Using Straggler Replication to Reduce Latency in Large-scale Parallel Computing D Wang, G Joshi, G Wornell ACM SIGMETRICS Performance Evaluation Review 43 (3), 7-11, 2015 | 163 | 2015 |
Efficient task replication for fast response times in parallel computation D Wang, G Joshi, G Wornell The 2014 ACM international conference on Measurement and modeling of …, 2014 | 142 | 2014 |
The Dispersion of Joint Source-Channel Coding D Wang, A Ingber, Y Kochman Proceedings of 49th Annual Allerton Conference on Communication, Control and …, 2011 | 69 | 2011 |
Efficient straggler replication in large-scale parallel computing D Wang, G Joshi, GW Wornell ACM Transactions on Modeling and Performance Evaluation of Computing Systems …, 2019 | 32 | 2019 |
Constricting the adversary: A broadcast transformation for network coding D Wang, D Silva, FR Kschischang Proceedings of 45th Annual Allerton Conference on Communication, Control and …, 2007 | 26 | 2007 |
Compression in the Space of Permutations D Wang, A Mazumdar, G Wornell Information Theory, IEEE Transactions on 61 (12), 6417 - 6431, 2015 | 23 | 2015 |
Error exponents in asynchronous communication D Wang, V Chandar, SY Chung, G Wornell 2011 IEEE International Symposium on Information Theory Proceedings, 1071-1075, 2011 | 20 | 2011 |
Robust network coding in the presence of untrusted nodes D Wang, D Silva, FR Kschischang IEEE Transactions on Information Theory 56 (9), 4532-4538, 2010 | 19 | 2010 |
Fountain Codes G Joshi, JB Rhim, J Sun, D Wang Technical report, Massachusetts Institute of Technology, 2010 | 19 | 2010 |
Performance of multiuser network-aware prefetching in heterogeneous wireless systems B Liang, S Drew, D Wang Wireless Networks 15, 99-110, 2009 | 18 | 2009 |
A Rate-Distortion Theory for Permutation Spaces D Wang, A Mazumdar, GW Wornell Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, 2013 | 16 | 2013 |
Distinguishing codes from noise: fundamental limits and applications to sparse communication D Wang Massachusetts Institute of Technology, 2010 | 16 | 2010 |
Computing with unreliable resources: design, analysis and algorithms D Wang Massachusetts Institute of Technology, 2014 | 11 | 2014 |
A Strong Converse for Joint Source-Channel Coding D Wang, A Ingber, Y Kochman Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, 2012 | 11 | 2012 |
Dispersion theorems via second order analysis of functions of distributions A Ingber, D Wang, Y Kochman 2012 46th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2012 | 10 | 2012 |
A simple class of efficient compression schemes supporting local access and editing H Zhou, D Wang, G Wornell Information Theory Proceedings (ISIT), 2014 IEEE International Symposium on …, 2014 | 6 | 2014 |
On Reliability Functions for Single-Message Unequal Error Protection D Wang, V Chandar, SY Chung, GW Wornell Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, 2012 | 6 | 2012 |
Defect tolerance: Fundamental limits and examples J Tang, D Wang, Y Polyanskiy, G Wornell Information Theory (ISIT), 2016 IEEE International Symposium on, 3028-3032, 2016 | 3 | 2016 |
Scalar Quantization with Noisy Partitions and its Application to Flash ADC Design D Wang, Y Polyanskiy, G Wornell Information Theory Proceedings (ISIT), 2014 IEEE International Symposium on, 2014 | 3 | 2014 |
Lossy compression of permutations D Wang, A Mazumdar, GW Wornell Information Theory Proceedings (ISIT), 2014 IEEE International Symposium on, 2014 | 1 | 2014 |