@article{https://resolver.caltech.edu/CaltechAUTHORS:20180606-110229670,
    title = "Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding",
    journal = "IEEE Transactions on Information Theory",
    year = "2018",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20180606-110229670",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2018.2820686",
    volume = "64"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20150910-140545452,
    title = "Quantifying Redundant Information in Predicting a Target Random Variable",
    journal = "Entropy",
    year = "2015",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20150910-140545452",
    id = "record",
    issn = "1099-4300",
    doi = "10.3390/e17074644",
    volume = "17"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20150420-094208422,
    title = "Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols",
    journal = "ACM Computing Surveys",
    year = "2015",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20150420-094208422",
    id = "record",
    issn = "0360-0300",
    doi = "10.1145/2636344",
    volume = "47"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20141016-104944573,
    title = "Modeling Flash Crowd Performance in Peer-to-Peer File Distribution",
    journal = "IEEE Transactions on Parallel and Distributed Systems",
    year = "2014",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20141016-104944573",
    id = "record",
    issn = "1045-9219",
    doi = "10.1109/TPDS.2013.220",
    volume = "25"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20141205-074033077,
    title = "An Achievable Region for Double-Unicast Networks With Linear Network Coding",
    journal = "IEEE Transactions on Communications",
    year = "2014",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20141205-074033077",
    id = "record",
    issn = "0090-6778",
    doi = "10.1109/TCOMM.2014.2350982",
    volume = "62"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20140529-100215879,
    title = "On the Delay Advantage of Coding in Packet Erasure Networks",
    journal = "IEEE Transactions on Information Theory",
    year = "2014",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20140529-100215879",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2014.2306817",
    volume = "60"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20130207-073335417,
    title = "On Secure Network Coding With Nonuniform or Restricted Wiretap Sets",
    journal = "IEEE Transactions on Information Theory",
    year = "2013",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20130207-073335417",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2012.2216936",
    volume = "59"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20130116-102514916,
    title = "Communication Protocols for N-way All-Cast Relay Networks",
    journal = "IEEE Transactions on Communications",
    year = "2012",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20130116-102514916",
    id = "record",
    issn = "0090-6778",
    doi = "10.1109/TCOMM.2012.080212.110395",
    volume = "60"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20121008-112913029,
    title = "Congestion Control for Multicast Flows With Network Coding",
    journal = "IEEE Transactions on Information Theory",
    year = "2012",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20121008-112913029",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2012.2204170",
    volume = "58"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20120716-093559713,
    title = "Distributed Storage Allocations",
    journal = "IEEE Transactions on Information Theory",
    year = "2012",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20120716-093559713",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2012.2191135",
    volume = "58"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20120619-082839926,
    title = "Distributed Distortion Optimization for Correlated Sources with Network Coding",
    journal = "IEEE Transactions on Communications",
    year = "2012",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20120619-082839926",
    id = "record",
    issn = "0090-6778",
    doi = "10.1109/TCOMM.2012.032012.100791",
    volume = "60"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20110316-153639993,
    title = "Network Error Correction With Unequal Link Capacities",
    journal = "IEEE Transactions on Information Theory",
    year = "2011",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20110316-153639993",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2010.2095090",
    volume = "57"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20110314-145005157,
    title = "Multiple-Access Network Information-Flow and Correction Codes",
    journal = "IEEE Transactions on Information Theory",
    year = "2011",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20110314-145005157",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2010.2095130",
    volume = "57"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20100520-142930645,
    title = "On distributed scheduling in wireless networks exploiting broadcast and network coding",
    journal = "IEEE Transactions on Communications",
    year = "2010",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20100520-142930645",
    id = "record",
    issn = "0090-6778",
    doi = "10.1109/TCOMM.2010.04.080564",
    volume = "58"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20091224-092459953,
    title = "Power scheduling of distributed estimation in sensor networks with repetition coding",
    journal = "Signal Processing",
    year = "2010",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20091224-092459953",
    id = "record",
    issn = "0165-1684",
    doi = "10.1016/j.sigpro.2009.07.032",
    volume = "90"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20091104-153456802,
    title = "Memoryless relay strategies for two-way relay channels",
    journal = "IEEE Transactions on Communications",
    year = "2009",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20091104-153456802",
    id = "record",
    issn = "0090-6778",
    doi = "10.1109/TCOMM.2009.10.080222",
    volume = "57"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20090514-153538553,
    title = "Distributed space-time coding for two-way wireless relay networks",
    journal = "IEEE Transactions on Signal Processing",
    year = "2009",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20090514-153538553",
    id = "record",
    issn = "1053-587X",
    doi = "10.1109/TSP.2008.2009025",
    volume = "57"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20090806-074929936,
    title = "Dynamic algorithms for multicast with intra-session
 network coding",
    journal = "IEEE Transactions on Information Theory",
    year = "2009",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20090806-074929936",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2008.2009809",
    volume = "55"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20091224-082815709,
    title = "Network Coding",
    journal = "Journal of Communications and Networks",
    year = "2008",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20091224-082815709",
    id = "record",
    issn = "1229-2370",
    volume = "10"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit08,
    title = "Byzantine Modification Detection in Multicast Networks With Random Network Coding",
    journal = "IEEE Transactions on Information Theory",
    year = "2008",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit08",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2008.921894",
    volume = "54"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:JAGieeetit08,
    title = "Resilient Network Coding in the Presence of Byzantine Adversaries",
    journal = "IEEE Transactions on Information Theory",
    year = "2008",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:JAGieeetit08",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2008.921711",
    volume = "54"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit06,
    title = "A Random Linear Network Coding Approach to Multicast",
    journal = "IEEE Transactions on Information Theory",
    year = "2006",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit06",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2006.881746",
    volume = "52"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:LUNieeetit06,
    title = "Minimum-cost multicast over coded packet networks",
    journal = "IEEE Transactions on Information Theory",
    year = "2006",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:LUNieeetit06",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2006.874523",
    volume = "52"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit05,
    title = "An information-theoretic view of network management",
    journal = "IEEE Transactions on Information Theory",
    year = "2005",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit05",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2005.844062",
    volume = "51"
}