@other{https://resolver.caltech.edu/CaltechAUTHORS:20190402-145635729, title = "Multi-Resolution Video Streaming in Peer-to-peer Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20190402-145635729", id = "record", doi = "10.48550/arXiv.1304.1858" } @other{https://resolver.caltech.edu/CaltechAUTHORS:20190402-145650198, title = "On the Impact of a Single Edge on the Network Coding Capacity", url = "https://resolver.caltech.edu/CaltechAUTHORS:20190402-145650198", id = "record", doi = "10.48550/arXiv.1607.06793" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20180606-110229670, title = "Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:20180606-110229670", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2018.2820686", volume = "64" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20161128-122403199, title = "IEEE Global Communications Conference (GLOBECOM), 2015", chapter = "Priority-Based Real-Time Stream Coding under Burst Erasures", url = "https://resolver.caltech.edu/CaltechAUTHORS:20161128-122403199", id = "record", isbn = "978-1-4799-5952-5", doi = "10.1109/GLOCOM.2015.7417571" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20150910-140545452, title = "Quantifying Redundant Information in Predicting a Target Random Variable", journal = "Entropy", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150910-140545452", id = "record", issn = "1099-4300", doi = "10.3390/e17074644", volume = "17" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20160922-113810491, title = "2015 International Conference on Computing, Networking and Communications (ICNC)", chapter = "VIP: Joint Traffic Engineering and Caching in Named Data Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20160922-113810491", id = "record", isbn = "978-1-4799-6959-3", doi = "10.1109/ICCNC.2015.7069430" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20150420-094208422, title = "Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols", journal = "ACM Computing Surveys", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150420-094208422", id = "record", issn = "0360-0300", doi = "10.1145/2636344", volume = "47" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20141205-074033077, title = "An Achievable Region for Double-Unicast Networks With Linear Network Coding", journal = "IEEE Transactions on Communications", url = "https://resolver.caltech.edu/CaltechAUTHORS:20141205-074033077", id = "record", issn = "0090-6778", doi = "10.1109/TCOMM.2014.2350982", volume = "62" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898, title = "2014 52nd Annual Allerton Conference on Communication, Control, and Computing", chapter = "Single-source/sink network error correction is as hard as multiple-unicast", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898", id = "record", isbn = "978-1-4799-8009-3", doi = "10.1109/ALLERTON.2014.7028486" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20141016-104944573, title = "Modeling Flash Crowd Performance in Peer-to-Peer File Distribution", journal = "IEEE Transactions on Parallel and Distributed Systems", url = "https://resolver.caltech.edu/CaltechAUTHORS:20141016-104944573", id = "record", issn = "1045-9219", doi = "10.1109/TPDS.2013.220", volume = "25" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20141117-151706662, title = "ICN'14 Proceedings", chapter = "VIP: A Framework for Joint Dynamic Forwarding and Caching in Named Data Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20141117-151706662", id = "record", isbn = "978-1-4503-3206-4", doi = "10.1145/2660129.2660151" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150227-082218360, title = "2014 IEEE International Symposium on Information Theory (ISIT)", chapter = "Distributed Reed-Solomon codes for simple multiple access networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150227-082218360", id = "record", isbn = "978-1-4799-5186-4", doi = "10.1109/ISIT.2014.6874913" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781, title = "2014 IEEE International Symposium on Information Theory (ISIT)", chapter = "Reverse Edge Cut-Set Bounds for Secure Network Coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781", id = "record", isbn = "978-1-4799-5186-4", doi = "10.1109/ISIT.2014.6874804" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150227-092238378, title = "2014 IEEE International Symposium on Information Theory (ISIT)", chapter = "On the power of cooperation: Can a little help a lot?", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150227-092238378", id = "record", isbn = "978-1-4799-5186-4", doi = "10.1109/ISIT.2014.6875411" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150922-132032542, chapter = "Distributed gabidulin codes for multiple-source network error correction", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150922-132032542", id = "record", doi = "10.1109/NETCOD.2014.6892135" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20140529-100215879, title = "On the Delay Advantage of Coding in Packet Erasure