-
1
-
-
47949129872
-
Network information flow: Single source
-
R. Ahlswede, N. Cai, S. Li, and R. Yeung, "Network information flow: Single source," submitted to IEEE Transactions on Information Theory, 1999.
-
(1999)
submitted to IEEE Transactions on Information Theory
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
4
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
T. Ho, M. Médard, R. Koetter, D. R. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," in IEEE International Symposium on Information Theory (ISIT), p. 442, 2003.
-
(2003)
IEEE International Symposium on Information Theory (ISIT)
, pp. 442
-
-
Ho, T.1
Médard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
-
5
-
-
33947399169
-
A random linear network coding approach to multicast
-
October
-
T Ho, M. Mdard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast," in IEEE Transactions on Information Theory, vol. 52, pp. 4413-4430, October 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, pp. 4413-4430
-
-
Ho, T.1
Mdard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
6
-
-
34250685753
-
Breaking network log jams
-
June
-
M. Effros, R. Koetter, and M. Medard, "Breaking network log jams," Scientific American, vol. 6, pp. 78-85, June.
-
Scientific American
, vol.6
, pp. 78-85
-
-
Effros, M.1
Koetter, R.2
Medard, M.3
-
7
-
-
33745142955
-
Network coding: An instant primer
-
C. Fragouli, J.-Y. L. Boudec, and J. Widmer, "Network coding: an instant primer," SIGCOMM Comput. Commun. Rev., vol. 36, no. 1, pp. 63-68, 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.1
, pp. 63-68
-
-
Fragouli, C.1
Boudec, J.-Y.L.2
Widmer, J.3
-
8
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
Anchorage, AK, May
-
S. Jaggi, M. Langberg, S. Katti, T Ho, D. Katabi, and M. Médard, "Resilient network coding in the presence of byzantine adversaries," in Proc. IEEE INFOCOM2007, (Anchorage, AK), May 2007.
-
(2007)
Proc. IEEE INFOCOM2007
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Médard, M.6
-
9
-
-
51649125221
-
Signatures for content distribution with network coding
-
Nice, France, July
-
F. Zhao, T. Kalker, M. Medard, and K. Han, "Signatures for content distribution with network coding," in Proc. of IEEE ISIT'07, (Nice, France), July 2007.
-
(2007)
Proc. of IEEE ISIT'07
-
-
Zhao, F.1
Kalker, T.2
Medard, M.3
Han, K.4
-
10
-
-
84976699318
-
The byzantine generals prob-lem
-
L. Lamport, R. Shostak, and M. Pease, "The byzantine generals prob-lem," ACM Trans. Program. lang. Syst., vol. 4, no. 3, pp. 382-401, 1982.
-
(1982)
ACM Trans. Program. lang. Syst
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
11
-
-
0003828107
-
Network layer protocols with byzantine robustness,
-
MIT PhD. Thesis
-
R. Perlman, "Network layer protocols with byzantine robustness," MIT PhD. Thesis, 1988.
-
(1988)
-
-
Perlman, R.1
-
12
-
-
36248991171
-
How good is random linear coding based distributed network storage?
-
Riva del Garda, Italy, Apr
-
S. Acedanski, S. Deb, M. Médard, and R. Koetter, "How good is random linear coding based distributed network storage?" in Proc. 1st Workshop on Network Coding Theory, and Applications (Netcod'05), (Riva del Garda, Italy), Apr. 2005.
-
(2005)
Proc. 1st Workshop on Network Coding Theory, and Applications (Netcod'05)
-
-
Acedanski, S.1
Deb, S.2
Médard, M.3
Koetter, R.4
-
13
-
-
25644448947
-
Network coding for large scale content distribution
-
Miami, FL, Mar
-
C. Gkantsidis and P. Rodriguez, "Network coding for large scale content distribution," in Proc. IEEE INFOCOM'05, (Miami, FL), Mar. 2005.
-
(2005)
Proc. IEEE INFOCOM'05
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
14
-
-
34548321654
-
Network coding for distributed storage systems
-
Anchorage, Alaska, Mar
-
A. G. Dimakis, P. B. Godfrey, M. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," in Proc. of IEEE INFOCOM'07, (Anchorage, Alaska), Mar. 2007.
-
(2007)
Proc. of IEEE INFOCOM'07
-
-
Dimakis, A.G.1
Godfrey, P.B.2
Wainwright, M.3
Ramchandran, K.4
-
16
-
-
34547410740
-
Comprehensive view of a live network coding p2p system
-
Rio de Janeiro, Brazil, Oct
-
C. Gkantsidis, J. Miller, and P. Rodriguez, "Comprehensive view of a live network coding p2p system," in Proc. ACM SIGCOMM/USENIX Internet Measurement Conference (IMC06), (Rio de Janeiro, Brazil), Oct. 2006.
-
(2006)
Proc. ACM SIGCOMM/USENIX Internet Measurement Conference (IMC06)
-
-
Gkantsidis, C.1
Miller, J.2
Rodriguez, P.3
-
17
-
-
39049090594
-
Cooperative security for network coding file distribution
-
Barcelona, Spain, Apr
-
C. Gkantsidis and P. Rodriguez, "Cooperative security for network coding file distribution," in Proc. of IEEE INFOCOM'06, (Barcelona, Spain), Apr. 2006.
-
(2006)
Proc. of IEEE INFOCOM'06
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
18
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
Oakland, CA, May
-
M. N. Krohn, M. J. Freedman, and D. Maziéres, "On-the-fly verification of rateless erasure codes for efficient content distribution," in Proc. of the IEEE Symposium on Security and Privacy, (Oakland, CA), May 2004.
-
(2004)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Krohn, M.N.1
Freedman, M.J.2
Maziéres, D.3
-
19
-
-
44049100993
-
Signatures for network coding
-
Princeton, NJ, Mar
-
D. Charles, K. Jain, and K. Lauter, "Signatures for network coding," in Proc. of Conference on Information Sciences and Systems (CISS'06), (Princeton, NJ), Mar. 2006.
-
(2006)
Proc. of Conference on Information Sciences and Systems (CISS'06)
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
20
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
Proc. of Crypto '99
-
D. Boneh and M. Franklin, "An efficient public key traitor tracing scheme," in Proc. of Crypto '99, Lecture Notes in Computer Science, 1999.
-
(1999)
Lecture Notes in Computer Science
-
-
Boneh, D.1
Franklin, M.2
|