<h1>Ho, Tracey C.</h1> <h2>Combined from <a href="https://authors.library.caltech.edu">CaltechAUTHORS</a></h2> <ul> <li>Huang, Wentao and Ho, Tracey, el al. (2018) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20180606-110229670">Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding</a>; IEEE Transactions on Information Theory; Vol. 64; No. 6; 4496-4512; <a href="https://doi.org/10.1109/TIT.2018.2820686">10.1109/TIT.2018.2820686</a></li> <li>Jalali, Shirin and Effros, Michelle, el al. (2016) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20190402-145650198">On the Impact of a Single Edge on the Network Coding Capacity</a>; <a href="https://doi.org/10.48550/arXiv.1607.06793">10.48550/arXiv.1607.06793</a></li> <li>Wei, Yunkai and Mao, Yuming, el al. (2015) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20161128-122403199">Priority-Based Real-Time Stream Coding under Burst Erasures</a>; ISBN 978-1-4799-5952-5; IEEE Global Communications Conference (GLOBECOM), 2015; 1-7; <a href="https://doi.org/10.1109/GLOCOM.2015.7417571">10.1109/GLOCOM.2015.7417571</a></li> <li>Griffith, Virgil and Ho, Tracey (2015) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150910-140545452">Quantifying Redundant Information in Predicting a Target Random Variable</a>; Entropy; Vol. 17; No. 7; 4644-4653; <a href="https://doi.org/10.3390/e17074644">10.3390/e17074644</a></li> <li>Yeh, Edmund and Ho, Tracey, el al. (2015) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20160922-113810491">VIP: Joint Traffic Engineering and Caching in Named Data Networks</a>; ISBN 978-1-4799-6959-3; 2015 International Conference on Computing, Networking and Communications (ICNC); 695-699; <a href="https://doi.org/10.1109/ICCNC.2015.7069430">10.1109/ICCNC.2015.7069430</a></li> <li>Newell, Andrew and Yao, Hongyi, el al. (2015) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150420-094208422">Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols</a>; ACM Computing Surveys; Vol. 47; No. 2; Art. No. 24; <a href="https://doi.org/10.1145/2636344">10.1145/2636344</a></li> <li>Xu, Xiaoli and Zeng, Yong, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20141205-074033077">An Achievable Region for Double-Unicast Networks With Linear Network Coding</a>; IEEE Transactions on Communications; Vol. 62; No. 10; 3621-3630; <a href="https://doi.org/10.1109/TCOMM.2014.2350982">10.1109/TCOMM.2014.2350982</a></li> <li>Huang, Wentao and Ho, Tracey, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898">Single-source/sink network error correction is as hard as multiple-unicast</a>; ISBN 978-1-4799-8009-3; 2014 52nd Annual Allerton Conference on Communication, Control, and Computing; 423-430; <a href="https://doi.org/10.1109/ALLERTON.2014.7028486">10.1109/ALLERTON.2014.7028486</a></li> <li>Carbunaru, Cristina and Teo, Yong Meng, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20141016-104944573">Modeling Flash Crowd Performance in Peer-to-Peer File Distribution</a>; IEEE Transactions on Parallel and Distributed Systems; Vol. 25; No. 10; 2617-2626; <a href="https://doi.org/10.1109/TPDS.2013.220">10.1109/TPDS.2013.220</a></li> <li>Yeh, Edmund and Ho, Tracey, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20141117-151706662">VIP: A Framework for Joint Dynamic Forwarding and Caching in Named Data Networks</a>; ISBN 978-1-4503-3206-4; ICN'14 Proceedings; 117-126; <a href="https://doi.org/10.1145/2660129.2660151">10.1145/2660129.2660151</a></li> <li>Noorzad, Parham and Effros, Michelle, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150227-092238378">On the power of cooperation: Can a little help a lot?</a>; ISBN 978-1-4799-5186-4; 2014 IEEE International Symposium on Information Theory (ISIT); 3132-3136; <a href="https://doi.org/10.1109/ISIT.2014.6875411">10.1109/ISIT.2014.6875411</a></li> <li>Halbawi, Wael and Ho, Tracey, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150227-082218360">Distributed Reed-Solomon codes for simple multiple access networks</a>; ISBN 978-1-4799-5186-4; 2014 IEEE International Symposium on Information Theory (ISIT); 651-655; <a href="https://doi.org/10.1109/ISIT.2014.6874913">10.1109/ISIT.2014.6874913</a></li> <li>Huang, Wentao and Ho, Tracey, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781">Reverse Edge Cut-Set Bounds for Secure Network Coding</a>; ISBN 978-1-4799-5186-4; 2014 IEEE International Symposium on Information Theory (ISIT); 106-110; <a href="https://doi.org/10.1109/ISIT.2014.6874804">10.1109/ISIT.2014.6874804</a></li> <li>Halbawi, Wael and Ho, Tracey, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150922-132032542">Distributed