메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1498-1502

Matroidal undirected network

Author keywords

[No Author keywords available]

Indexed keywords

CUT-SET BOUND; DIRECTED NETWORK; DISTRIBUTED SOURCES; GRAPHICAL MODEL; MULTIPLE NODES; OPTIMAL DIRECTION; POLYNOMIAL-TIME; SECRET KEY AGREEMENT; SOURCE-CODING; UNDIRECTED NETWORK;

EID: 84867496450     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2012.6283513     Document Type: Conference Paper
Times cited : (19)

References (20)
  • 1
    • 84867541741 scopus 로고    scopus 로고
    • publications. http://chungc.net63.net/pub
    • C. Chan, publications. http://goo.gl/4YZLT, http://chungc.net63.net/pub.
    • Chan, C.1
  • 3
    • 33745135399 scopus 로고    scopus 로고
    • On achieving maximum multicast throughput in undirected networks
    • jun.
    • Z. Li, B. Li, and L. C. Lau, "On achieving maximum multicast throughput in undirected networks," Information Theory, IEEE Transactions on, vol. 52, no. 6, pp. 2467-2485, jun. 2006.
    • (2006) Information Theory, IEEE Transactions on , vol.52 , Issue.6 , pp. 2467-2485
    • Li, Z.1    Li, B.2    Lau, L.C.3
  • 5
  • 6
    • 80054797796 scopus 로고    scopus 로고
    • Ph.D. dissertation, Massachusetts Institute of Technology, see [1]
    • C. Chan, "Generating secret in a network," Ph.D. dissertation, Massachusetts Institute of Technology, 2010, see [1].
    • (2010) Generating Secret in A Network
    • Chan, C.1
  • 12
    • 79957890468 scopus 로고    scopus 로고
    • Wireless network information flow: A deterministic approach
    • vol. abs/cs/0906.5394
    • A. S. Avestimehr, S. N. Diggavi, and D. N. C. Tse, "Wireless network information flow: A deterministic approach," CoRR, vol. abs/cs/0906.5394, 2009.
    • (2009) CoRR
    • Avestimehr, A.S.1    Diggavi, S.N.2    Tse, D.N.C.3
  • 15
    • 78650909435 scopus 로고    scopus 로고
    • Multicasting multiple correlated sources to multiple sinks over a noisy channel network
    • jan.
    • T. S. Han, "Multicasting multiple correlated sources to multiple sinks over a noisy channel network," Information Theory, IEEE Transactions on, vol. 57, no. 1, pp. 4 -13, jan. 2011.
    • (2011) Information Theory, IEEE Transactions on , vol.57 , Issue.1 , pp. 4-13
    • Han, T.S.1
  • 17
    • 80053961199 scopus 로고    scopus 로고
    • When is a function securely computable? Information Theory
    • oct.
    • H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable?" Information Theory, IEEE Transactions on, vol. 57, no. 10, pp. 6337-6350, oct. 2011.
    • (2011) IEEE Transactions on , vol.57 , Issue.10 , pp. 6337-6350
    • Tyagi, H.1    Narayan, P.2    Gupta, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.