-
1
-
-
77953306121
-
Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks
-
Qiyan Wang, Long, Vu, Klara Nahrstedt, and Himanshu Khurana, "Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks, UIUC-TechReport-12-01-09, http://hdl.handle.net/2142/14413
-
UIUC-TechReport-12-01-09
-
-
Wang, Q.1
Vu, L.2
Nahrstedt, K.3
Khurana, H.4
-
2
-
-
21644459146
-
Data-driven Overlay Streaming: Design, Implementation, and Experience
-
X. Zhang, J. Liu, B. Li, and T.-S.P. Yum, "Data-driven Overlay Streaming: Design, Implementation, and Experience", in IEEE INFOCOM, 2005.
-
(2005)
IEEE INFOCOM
-
-
Zhang, X.1
Liu, J.2
Li, B.3
Yum, T.-S.P.4
-
3
-
-
34447330332
-
Lava: A Reality Check of Network Coding in Peer-to- Peer Live Streaming
-
M. Wang, and B. Li, "Lava: A Reality Check of Network Coding in Peer-to- Peer Live Streaming", in Proc. of IEEE INFOCOM, 2007.
-
Proc. of IEEE INFOCOM, 2007
-
-
Wang, M.1
Li, B.2
-
4
-
-
70350662969
-
On Large-Scale Peer-to-Peer Streaming Systems with Network Coding
-
C. Feng, and B. Li, "On Large-Scale Peer-to-Peer Streaming Systems with Network Coding", in ACM Multimedia (MM'09), 2009.
-
(2009)
ACM Multimedia (MM'09)
-
-
Feng, C.1
Li, B.2
-
9
-
-
70349664122
-
An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks", in Proc. IEEE INFOCOM, 2008.
-
Proc. IEEE INFOCOM, 2008
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
10
-
-
70349653419
-
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
-
E. Kehdi, and B. Li, "Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding", in Proc. of IEEE INFOCOM, 2009.
-
Proc. of IEEE INFOCOM, 2009
-
-
Kehdi, E.1
Li, B.2
-
11
-
-
70349664122
-
An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks
-
Z. Yu, Y. Wei, B. Ramkumar, Y. Guan, "An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks", IEEE INFOCOM, 2009.
-
(2009)
IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
12
-
-
5044242517
-
Byzantine Modification Detection in Multicast Networks using Randomized Network Coding
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. R. Karger, "Byzantine Modification Detection in Multicast Networks using Randomized Network Coding", ISIT'04, 2004.
-
(2004)
ISIT'04
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.R.6
-
13
-
-
34548349361
-
Resilient Network Coding in the Presense of Byzantine Adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, "Resilient Network Coding in the Presense of Byzantine Adversaries", in Proc. of IEEE INFOCOM, 2007.
-
Proc. of IEEE INFOCOM, 2007
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
14
-
-
51649121337
-
Coding for Errors and Erasures in Random Network Coding
-
R. Kotter, and F. R. Kschischang, "Coding for Errors and Erasures in Random Network Coding", ISIT'07, 2007.
-
(2007)
ISIT'07
-
-
Kotter, R.1
Kschischang, F.R.2
-
16
-
-
78649571833
-
Understanding the Overlay Characteristics of a Large-scale Peer-to-Peer IPTV System
-
to appear in
-
L. Vu, I. Gupta, K. Nahrstedt, and J. Liang, "Understanding the Overlay Characteristics of a Large-scale Peer-to-Peer IPTV System", to appear in ACM Transactions on Multimedia Computing, Communications and Applications (TOMCCAP), 2009.
-
(2009)
ACM Transactions on Multimedia Computing, Communications and Applications (TOMCCAP)
-
-
Vu, L.1
Gupta, I.2
Nahrstedt, K.3
Liang, J.4
|