Network coding theory part I: single source
RW Yeung, SYR Li, N Cai… - Foundations and Trends® …, 2006 - nowpublishers.com
Store-and-forward had been the predominant technique for transmitting information through
a network until its optimality was refuted by network coding theory. Network coding offers a …
a network until its optimality was refuted by network coding theory. Network coding offers a …
Network coding theory: A survey
This article surveys all known fields of network coding theory and leads the reader through
the antecedents of the network coding theory to the most recent results, considering also …
the antecedents of the network coding theory to the most recent results, considering also …
[引用][C] Information theory and network coding
RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …
2002 when network coding was still at its infancy. The last few years have witnessed the …
[PDF][PDF] Network Coding Fundamentals
C Fragouli - 2007 - infoscience.epfl.ch
Network coding is an elegant and novel technique introduced at the turn of the millennium to
improve network throughput and performance. It is expected to be a critical technology for …
improve network throughput and performance. It is expected to be a critical technology for …
Secure network coding for wiretap networks of type II
S El Rouayheb, E Soljanin… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We consider the problem of securing a multicast network against a wiretapper that can
eavesdrop on the packets on a limited number of network edges of its choice. We assume …
eavesdrop on the packets on a limited number of network edges of its choice. We assume …
A modified ant colony optimization algorithm for network coding resource minimization
This paper presents a modified ant colony optimization (ACO) approach for the network
coding resource minimization problem. It is featured with several attractive mechanisms …
coding resource minimization problem. It is featured with several attractive mechanisms …
Theory of secure network coding
N Cai, T Chan - Proceedings of the IEEE, 2011 - ieeexplore.ieee.org
In this tutorial paper, we focus on the basic theory of linear secure network coding. Our goal
is to present fundamental results and provide preliminary knowledge for anyone interested …
is to present fundamental results and provide preliminary knowledge for anyone interested …
Survey of network coding and its applications
This survey summarizes the state-of-the-art research on network coding, mainly focusing on
its applications to computer networking. Network coding generalizes traditional store-and …
its applications to computer networking. Network coding generalizes traditional store-and …
On wiretap networks II
SY El Rouayheb, E Soljanin - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
We consider the problem of securing a multicast network against a wiretapper that can
intercept the packets on a limited number of arbitrary network links of his choice. We assume …
intercept the packets on a limited number of arbitrary network links of his choice. We assume …
Evolutionary Approaches To Minimizing Network Coding Resources.
We wish to minimize the resources used for network coding while achieving the desired
throughput in a multicast scenario. We employ evolutionary approaches, based on a genetic …
throughput in a multicast scenario. We employ evolutionary approaches, based on a genetic …