-
1
-
-
0034229404
-
Network information flow
-
Jul.
-
R. Ahlswede, N. Cai, S. R. Li, and R. W. Weung, "Network information flow," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.R.3
Weung, R.W.4
-
2
-
-
84888366210
-
Network coding theory: A survey
-
4th Quart.
-
R. Bassoli, H.Marques, J. Rodriguez, K.W. Shum, and R. Tafazolli, "Network coding theory: A survey," IEEE Commun. Surveys Tuts., vol. 15, no. 4, pp. 1950-1978, 4th Quart. 2013.
-
(2013)
IEEE Commun. Surveys Tuts
, vol.15
, Issue.4
, pp. 1950-1978
-
-
Bassoli, R.1
Marques, H.2
Rodriguez, J.3
Shum, K.W.4
Tafazolli, R.5
-
3
-
-
25644448947
-
Network coding for large scale content distribution
-
Miami, FL, USA, Mar.
-
C. Gkantsidis and P. R. Rodriguez, "Network coding for large scale content distribution," in Proc. IEEE INFOCOM,Miami, FL, USA, Mar. 2005, pp. 2235-2245.
-
(2005)
Proc. IEEE INFOCOM
, pp. 2235-2245
-
-
Gkantsidis, C.1
Rodriguez, P.R.2
-
4
-
-
36949029133
-
Embracing wireless interference: Analog network coding
-
Kyoto, Japan Aug.
-
S. Katti, S. Gollakota, and D. Katabi, "Embracing wireless interference: Analog network coding," in Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007, pp. 397-408.
-
(2007)
Proc. ACM SIGCOMM
, pp. 397-408
-
-
Katti, S.1
Gollakota, S.2
Katabi, D.3
-
5
-
-
0036353798
-
Secure network coding
-
Lausanne, Switzerland, Jun.
-
N. Cai and R. W. Yeung, "Secure network coding," in Proc. IEEE ISIT, Lausanne, Switzerland, Jun. 2002, p. 323.
-
(2002)
Proc. IEEE ISIT
, pp. 323
-
-
Cai, N.1
Yeung, R.W.2
-
6
-
-
84881098781
-
A secure broadcasting scheme with network coding
-
Jul.
-
X.Wang, W. Guo, Y. Yang, and B.Wang, "A secure broadcasting scheme with network coding," IEEE Commun. Lett., vol. 17, no. 7, pp. 1435-1438, Jul. 2013.
-
(2013)
IEEE Commun. Lett
, vol.17
, Issue.7
, pp. 1435-1438
-
-
Wang, X.1
Guo, W.2
Yang, Y.3
Wang, B.4
-
7
-
-
84883054869
-
On the inherent security of linear network coding
-
Aug.
-
M. Adeli and H. Liu, "On the inherent security of linear network coding," IEEE Commun. Lett., vol. 17, no. 8, pp. 1668-1671, Aug. 2013.
-
(2013)
IEEE Commun. Lett
, vol.17
, Issue.8
, pp. 1668-1671
-
-
Adeli, M.1
Liu, H.2
-
8
-
-
84901499657
-
Exploiting fountain codes for secure wireless delivery
-
May
-
H. Niu, M. Iwai, K. Sezaki, L. Sun, and Q. Du, "Exploiting fountain codes for secure wireless delivery," IEEE Commun. Lett., vol. 18, no. 5, pp. 777-780, May 2014.
-
(2014)
IEEE Commun. Lett
, vol.18
, Issue.5
, pp. 777-780
-
-
Niu, H.1
Iwai, M.2
Sezaki, K.3
Sun, L.4
Du, Q.5
-
9
-
-
79551682625
-
Exact decoding probability under random linear network coding
-
Jan.
-
O. Trullols-Cruces, J. Barcelo-Ordinas, and M. Fiore, "Exact decoding probability under random linear network coding," IEEE Commun. Lett., vol. 15, no. 1, pp. 67-69, Jan. 2011.
-
(2011)
IEEE Commun. Lett
, vol.15
, Issue.1
, pp. 67-69
-
-
Trullols-Cruces, O.1
Barcelo-Ordinas, J.2
Fiore, M.3
-
10
-
-
77955032682
-
Network coded transmission of fountain codes over cooperative relay networks
-
E. Kurniawan, S. Sun, K. Yen, and K. F. E. Chong, "Network coded transmission of fountain codes over cooperative relay networks," in Proc. IEEE WCNC, Sydney, NSW, Australia, Apr. 2010, pp. 1-6.
-
(2010)
Proc. IEEE WCNC Sydney, NSW, Australia, Apr
, pp. 1-6
-
-
Kurniawan, E.1
Sun, S.2
Yen, K.3
Chong, K.F.E.4
-
11
-
-
84947773616
-
Performance analysis of random linear network coding in two-source single-relay networks
-
London, U.K., Jun [Online]. Available
-
A. S. Khan and I. Chatzigeorgiou, "Performance analysis of random linear network coding in two-source single-relay networks," in Proc. IEEE ICC Workshops, London, U.K., Jun. 2015. [Online]. Available: http://arxiv.org/abs/1503.05696
-
(2015)
Proc. IEEE ICC Workshops
-
-
Khan, A.S.1
Chatzigeorgiou, I.2
-
12
-
-
84926327077
-
To transmit or not to transmit? Distributed queueing games in infrastructureless wireless networks
-
to be published
-
Z. Guan, T. Melodia, and G. Scutari, "To transmit or not to transmit? Distributed queueing games in infrastructureless wireless networks," IEEE/ACM Trans. Netw., to be published, DOI: 10.1109/TNET.2015.2412116.
-
IEEE/ACM Trans. Netw
-
-
Guan, Z.1
Melodia, T.2
Scutari, G.3
|