-
1
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S.Y.R. Li, and R.W. Yeung, "Network information flow" IEEE Trans. Inf. Theory, vol.46, no.4, pp.1204-1216, July 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.Y.R.3
Yeung, R.W.4
-
2
-
-
0037323073
-
Linear network coding
-
Feb.
-
S.Y.R. Li, R.W. Yeung, and N. Cai, "Linear network coding," IEEE Trans. Inf. Theory, vol.49, no.2, pp.371-381, Feb. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.Y.R.1
Yeung, R.W.2
Cai, N.3
-
3
-
-
0036353798
-
Secure network coding
-
June
-
N. Cai and R.W. Yeung, "Secure network coding," IEEE ISIT02, p.323, June 2002.
-
(2002)
IEEE ISIT'02
, pp. 323
-
-
Cai, N.1
Yeung, R.W.2
-
4
-
-
33846206172
-
On the capacity of secure network coding
-
J. Feldman, T. Malkin, C. Stein, and R.A. Servedio, "On the capacity of secure network coding," 42nd Ann. Allerton Conf. on Comm., Control, and Comp., 2004.
-
(2004)
42nd Ann. Allerton Conf. on Comm., Control, and Comp.
-
-
Feldman, J.1
Malkin, T.2
Stein, C.3
Servedio, R.A.4
-
5
-
-
0141913937
-
Secret sharing system using (k,L,n) threshold scheme
-
Sept., (English Translation: Scripta Tech-nica, Inc., Electronics and Comm. in Japan, Part 1, vol.69, no.9, pp.46-54, 1986.)
-
H. Yamamoto, "Secret sharing system using (k,L,n) threshold scheme," IECE Trans. Fundamentals (Japanese Edition), vol.J68-A, no.9, pp.945-952, Sept. 1985. (English Translation: Scripta Tech-nica, Inc., Electronics and Comm. in Japan, Part 1, vol.69, no.9, pp.46-54, 1986.)
-
(1985)
IECE Trans. Fundamentals (Japanese Edition)
, vol.J68-A
, Issue.9
, pp. 945-952
-
-
Yamamoto, H.1
-
6
-
-
84961369151
-
Security of ramp schemes
-
Springer-Verlag
-
G.R. Blakley and C. Meadows, "Security of ramp schemes," Advances in Cryptology-CRYPTO'84, LNCS 196, pp.242-269, Springer-Verlag, 1985.
-
(1985)
Advances in Cryptology-CRYPTO'84, LNCS 196
, pp. 242-269
-
-
Blakley, G.R.1
Meadows, C.2
-
7
-
-
0003515463
-
-
Englewood Cliifs, NJ, Prentice-Hall
-
R.K. Ahuja, T.L. Magnanti, and J.B. Orlin, Network Flows: Theory, Algorithms, and Applications, Englewood Cliifs, NJ, Prentice-Hall, 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
8
-
-
84906567084
-
Network coding from a network flow perspective
-
Yokohama, Japan
-
T. Ho, R. Koetter, and M. M'edard, "Network coding from a network flow perspective," IEEE ISIT03, Yokohama, Japan,p.442, 2003.
-
(2003)
IEEE ISIT03
, pp. 442
-
-
Ho, T.1
Koetter, R.2
M'edard, M.3
-
9
-
-
20544473127
-
Polynomial time algorithms for multicast network code construction
-
June
-
S. Jaggi, P. Sanders, C.P.A., and L. Tolhuizen,"Polynomial time algorithms for multicast network code construction," IEEE Trans. Inf. Theory, vol.51, no.6, pp. 1973-1982, June 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.6
, pp. 1973-1982
-
-
Jaggi, S.1
Sanders, P.2
Tolhuizen, L.3
-
10
-
-
46149115041
-
The benefits of coding over routing in a randomized setting
-
T. Ho, R. Koetter, M. Medard, D. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," IEEE ISIT'03, p.441, 2003.
-
(2003)
IEEE ISIT'03
, pp. 441
-
-
Ho, T.1
Koetter, R.2
Medard, M.3
Karger, D.4
Effros, M.5
-
11
-
-
77953488325
-
Low complexity algebraic multicast network codes
-
S. Jaggi, PA. Chou, and J.K., "Low complexity algebraic multicast network codes," IEEE ISIT'03, p.441, 2003.
-
(2003)
IEEE ISIT'03
, pp. 441
-
-
Jaggi, S.1
Chou, P.A.2
-
12
-
-
0037703307
-
Polynomial time algorithms for network information flow
-
June
-
P. Sanders, S. Egner, and L. Tolhuizen, "Polynomial time algorithms for network information flow," 15th ACM Symp. Parallel Alg. and Arch., pp.286-294, June 2003.
-
(2003)
15th ACM Symp. Parallel Alg. and Arch.
, pp. 286-294
-
-
Sanders, P.1
Egner, S.2
Tolhuizen, L.3
|