedings of 41st Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, 2003.
-
(2003)
Proceedings of 41st Annual Allerton Conference on Communication, Control, and Computing
-
-
Ho, T.1
Médard, M.2
Shi, J.3
Effros, M.4
Karger, D.5
-
10
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
Chicago, USA, June
-
T. C. Ho, B. Leong, R. Koetter, M. Médard, M. Effros, and D. R. Karger. Byzantine modification detection in multicast networks using randomized network coding. In International Symposium on Information Theory, Chicago, USA, June 2004.
-
(2004)
International Symposium on Information Theory
-
-
Ho, T.C.1
Leong, B.2
Koetter, R.3
Médard, M.4
Effros, M.5
Karger, D.R.6
-
12
-
-
33749439326
-
Correction of adversarial errors in networks
-
Adelaide, Australia
-
S. Jaggi, M. Langberg, T. Ho, and M. Effros. Correction of adversarial errors in networks. In Proceedings of International Symposium in Information Theory and its Applications, Adelaide, Australia, 2005.
-
(2005)
Proceedings of International Symposium in Information Theory and its Applications
-
-
Jaggi, S.1
Langberg, M.2
Ho, T.3
Effros, M.4
-
13
-
-
20544473127
-
Polynomial time algorithms for multicast network code construction
-
June
-
S. Jaggi, P. Sanders, P. A. Chou, M. Effros, S. Egner, K. Jain, and L. Tolhuizen. Polynomial time algorithms for multicast network code construction. IEEE Transactions on Information Theory, 51(6):1973-1982, June 2005.
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.6
, pp. 1973-1982
-
-
Jaggi, S.1
Sanders, P.2
Chou, P.A.3
Effros, M.4
Egner, S.5
Jain, K.6
Tolhuizen, L.7
-
15
-
-
84962129309
-
The Importance of Being Opportunistic: Practical Network coding for Wireless Environments
-
Allerton
-
S. Katti, D. Katabi, W. Hu, H. S. Rahul, and M. Médard. The Importance of Being Opportunistic: Practical Network coding for Wireless Environments. In 43rd Annual Allerton Conference on Communication, Control, and Computing, Allerton, 2005.
-
(2005)
43rd Annual Allerton Conference on Communication, Control, and Computing
-
-
Katti, S.1
Katabi, D.2
Hu, W.3
Rahul, H.S.4
Médard, M.5
-
16
-
-
34548341142
-
XORs in the Air: Practical Wireless Network Coding
-
Pisa, Italy
-
S. Katti, H. Rahul, D. Katabi, W. H. M. Médard, and J. Crowcroft. XORs in the Air: Practical Wireless Network Coding. In ACM SIGCOMM, Pisa, Italy, 2006.
-
(2006)
ACM SIGCOMM
-
-
Katti, S.1
Rahul, H.2
Katabi, D.3
Médard, W.H.M.4
Crowcroft, J.5
-
17
-
-
34548366026
-
-
R. Koetter and F. Kschischang. Coding for errors and erasures in random network coding. Under Submission
-
R. Koetter and F. Kschischang. Coding for errors and erasures in random network coding. Under Submission.
-
-
-
-
19
-
-
0242334165
-
An algebraic approach to network coding
-
October
-
R. Koetter and M. Médard. An algebraic approach to network coding. IEEE/ACM Transactions on Networking, 11(5):782-795, October 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.5
, pp. 782-795
-
-
Koetter, R.1
Médard, M.2
-
20
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
Oakland, California
-
M. N. Krohn, M. J. Freedman, and D. Mazires. On-the-fly verification of rateless erasure codes for efficient content distribution. In Proceedings of the IEEE Symposium on Security and Privacy, 2004, Oakland, California.
-
Proceedings of the IEEE Symposium on Security and Privacy, 2004
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazires, D.3
-
21
-
-
0037323073
-
Linear network coding
-
S.-Y. R. Li, R. W. Yeung, and N. Cai. Linear network coding. IEEE Transactions on Information Theory, 49(2):371-381, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
24
-
-
10444286785
-
Broadcasting with locally bounded byzantine faults
-
February
-
A. Pelc and D. Peleg. Broadcasting with locally bounded byzantine faults. Information Processing Letters, 93(3):109-115, February 2005.
-
(2005)
Information Processing Letters
, vol.93
, Issue.3
, pp. 109-115
-
-
Pelc, A.1
Peleg, D.2
-
25
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Seattle, Washington, United States
-
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proceedings of the twenty-first annual ACM symposium on Theory of computing, pages 73-85, Seattle, Washington, United States, 1989.
-
(1989)
Proceedings of the twenty-first annual ACM symposium on Theory of computing
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
26
-
-
34548334202
-
-
PhD thesis, University of California at Berkeley, Computer Science Division, Berkeley, CA 94720
-
L. Subramanian. Decentralized Security Mechanisms for Routing Protocols. PhD thesis, University of California at Berkeley, Computer Science Division, Berkeley, CA 94720, 2005.
-
(2005)
Decentralized Security Mechanisms for Routing Protocols
-
-
Subramanian, L.1
-
27
-
-
33947133548
-
On the numerical inversion of a recurrent problem: The Vandermonde matrix. AC-10:492
-
Oct
-
H. J. Wertz. On the numerical inversion of a recurrent problem: The Vandermonde matrix. AC-10:492, Oct. 1965.
-
(1965)
-
-
Wertz, H.J.1
-
28
-
-
0033894011
-
On the construction of energy-efficient broadcast and multicast trees in wireless networks
-
IEEE
-
J. E. Wieselthier, G. D. Nguyen, and A. Ephremides. On the construction of energy-efficient broadcast and multicast trees in wireless networks. In IEEE Infocom, volume 2, pages 585-594. IEEE, 2000.
-
(2000)
IEEE Infocom
, vol.2
, pp. 585-594
-
-
Wieselthier, J.E.1
Nguyen, G.D.2
Ephremides, A.3
-
29
-
-
34548347505
-
Network error correction, part 1 : Basic concepts and upper bounds
-
submitted to Communications in Information and Systems
-
R. W. Yeung and N. Cai. Network error correction, part 1 : Basic concepts and upper bounds. submitted to Communications in Information and Systems, 2006.
-
(2006)
-
-
Yeung, R.W.1
Cai, N.2
|