-
1
-
-
0034229404
-
Network information flow
-
Jul.
-
Ahlswede R, Cai N, Li SR, Yeung RW,. Network information flow. IEEE Transactions on Information Theory Jul. 2000; 46 (5): 1204-1216.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.5
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.R.3
Yeung, R.W.4
-
3
-
-
33244466453
-
Network coding: The case of multiple unicast sessions
-
Monticello, Illinois
-
Li Z, Li B,. Network coding: the case of multiple unicast sessions. In In Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, Illinois, 2004.
-
(2004)
Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing
-
-
Li, Z.1
Li, B.2
-
4
-
-
28844481518
-
Minimum-energy multicast in mobile ad hoc networks using network coding
-
DOI 10.1109/TCOMM.2005.857148
-
Chou YWPA, Kung S-Y,. Minimum-energy multicast in mobile ad hoc networks using network coding. IEEE Transactions on Communications Nov. 2005; 53 (11): 1906-1918. (Pubitemid 41763708)
-
(2005)
IEEE Transactions on Communications
, vol.53
, Issue.11
, pp. 1906-1918
-
-
Wu, Y.1
Chou, P.A.2
Kung, S.-Y.3
-
5
-
-
33749431985
-
Further results on coding for reliable communication over packet networks
-
DOI 10.1109/ISIT.2005.1523665, 1523665, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
Lun DS, Médard M, Koetter R, Effros M,. Further results on coding for reliable communication over packet networks. In Proceedings of IEEE International Symposium on Information Theory (ISIT 2005): Adelaide, SA, 2005; 1848-1852. (Pubitemid 44508364)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 1848-1852
-
-
Lun, D.S.1
Medard, M.2
Koetter, R.3
Effros, M.4
-
6
-
-
69249229584
-
Secure network coding for wireless mesh networks: Threats, challenges, and directions
-
Nov.
-
Dong J, Curtmola R, Nita-Rotaru C,. Secure network coding for wireless mesh networks: Threats, challenges, and directions. Computer Communications Nov. 2009; 32 (17): 1790-1801.
-
(2009)
Computer Communications
, vol.32
, Issue.17
, pp. 1790-1801
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
7
-
-
45249101743
-
Resilient network coding in the presence of byzantine adversaries
-
Jun.
-
Jaggi S, Langberg M, Katti S, Ho T, Katabi D, Medard M,. Resilient network coding in the presence of byzantine adversaries. IEEE Transactions on Information Theory Jun. 2008; 54 (6): 2596-2603.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
13
-
-
75649120331
-
Robust network coding against path failures
-
Bahramgiri H, Lahouti F,. Robust network coding against path failures. IET Communications 2010; 4 (3): 272-284.
-
(2010)
IET Communications
, vol.4
, Issue.3
, pp. 272-284
-
-
Bahramgiri, H.1
Lahouti, F.2
-
17
-
-
51349158835
-
Error and erasure correcting algorithms for rank codes
-
Dec.
-
Gabidulin EM, Pilipchuk NI,. Error and erasure correcting algorithms for rank codes. Designs, Codes, and Cryptography Dec. 2008; 49 (1-3): 105-122.
-
(2008)
Designs, Codes, and Cryptography
, vol.49
, Issue.13
, pp. 105-122
-
-
Gabidulin, E.M.1
Pilipchuk, N.I.2
-
19
-
-
70449513716
-
Compressed network coding vectors
-
Seoul, Korea
-
Jafari M, Keller L, Fragouli C, Argyraki K,. Compressed network coding vectors. In Proceedings of IEEE International Symposium on Information Theory (ISIT 2009): Seoul, Korea, 2009; 109-113.
-
(2009)
Proceedings of IEEE International Symposium on Information Theory (ISIT 2009)
, pp. 109-113
-
-
Jafari, M.1
Keller, L.2
Fragouli, C.3
Argyraki, K.4
-
20
-
-
70449529634
-
A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding
-
Dec.
-
Jiang Y, Fan Y, Shen X, Lin C,. A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding. Computer Networks Dec. 2009; 53 (18): 3089-3101.
-
(2009)
Computer Networks
, vol.53
, Issue.18
, pp. 3089-3101
-
-
Jiang, Y.1
Fan, Y.2
Shen, X.3
Lin, C.4
-
21
-
-
1642533403
-
Error and erasure decoding of rank-codes with a modified Berlekamp-Massey algorithm
-
Richter G, Plass S,. Error and erasure decoding of rank-codes with a modified Berlekamp-Massey algorithm. ITG-Fachbericht 2004: (181): 203-209.
-
(2004)
ITG-Fachbericht
, Issue.181
, pp. 203-209
-
-
Richter, G.1
Plass, S.2
-
22
-
-
77955618702
-
Improved compression of network coding vectors using erasure decoding and list decoding
-
Aug.
-
Li S, Ramamoorthy A,. Improved compression of network coding vectors using erasure decoding and list decoding. IEEE Communications Letters Aug. 2010; 14 (8): 749-751.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.8
, pp. 749-751
-
-
Li, S.1
Ramamoorthy, A.2
-
23
-
-
37149008079
-
Probabilistic algorithm for finding roots of linearized polynomials
-
DOI 10.1007/s10623-007-9125-y
-
Skachek V, Roth RM,. Probabilistic algorithm for finding roots of linearized polynomials. Designs, Codes, and Cryptography Jan. 2008; 46 (1): 17-23. (Pubitemid 50003986)
-
(2008)
Designs, Codes, and Cryptography
, vol.46
, Issue.1
, pp. 17-23
-
-
Skachek, V.1
Roth, R.M.2
|