Networks", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:20140529-100215879", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2014.2306817", volume = "60" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708, title = "Network Coding (NetCod) 2013", chapter = "On Secure Network Coding with Uniform Wiretap Sets", url = "https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708", id = "record", isbn = "978-1-4799-0821-9", doi = "10.1109/NetCod.2013.6570814" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091, title = "Infocom, 2013 Proceedings", chapter = "Rateless Resilient Network Coding Against Byzantine Adversaries", url = "https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091", id = "record", isbn = "978-1-4673-5944-3", doi = "10.1109/INFCOM.2013.6566776" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20130207-073335417, title = "On Secure Network Coding With Nonuniform or Restricted Wiretap Sets", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:20130207-073335417", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2012.2216936", volume = "59" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20130116-102514916, title = "Communication Protocols for N-way All-Cast Relay Networks", journal = "IEEE Transactions on Communications", url = "https://resolver.caltech.edu/CaltechAUTHORS:20130116-102514916", id = "record", issn = "0090-6778", doi = "10.1109/TCOMM.2012.080212.110395", volume = "60" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20130731-073911147, title = "2012 50th Annual Allerton Conference on Communication, Control, and Computing", chapter = "Network Equivalence in the Presence of an Eavesdropper", url = "https://resolver.caltech.edu/CaltechAUTHORS:20130731-073911147", id = "record", isbn = "978-1-4673-4537-8", doi = "10.1109/Allerton.2012.6483322" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20121008-112913029, title = "Congestion Control for Multicast Flows With Network Coding", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:20121008-112913029", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2012.2204170", volume = "58" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120907-074616471, title = "2012 International Conference on Signal Processing and Communications (SPCOM)", chapter = "Low-Complexity Near-Optimal Codes for Gaussian Relay Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120907-074616471", id = "record", isbn = "978-1-4673-2013-9", doi = "10.1109/SPCOM.2012.6290236" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20120716-093559713, title = "Distributed Storage Allocations", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120716-093559713", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2012.2191135", volume = "58" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120828-151414949, title = "2012 IEEE International Symposium on Information Theory Proceedings (ISIT)", chapter = "Erasure Coding for Real-Time Streaming", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120828-151414949", id = "record", isbn = "978-1-4673-2580-6", doi = "10.1109/ISIT.2012.6284055" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20120619-082839926, title = "Distributed Distortion Optimization for Correlated Sources with Network Coding", journal = "IEEE Transactions on Communications", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120619-082839926", id = "record", issn = "0090-6778", doi = "10.1109/TCOMM.2012.032012.100791", volume = "60" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170201-145713012, title = "2012 Information Theory and Applications Workshop", chapter = "On erasure correction coding for streaming", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170201-145713012", id = "record", isbn = "978-1-4673-1472-5", doi = "10.1109/ITA.2012.6181798" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170208-174937818, title = "49th Annual Allerton Conference on Communication, Control, and Computing", chapter = "Erasure correction for nested receivers", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170208-174937818", id = "record", isbn = "978-1-4577-1818-2", doi = "10.1109/Allerton.2011.6120339" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170223-131434715, title = "49th Annual Allerton Conference on Communication, Control, and Computing", chapter = "Privacy preserving data aggregating with multiple access channel", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170223-131434715", id = "record", isbn = "978-1-4577-1818-2", doi = "10.1109/Allerton.2011.6120388" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120405-094455952, title = "2011 IEEE International Symposium on Information Theory Proceedings", chapter = "On the Equivalence of Shannon Capacity and Stable Capacity in Networks with Memoryless Channels", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120405-094455952", id = "record", isbn = "978-1-4577-0596-0", doi = "10.1109/ISIT.2011.6034178" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120406-092406435, title = "2011 IEEE International Symposium on Information