-
1
-
-
84867541741
-
-
publications. http://chungc.net63.net/pub
-
C. Chan, publications. http://goo.gl/4YZLT, http://chungc.net63.net/pub.
-
-
-
Chan, C.1
-
3
-
-
33745135399
-
On achieving maximum multicast throughput in undirected networks
-
jun.
-
Z. Li, B. Li, and L. C. Lau, "On achieving maximum multicast throughput in undirected networks," Information Theory, IEEE Transactions on, vol. 52, no. 6, pp. 2467-2485, jun. 2006.
-
(2006)
Information Theory, IEEE Transactions on
, vol.52
, Issue.6
, pp. 2467-2485
-
-
Li, Z.1
Li, B.2
Lau, L.C.3
-
4
-
-
20544473127
-
Polynomial time algorithms for multicast network code construction
-
jun.
-
S. Jaggi, P. Sanders, P. A. Chou, M. Effros, S. Egner, K. Jain, and L. Tolhiuzen, "Polynomial time algorithms for multicast network code construction," Information Theory, IEEE Transactions on, vol. 51, no. 6, pp. 1973-1982, jun. 2005.
-
(2005)
Information Theory, IEEE Transactions on
, vol.51
, Issue.6
, pp. 1973-1982
-
-
Jaggi, S.1
Sanders, P.2
Chou, P.A.3
Effros, M.4
Egner, S.5
Jain, K.6
Tolhiuzen, L.7
-
5
-
-
59649087752
-
Network coding for undirected information exchange
-
January
-
J. Goseling, C. Fragouli, and S. N. Diggavi, "Network coding for undirected information exchange," IEEE Communications Letters, vol. 13, no. 1, January 2009.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.1
-
-
Goseling, J.1
Fragouli, C.2
Diggavi, S.N.3
-
6
-
-
80054797796
-
-
Ph.D. dissertation, Massachusetts Institute of Technology, see [1]
-
C. Chan, "Generating secret in a network," Ph.D. dissertation, Massachusetts Institute of Technology, 2010, see [1].
-
(2010)
Generating Secret in A Network
-
-
Chan, C.1
-
7
-
-
80054806545
-
The hidden flow of information
-
see [1]
-
-, "The hidden flow of information," in 2011 IEEE International Symposium on Information Theory Proceedings (ISIT2011), St. Petersburg, Russia, Jul. 2011, see [1].
-
2011 IEEE International Symposium on Information Theory Proceedings (ISIT2011), St. Petersburg, Russia, Jul. 2011
-
-
Chan, C.1
-
10
-
-
52349096793
-
Secret key generation for a pairwise independent network model
-
C. Y. S. Nitinawarat and A. Reznik, "Secret key generation for a pairwise independent network model," in IEEE International Symposium on Information Theory, 2008. ISIT 2008., July 2008, pp. 1015-1019.
-
IEEE International Symposium on Information Theory, 2008. ISIT 2008., July 2008
, pp. 1015-1019
-
-
Nitinawarat, C.Y.S.1
Reznik, A.2
-
12
-
-
79957890468
-
Wireless network information flow: A deterministic approach
-
vol. abs/cs/0906.5394
-
A. S. Avestimehr, S. N. Diggavi, and D. N. C. Tse, "Wireless network information flow: A deterministic approach," CoRR, vol. abs/cs/0906.5394, 2009.
-
(2009)
CoRR
-
-
Avestimehr, A.S.1
Diggavi, S.N.2
Tse, D.N.C.3
-
13
-
-
0006714578
-
Matroids and linking systems
-
A. Schrijver, "Matroids and linking systems," Journal of Combinatorial Theory, Series B, vol. 26, no. 3, pp. 349 - 369, 1979.
-
(1979)
Journal of Combinatorial Theory, Series B
, vol.26
, Issue.3
, pp. 349-369
-
-
Schrijver, A.1
-
14
-
-
77949621374
-
An algorithmic framework for wireless information flow
-
M. Goemans, S. Iwata, and R. Zenklusen, "An algorithmic framework for wireless information flow," in Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on, 30 2009-oct. 2 2009, pp. 294 -300.
-
Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on, 30 2009-oct. 2 2009
, pp. 294-300
-
-
Goemans, M.1
Iwata, S.2
Zenklusen, R.3
-
15
-
-
78650909435
-
Multicasting multiple correlated sources to multiple sinks over a noisy channel network
-
jan.
-
T. S. Han, "Multicasting multiple correlated sources to multiple sinks over a noisy channel network," Information Theory, IEEE Transactions on, vol. 57, no. 1, pp. 4 -13, jan. 2011.
-
(2011)
Information Theory, IEEE Transactions on
, vol.57
, Issue.1
, pp. 4-13
-
-
Han, T.S.1
-
16
-
-
79251497980
-
Network coding for computing: Cut-set bounds
-
Feb
-
R. Appuswamy, M. Franceschetti, N. Karamchandani, and K. Zeger, "Network coding for computing: Cut-set bounds," IEEE Transactions of Information Theory, vol. 57, no. 2, pp. 1015-1030, Feb 2011.
-
(2011)
IEEE Transactions of Information Theory
, vol.57
, Issue.2
, pp. 1015-1030
-
-
Appuswamy, R.1
Franceschetti, M.2
Karamchandani, N.3
Zeger, K.4
-
17
-
-
80053961199
-
When is a function securely computable? Information Theory
-
oct.
-
H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable?" Information Theory, IEEE Transactions on, vol. 57, no. 10, pp. 6337-6350, oct. 2011.
-
(2011)
IEEE Transactions on
, vol.57
, Issue.10
, pp. 6337-6350
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
-
18
-
-
84856086676
-
Multiterminal secure source coding for a common secret source
-
C. Chan, "Multiterminal secure source coding for a common secret source," in Forty-Ninth Annual Allerton Conference on Communication, Control, and Computing, Allerton Retreat Center, Monticello, Illinois, sept 2011.
-
Forty-Ninth Annual Allerton Conference on Communication, Control, and Computing, Allerton Retreat Center, Monticello, Illinois, Sept 2011
-
-
Chan, C.1
-
20
-
-
84867556638
-
Agreement of a restricted secret key
-
see [1]
-
C. Chan, "Agreement of a restricted secret key," in 2012 IEEE International Symposium on Information Theory Proceedings (ISIT2012), Cambridge, MA, Jul. 2012, see [1].
-
2012 IEEE International Symposium on Information Theory Proceedings (ISIT2012), Cambridge, MA, Jul. 2012
-
-
Chan, C.1
|