Network coding theory part I: single source
RW Yeung, SYR Li, N Cai… - Foundations and Trends® …, 2006 - nowpublishers.com
Store-and-forward had been the predominant technique for transmitting information through
a network until its optimality was refuted by network coding theory. Network coding offers a …
a network until its optimality was refuted by network coding theory. Network coding offers a …
Cooperative communications
This article reviews progress in cooperative communication networks. Our survey is by no
means exhaustive. Instead, we assemble a representative sample of recent results to serve …
means exhaustive. Instead, we assemble a representative sample of recent results to serve …
Trading structure for randomness in wireless opportunistic routing
S Chachulski, M Jennings, S Katti… - ACM SIGCOMM Computer …, 2007 - dl.acm.org
Opportunistic routing is a recent technique that achieves high throughput in the face of lossy
wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing …
wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing …
Network coding: an instant primer
Network coding is a new research area that may have interesting applications in practical
networking systems. With network coding, intermediate nodes may send out packets that are …
networking systems. With network coding, intermediate nodes may send out packets that are …
Resilient network coding in the presence of byzantine adversaries
Network coding substantially increases network throughput. But since it involves mixing of
information inside the network, a single corrupted packet generated by a malicious node can …
information inside the network, a single corrupted packet generated by a malicious node can …
Optimized constellations for two-way wireless relaying with physical network coding
T Koike-Akino, P Popovski… - IEEE journal on Selected …, 2009 - ieeexplore.ieee.org
We investigate modulation schemes optimized for two-way wireless relaying systems, for
which network coding is employed at the physical layer. We consider network coding based …
which network coding is employed at the physical layer. We consider network coding based …
Wireless broadcast using network coding
Traditional approaches to reliably transmit information over an error-prone network employ
either forward error correction (FEC) or retransmission techniques. In this paper, we propose …
either forward error correction (FEC) or retransmission techniques. In this paper, we propose …
[图书][B] Cyber-physical systems: from theory to practice
Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must
for researchers, practitioners, system designers, policy makers, system managers, and …
for researchers, practitioners, system designers, policy makers, system managers, and …
The anti-packets can increase the achievable throughput of a wireless multi-hop network
P Popovski, H Yomo - 2006 IEEE international conference on …, 2006 - ieeexplore.ieee.org
This paper considers relaying techniques that increase the achievable throughput in multi-
hop wireless networks by taking advantage of the bi-directional traffic flow. Such a relaying …
hop wireless networks by taking advantage of the bi-directional traffic flow. Such a relaying …