Theory Proceedings", chapter = "On Equivalence for Networks of Noisy Channels under Byzantine Attacks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120406-092406435", id = "record", isbn = "978-1-4577-0596-0", doi = "10.1109/ISIT.2011.6034284" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120406-091523956, title = "2011 IEEE International Symposium on Information Theory Proceedings", chapter = "Distributed Storage Allocations for Optimal Delay", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120406-091523956", id = "record", isbn = "978-1-4577-0596-0", doi = "10.1109/ISIT.2011.6033779" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120109-100003943, title = "2011 IEEE International Conference on Communications (ICC)", chapter = "Error Estimating Codes with Constant Overhead: A Random Walk Approach", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120109-100003943", id = "record", isbn = "978-1-61284-233-2", doi = "10.1109/icc.2011.5963049" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120405-100929836, title = "2011 IEEE Infocom Conference Proceedings", chapter = "Universal and Robust Distributed Network Codes", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120405-100929836", id = "record", isbn = "978-1-4244-9919-9", doi = "10.1109/INFCOM.2011.5935297" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20110316-153639993, title = "Network Error Correction With Unequal Link Capacities", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110316-153639993", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2010.2095090", volume = "57" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20110314-145005157, title = "Multiple-Access Network Information-Flow and Correction Codes", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110314-145005157", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2010.2095130", volume = "57" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170308-155527646, title = "2011 Information Theory and Applications Workshop", chapter = "On network error correction with limited feedback capacity", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170308-155527646", id = "record", isbn = "978-1-4577-0361-4", doi = "10.1109/ITA.2011.5743579" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20161122-143227109, title = "APSys '10 Proceedings of the first ACM asia-pacific workshop on Workshop on systems", chapter = "Improving peer-to-peer file distribution: winner doesn't have to take all", url = "https://resolver.caltech.edu/CaltechAUTHORS:20161122-143227109", id = "record", isbn = "978-1-4503-0195-4", doi = "10.1145/1851276.1851289" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170316-132954207, title = "48th Annual Allerton Conference on Communication, Control, and Computing (Allerton)", chapter = "Outer bounds on the error correction capacity region for non-multicast networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170316-132954207", id = "record", isbn = "978-1-4244-8216-0", doi = "10.1109/ALLERTON.2010.5706999" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20140529-141715127, title = "2010 IEEE Information Theory Workshop (ITW)", chapter = "On the Delay Advantage of Coding in Packet Erasure Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20140529-141715127", id = "record", isbn = "978-1-4244-8262-7", doi = "10.1109/CIG.2010.5592713" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170314-152947986, title = "2010 IEEE Information Theory Workshop", chapter = "Multi-source operator channels: Efficient capacity-achieving codes", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170314-152947986", id = "record", isbn = "978-1-4244-8264-1", doi = "10.1109/CIG.2010.5592812" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20100520-142930645, title = "On distributed scheduling in wireless networks exploiting broadcast and network coding", journal = "IEEE Transactions on Communications", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100520-142930645", id = "record", issn = "0090-6778", doi = "10.1109/TCOMM.2010.04.080564", volume = "58" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20091224-092459953, title = "Power scheduling of distributed estimation in sensor networks with repetition coding", journal = "Signal Processing", url = "https://resolver.caltech.edu/CaltechAUTHORS:20091224-092459953", id = "record", issn = "0165-1684", doi = "10.1016/j.sigpro.2009.07.032", volume = "90" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100805-081437710, title = "47th Annual Allerton Conference on Communication, Control and Computing", chapter = "Network error correction with unequal link capacities", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100805-081437710", id = "record", isbn = "978-1-4244-5870-7", doi = "10.1109/ALLERTON.2009.5394512" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20110329-162952462, title = "2010 IEEE International Symposium on Information Theory", chapter = "Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110329-162952462", id = "record", isbn = "978-1-4244-7891-0", doi = "10.1109/ISIT.2010.5513354" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20110406-104359419, title = "2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)", chapter = "Symmetric Allocations for Distributed Storage", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110406-104359419", id = "record", isbn = "978-1-4244-5638-3", doi = "10.1109/GLOCOM.2010.5683962" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170328-174035672, title = "2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers", chapter = "On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170328-174035672", id = "record", isbn = "978-1-4244-5827-1", doi = "10.1109/ACSSC.2009.5469966" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20091104-153456802, title = "Memoryless relay strategies for two-way relay channels", journal = "IEEE Transactions on Communications", url = "https://resolver.caltech.edu/CaltechAUTHORS:20091104-153456802", id = "record", issn = "0090-6778", doi = "10.1109/TCOMM.2009.10.080222", volume = "57" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100816-135601648, title = "ISIT 2009", chapter = "Rate regions for coherent and noncoherent multisource network error correction", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100816-135601648", id = "record", isbn = "978-1-4244-4312-3", doi = "10.1109/ISIT.2009.5206077" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100816-140417790, title = "ISIT 2009", chapter = "On noncoherent correction of network errors and erasures with random locations", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100816-140417790", id = "record", isbn = "978-1-4244-4312-3", doi = "10.1109/ISIT.2009.5205602" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100816-110713053, title = "ISIT 2009", chapter = "On the delay of network coding over line networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100816-110713053", id = "record", isbn = "978-1-4244-4312-3", doi = "10.1109/ISIT.2009.5205897" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100722-131717463, title = "Conference record of the 42nd Asilomar Conference on Signals, Systems and Computers", chapter = "On robust network coding subgraph construction under uncertainty", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100722-131717463", id = "record", isbn = "978-1-4244-2940-0", doi = "10.1109/ACSSC.2008.5074828" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100716-091516848, title = "46th annual Allerton Conference on Communication, Control, and Computing", chapter = "Network coding with periodic recomputation for minimum energy multicasting in mobile ad-hoc networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100716-091516848", id = "record", isbn = "978-1-4244-2925-7", doi = "10.1109/ALLERTON.2008.4797549" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100716-104652225, title = "46th annual Allerton Conference on Communication, Control, and Computing", chapter = "Distributed design of network codes for wireless multiple unicasts", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100716-104652225", id = "record", isbn = "978-1-4244-2925-7", doi = "10.1109/ALLERTON.2008.4797575" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100511-151403304, title = "43rd Annual Conference on Information Sciences and Systems, 2009. CISS 2009", chapter = "Optimal Quantization in Energy-Constrained Sensor Networks under Imperfect Transmission", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100511-151403304", id = "record", isbn = "9781424427338", doi = "10.1109/CISS.2009.5054792" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20090514-153538553, title = "Distributed space-time coding for two-way wireless relay networks", journal = "IEEE Transactions on Signal Processing", url = "https://resolver.caltech.edu/CaltechAUTHORS:20090514-153538553", id = "record", issn = "1053-587X", doi = "10.1109/TSP.2008.2009025", volume = "57" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20090806-074929936, title = "Dynamic algorithms for multicast with intra-session network coding", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:20090806-074929936", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2008.2009809", volume = "55" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100510-112135867, title = "Information Sciences and Systems, 2009", chapter = "Optimal content delivery with network coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100510-112135867", id = "record", isbn = "978-1-4244-2733-8", doi = "10.1109/CISS.2009.5054756" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100510-105350270, title = "Networking and Information Theory, 2009", chapter = "Approximate capacity of the symmetric half-duplex Gaussian butterfly network", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100510-105350270", id = "record", isbn = "978-1-4244-4535-6", doi = "10.1109/ITWNIT.2009.5158593" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100816-095201318, title = "ISIT 2009", chapter = "On multiple access