-
1
-
-
0034229404
-
Network information flow
-
Jul.
-
R. Ahlswede, N. Cai, S. Li, and R. Yeung, "Network information flow," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
2
-
-
0037323073
-
Linear network coding
-
Feb.
-
S. Li, R. Yeung, and N. Cai, "Linear network coding," IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.1
Yeung, R.2
Cai, N.3
-
3
-
-
38349097767
-
Network error correction-Part I: Basic concepts and upper bounds
-
R. Yeung and N. Cai, "Network error correction-Part I: Basic concepts and upper bounds," Commun. Inf. Syst., vol. 6, no. 1, pp. 19-36, 2006.
-
(2006)
Commun. Inf. Syst.
, vol.6
, Issue.1
, pp. 19-36
-
-
Yeung, R.1
Cai, N.2
-
4
-
-
38349083344
-
Network error correction-Part II: Lower bounds
-
N. Cai and R. Yeung, "Network error correction-Part II: Lower bounds," Commun. Inf. Syst., vol. 6, no. 1, pp. 37-54, 2006.
-
(2006)
Commun. Inf. Syst.
, vol.6
, Issue.1
, pp. 37-54
-
-
Cai, N.1
Yeung, R.2
-
5
-
-
0242334165
-
An algebraic approach to network coding
-
Oct.
-
R.Koetter and M. Médard, "An algebraic approach to network coding," IEEE/ACM Trans. Netw., vol. 11, no. 5, pp. 782-795, Oct. 2003.
-
(2003)
IEEE/ ACM Trans. Netw.
, vol.11
, Issue.5
, pp. 782-795
-
-
Koetter, R.1
Médard, M.2
-
6
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
T. Ho, B. Leong, R. Koetter, M. Médard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks using randomized network coding," in Proc. IEEE Int. Symp. Inf. Theory, 2004, pp. 144-144.
-
(2004)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 144-144
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Médard, M.4
Effros, M.5
Karger, D.6
-
7
-
-
38349140937
-
Linear network error correction codes in packet networks
-
Jan.
-
Z. Zhang, "Linear network error correction codes in packet networks," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 209-218, Jan. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.1
, pp. 209-218
-
-
Zhang, Z.1
-
9
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
M. Krohn, M. Freedman, and D. Mazieres, "On-the-fly verification of rateless erasure codes for efficient content distribution," in Proc. IEEE Symp. Security Privacy, 2004, pp. 226-240.
-
(2004)
Proc. IEEE Symp. Security Privacy
, pp. 226-240
-
-
Krohn, M.1
Freedman, M.2
Mazieres, D.3
-
10
-
-
45249101743
-
Resilient network coding in the presence of Byzantine adversaries
-
Special Issue on Information Theoretic Security, Jun.
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, "Resilient network coding in the presence of Byzantine adversaries," IEEE Trans. Inf. Theory, vol. 54, Special Issue on Information Theoretic Security, no. 6, pp. 2596-2603, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
11
-
-
77956233803
-
Capacity of Byzantine agreement: Complete xharacterization of four-node networks
-
G. Liang, R. Agarwal, and N. Vaidya, "Capacity of Byzantine agreement: Complete xharacterization of four-node networks," Tech. Rep., Apr. 2010.
-
(2010)
Tech. Rep., Apr.
-
-
Liang, G.1
Agarwal, R.2
Vaidya, N.3
-
13
-
-
48849089497
-
Coding for errors and erasures in random network coding
-
Aug.
-
R. Koetter and F. Kschischang, "Coding for errors and erasures in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3579-3591, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3579-3591
-
-
Koetter, R.1
Kschischang, F.2
-
14
-
-
51349146209
-
A rank-metric approach to error control in random network coding
-
Sep.
-
D. Silva, F. Kschischang, and R. Koetter, "A rank-metric approach to error control in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 3951-3967, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 3951-3967
-
-
Silva, D.1
Kschischang, F.2
Koetter, R.3
-
15
-
-
70449476512
-
Binary causal-adversary channels
-
M. Langberg, S. Jaggi, and B. Dey, "Binary causal-adversary channels," in Proc. IEEE Int. Symp. Inf. Theory, 2009, pp. 2723-2727.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2723-2727
-
-
Langberg, M.1
Jaggi, S.2
Dey, B.3
-
16
-
-
77949601386
-
Nonlinear network coding is necessary to combat general Byzantine attacks
-
O. Kosut, L. Tong, and D. Tse, "Nonlinear network coding is necessary to combat general Byzantine attacks," in Proc. 47th Annu. Allerton Conf. Commun. Control Comput., 2009, pp. 593-599.
-
(2009)
Proc. 47th Annu. Allerton Conf. Commun. Control Comput.
, pp. 593-599
-
-
Kosut, O.1
Tong, L.2
Tse, D.3
-
17
-
-
77949585668
-
Network error correction with unequal link capacities
-
S. Kim, T. Ho, M. Effros, and S. Avestimehr, "Network error correction with unequal link capacities," in Proc. 47th Annu. Allerton Conf. Commun. Control Comput., 2009, pp. 1387-1394.
-
(2009)
Proc. 47th Annu. Allerton Conf. Commun. Control Comput.
, pp. 1387-1394
-
-
Kim, S.1
Ho, T.2
Effros, M.3
Avestimehr, S.4
-
19
-
-
0003515463
-
-
Englewood Cliffs, NJ: Prentice-Hall
-
R. Ahuja, T. Magnanti, and J. Orlin, Network Flows: Theory, Algorithms, and Applications. Englewood Cliffs, NJ: Prentice-Hall, 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.1
Magnanti, T.2
Orlin, J.3
-
20
-
-
77955684457
-
Polytope codes against adversaries in networks
-
O. Kosut, L. Tong, and D. Tse, "Polytope codes against adversaries in networks," in Proc. IEEE Int. Symp. Inf. Theory, 2010, pp. 2423-2427.
-
(2010)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2423-2427
-
-
Kosut, O.1
Tong, L.2
Tse, D.3
-
21
-
-
77952684556
-
New results on network error correction: Capacities and upper bounds
-
DOI: 10.1109/ITA.2010.5454125
-
S. Kim, T. Ho, M. Effros, and S. Avestimehr, "New results on network error correction: Capacities and upper bounds," in Proc. Inf. Theory Appl. Workshop, 2010, DOI: 10.1109/ITA.2010.5454125.
-
(2010)
Proc. Inf. Theory Appl. Workshop
-
-
Kim, S.1
Ho, T.2
Effros, M.3
Avestimehr, S.4
|