random medium access control", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100816-095201318", id = "record", isbn = "978-1-4244-4312-3", doi = "10.1109/ISIT.2009.5205457" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100816-100837500, title = "ISIT 2009", chapter = "Achievable rate and optimal physical layer rate allocation in interference-free wireless networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100816-100837500", id = "record", isbn = "978-1-4244-4312-3", doi = "10.1109/ISIT.2009.5205903" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100510-112640133, title = "Network Coding, Theory, and Applications, 2009", chapter = "Distributed Storage Allocation Problems", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100510-112640133", id = "record", isbn = "978-1-4244-4723-7", doi = "10.1109/NETCOD.2009.5191399" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20091224-082815709, title = "Network Coding", journal = "Journal of Communications and Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20091224-082815709", id = "record", issn = "1229-2370", volume = "10" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170404-165519201, title = "46th Annual Allerton Conference on Communication, Control, and Computing", chapter = "Network codes with deadlines", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170404-165519201", id = "record", isbn = "978-1-4244-2925-7", doi = "10.1109/ALLERTON.2008.4797577" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:GUWisit07, title = "IEEE International Symposium on Information Theory (ISIT 2007), Nice France, 24-29 June 2007", chapter = "On Source Coding with Coded Side Information for a Binary Source with Binary Side Information", url = "https://resolver.caltech.edu/CaltechAUTHORS:GUWisit07", id = "record", isbn = "978-1-4244-1397-3", doi = "10.1109/ISIT.2007.4557427" } @article{https://resolver.caltech.edu/CaltechAUTHORS:JAGieeetit08, title = "Resilient Network Coding in the Presence of Byzantine Adversaries", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:JAGieeetit08", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2008.921711", volume = "54" } @article{https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit08, title = "Byzantine Modification Detection in Multicast Networks With Random Network Coding", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit08", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2008.921894", volume = "54" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100707-141558183, title = "IEEE INFOCOM 2008 : the 27th Conference on Computer Communications : [April 13-18, 2008, Phoenix, Arizona", chapter = "Energy Efficient Opportunistic Network Coding for Wireless Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100707-141558183", id = "record", isbn = "978-1-4244-2025-4", doi = "10.1109/INFOCOM.2008.81" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170418-174812677, title = "2008 Information Theory and Applications Workshop", chapter = "Some results on relay strategies for memoryless two-way relay channels", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170418-174812677", id = "record", isbn = "978-1-4244-2670-6", doi = "10.1109/ITA.2008.4601042" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20110407-113333118, title = "2008 IEEE Global Telecommunications Conference", chapter = "Space-Time Communication Protocols for N-way Relay Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110407-113333118", id = "record", isbn = "978-1-4244-2324-8", doi = "10.1109/GLOCOM.2008.ECP.205" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100629-080753182, title = "2008 IEEE International Conference on Communications", chapter = "Memoryless Relay Strategies for Two-Way Relay Channels: Performance Analysis and Optimization", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100629-080753182", id = "record", isbn = "978-1-4244-2074-2", doi = "10.1109/ICC.2008.222" } @book{https://resolver.caltech.edu/CaltechAUTHORS:20180809-095044148, title = "Network Coding: an introduction", url = "https://resolver.caltech.edu/CaltechAUTHORS:20180809-095044148", id = "record", isbn = "9780511754623", doi = "10.1017/cbo9780511754623" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170420-135023438, title = "MILCOM 2007 - IEEE Military Communications Conference", chapter = "On network coding for security", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170420-135023438", id = "record", isbn = "978-1-4244-1512-0", doi = "10.1109/MILCOM.2007.4454907" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100909-133322426, title = "2007 IEEE International Conference on Communications", chapter = "Statistical Pruning for Near Maximum Likelihood Detection of MIMO Systems", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100909-133322426", id = "record", isbn = "978-1-4244-0352-3", doi = "10.1109/ICC.2007.905" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170420-133141763, title = "2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks", chapter = "On the Performance of Joint and Separate Channel and Network Coding in Wireless Fading Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170420-133141763", id = "record", isbn = "978-1-4244-1199-3", doi = "10.1109/ITWITWN.2007.4318067" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:MEHicassp07, title = "IEEE International Conference on Acoustics, Speech and Signal Processing, (ICASSP 2007), Honolulu, HI, 15-20 April 2007", chapter = "Optimal Strategies for Efficient Peer-to-Peer File Sharing", url = "https://resolver.caltech.edu/CaltechAUTHORS:MEHicassp07", id = "record", isbn = "1-4244-0728-1", doi = "10.1109/ICASSP.2007.367325" } @other{https://resolver.caltech.edu/CaltechCSTR:2007.002, title = "Distributed Optimization in Wireless Networks Using Broadcast Advantage", url = "https://resolver.caltech.edu/CaltechCSTR:2007.002", id = "record", doi = "10.7907/Z9BK19BR" } @other{https://resolver.caltech.edu/CaltechCSTR:2007.003, title = "Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks", url = "https://resolver.caltech.edu/CaltechCSTR:2007.003", id = "record", doi = "10.7907/Z9G73BP6" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170425-162520744, title = "2007 IEEE International Symposium on Information Theory", chapter = "On Distributed Distortion Optimization for Correlated Sources", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170425-162520744", id = "record", isbn = "978-1-4244-1397-3", doi = "10.1109/ISIT.2007.4557631" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170425-161810594, title = "2007 IEEE International Symposium on Information Theory", chapter = "Minimum Cost Integral Network Coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170425-161810594", id = "record", isbn = "978-1-4244-1397-3", doi = "10.1109/ISIT.2007.4557632" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170425-143555263, title = "5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops", chapter = "Network With Costs: Timing and Flow Decomposition", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170425-143555263", id = "record", isbn = "978-1-4244-0960-0", doi = "10.1109/WIOPT.2007.4480102" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100827-082408080, title = "46th IEEE Conference on Decision and Control", chapter = "Optimization based rate control for multicast with network coding: A multipath formulation", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100827-082408080", id = "record", isbn = "978-1-4244-1497-0", doi = "10.1109/CDC.2007.4434960" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100826-092317616, title = "INFOCOM 2007", chapter = "Optimization Based Rate Control for Multicast with Network Coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100826-092317616", id = "record", isbn = "978-1-4244-1046-0", doi = "10.1109/INFCOM.2007.139" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100826-151540718, title = "46th IEEE Conference on Decision and Control", chapter = "Distributed minimum cost multicasting with lossless source coding and network coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100826-151540718", id = "record", isbn = "978-1-4244-1497-0", doi = "10.1109/CDC.2007.4434962" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100827-112133009, title = "Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on", chapter = "Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100827-112133009", id = "record", isbn = "978-1-4244-1454-3", doi = "10.1109/MOBHOC.2007.4428675" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100827-084745453, title = "46th IEEE Conference on Decision and Control", chapter = "Distributed optimization in wireless networks using broadcast advantage", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100827-084745453", id = "record", isbn = "978-1-4244-1497-0", doi = "10.1109/CDC.2007.4434958" } @article{https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit06, title = "A Random Linear Network Coding Approach to Multicast", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit06", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2006.881746", volume = "52" } @other{https://resolver.caltech.edu/CaltechCDSTR:2006.004, title = "Rate Control for Multicast with Network Coding", url = "https://resolver.caltech.edu/CaltechCDSTR:2006.004", id = "record" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170515-163823021, title = "2006 IEEE International Symposium on Information Theory", chapter = "Linear Programming Detection and Decoding for MIMO Systems", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170515-163823021", id = "record", isbn = "1-4244-0505-X", doi = "10.1109/ISIT.2006.261741" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170503-172212389, title = "2006 IEEE International Symposium on Information Theory", chapter = "Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170503-172212389", id = "record", isbn = "1-4244-0505-X", doi = "10.1109/ISIT.2006.261832" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:EFFitw06, title = "IEEE Information Theory Workshop (ITW '06), Punta del Este, Uruguay, 13-17 March, 2006", chapter = "A tiling approach to network code design for wireless networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:EFFitw06", id = "record", isbn = "1-4244-0035-X", doi = "10.1109/ITW.2006.1633782" } @article{https://resolver.caltech.edu/CaltechAUTHORS:LUNieeetit06, title = "Minimum-cost multicast over coded packet networks", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:LUNieeetit06", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2006.874523", volume = "52" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20110506-105351004, title = "2006 IEEE International Conference on Communications", chapter = "Heuristic Tree Search for Detection and Decoding of Uncoded and Linear Block Coded Communication Systems", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110506-105351004", id = "record", isbn = "978-1-4244-0354-7", doi = "10.1109/ICC.2006.254759" } @other{https://resolver.caltech.edu/CaltechAUTHORS:20140928-225407828, title = "On network coding and routing in dynamic wireless multicast networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20140928-225407828", id = "record" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20110506-104232997, title = "2006 IEEE International Conference on Communications", chapter = "Polynomial Moment Relaxation for MIMO Detection", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110506-104232997", id = "record", isbn = "978-1-4244-0354-7", doi = "10.1109/ICC.2006.255286" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:JAGisit05, title = "International Symposium on Information Theory (ISIT 2005), Adelaide, South Australia, Australia, 4-9 September 2005", chapter = "Correction of adversarial errors in networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:JAGisit05", id = "record", isbn = "0-7803-9151-9", doi = "10.1109/ISIT.2005.1523584" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:HOTisit05, title = "IEEE International Symposium on Information Theory (ISIT '05), Adelaide, Australia, 4-9 September 2005", chapter = "Network monitoring in multicast networks using network coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTisit05", id = "record", isbn = "0-7803-9151-9", doi = "10.1109/ISIT.2005.1523691" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:HOTiwwan04, title = "International Workshop on Wireless Ad-Hoc Networks, Oulu, Finald, May 31-June 3, 2004", chapter = "On the utility of network coding in dynamic environments", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTiwwan04", id = "record", isbn = "0-7803-8275-7", doi = "10.1109/IWWAN.2004.1525570" } @article{https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit05, title = "An information-theoretic view of network management", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit05", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2005.844062", volume = "51" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:HOTisit04, title = "IEEE International Symposium on Information Theory (ISIT '04), Chicago, IL, 27 June-2 July 2004", chapter = "Byzantine modification detection in multicast networks using randomized network coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTisit04", id = "record", isbn = "0-7803-8280-3", doi = "10.1109/ISIT.2004.1365180" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:HOTisit03a, title = "IEEE International Symposium on Information Theory (ISIT '04), Chicago, IL, 27 June-2 July, 2004", chapter = "The benefits of coding over routing in a randomized setting", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTisit03a", id = "record", isbn = "0-7803-7728-1", doi = "10.1109/ISIT.2003.1228459" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20111014-145416422, title = "2003 IEEE International Symposium on Information Theory", chapter = "Network coding from a network flow perspective", url = "https://resolver.caltech.edu/CaltechAUTHORS:20111014-145416422", id = "record", isbn = "0-7803-7728-1", doi = "10.1109/ISIT.2003.1228458" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20111005-132747410, title = "IEEE INFOCOM 2003 : the conference on computer communications", chapter = "An information theoretic view of network management", url = "https://resolver.caltech.edu/CaltechAUTHORS:20111005-132747410", id = "record", isbn = "0-7803-7752-4", doi = "10.1109/INFCOM.2003.1208981" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150210-075301992, title = "Advances in Network Information Theory", chapter = "Linear network codes: A unified framework for source, channel, and network coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150210-075301992", id = "record", isbn = "0821834673" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20111019-141653699, title = "2002 IEEE International Symposium on Information Theory", chapter = "A coding view of network recovery and management", url = "https://resolver.caltech.edu/CaltechAUTHORS:20111019-141653699", id = "record", isbn = "0-7803-7501-7", doi = "10.1109/ISIT.2002.1023409" }