gabidulin codes for multiple-source network error correction</a>; <a href="https://doi.org/10.1109/NETCOD.2014.6892135">10.1109/NETCOD.2014.6892135</a></li> <li>Dikaliotis, Theodoros K. and Dimakis, Alexandros G., el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20140529-100215879">On the Delay Advantage of Coding in Packet Erasure Networks</a>; IEEE Transactions on Information Theory; Vol. 60; No. 5; 2868-2883; <a href="https://doi.org/10.1109/TIT.2014.2306817">10.1109/TIT.2014.2306817</a></li> <li>Huang, Wentao and Ho, Tracey, el al. (2013) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708">On Secure Network Coding with Uniform Wiretap Sets</a>; ISBN 978-1-4799-0821-9; Network Coding (NetCod) 2013; 1-6; <a href="https://doi.org/10.1109/NetCod.2013.6570814">10.1109/NetCod.2013.6570814</a></li> <li>Karagöz, Batuhan and Yavuz, Semih, el al. (2013) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20190402-145635729">Multi-Resolution Video Streaming in Peer-to-peer Networks</a>; <a href="https://doi.org/10.48550/arXiv.1304.1858">10.48550/arXiv.1304.1858</a></li> <li>Huang, Wentao and Ho, Tracey, el al. (2013) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091">Rateless Resilient Network Coding Against Byzantine Adversaries</a>; ISBN 978-1-4673-5944-3; Infocom, 2013 Proceedings; 265-269; <a href="https://doi.org/10.1109/INFCOM.2013.6566776">10.1109/INFCOM.2013.6566776</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2013) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20130207-073335417">On Secure Network Coding With Nonuniform or Restricted Wiretap Sets</a>; IEEE Transactions on Information Theory; Vol. 59; No. 1; 166-176; <a href="https://doi.org/10.1109/TIT.2012.2216936">10.1109/TIT.2012.2216936</a></li> <li>Cui, Tao and Kliewer, Jörg, el al. (2012) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20130116-102514916">Communication Protocols for N-way All-Cast Relay Networks</a>; IEEE Transactions on Communications; Vol. 60; No. 11; 3239-3251; <a href="https://doi.org/10.1109/TCOMM.2012.080212.110395">10.1109/TCOMM.2012.080212.110395</a></li> <li>Dikaliotis, Theodoros K. and Yao, Hongyi, el al. (2012) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20130731-073911147">Network Equivalence in the Presence of an Eavesdropper</a>; ISBN 978-1-4673-4537-8; 2012 50th Annual Allerton Conference on Communication, Control, and Computing; 960-967; <a href="https://doi.org/10.1109/Allerton.2012.6483322">10.1109/Allerton.2012.6483322</a></li> <li>Chen, Lijun and Ho, Tracey, el al. (2012) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20121008-112913029">Congestion Control for Multicast Flows With Network Coding</a>; IEEE Transactions on Information Theory; Vol. 58; No. 9; 5908-5921; <a href="https://doi.org/10.1109/TIT.2012.2204170">10.1109/TIT.2012.2204170</a></li> <li>Dikaliotis, Theodoros K. and Yao, Hongyi, el al. (2012) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20120907-074616471">Low-Complexity Near-Optimal Codes for Gaussian Relay Networks</a>; ISBN 978-1-4673-2013-9; 2012 International Conference on Signal Processing and Communications (SPCOM); 1-5; <a href="https://doi.org/10.1109/SPCOM.2012.6290236">10.1109/SPCOM.2012.6290236</a></li> <li>Leong, Derek and Dimakis, Alexandros G., el al. (2012) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20120716-093559713">Distributed Storage Allocations</a>; IEEE Transactions on Information Theory; Vol. 58; No. 7; 4733-4752; <a href="https://doi.org/10.1109/TIT.2012.2191135">10.1109/TIT.2012.2191135</a></li> <li>Leong, Derek and Ho, Tracey (2012) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20120828-151414949">Erasure Coding for Real-Time Streaming</a>; ISBN 978-1-4673-2580-6; 2012 IEEE International Symposium on Information Theory Proceedings (ISIT); 289-293; <a href="https://doi.org/10.1109/ISIT.2012.6284055">10.1109/ISIT.2012.6284055</a></li> <li>Cui, Tao and Chen, Lijun, el al. (2012) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20120619-082839926">Distributed Distortion Optimization for Correlated Sources with Network Coding</a>; IEEE Transactions on Communications; Vol. 60; No. 5; 1336-1344; <a href="https://doi.org/10.1109/TCOMM.2012.032012.100791">10.1109/TCOMM.2012.032012.100791</a></li> <li>Tekin, Ömer Faruk and Ho, Tracey, el al. (2012) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170201-145713012">On erasure correction coding for streaming</a>; ISBN 978-1-4673-1472-5; 2012 Information Theory and Applications Workshop; 221-226; <a href="https://doi.org/10.1109/ITA.2012.6181798">10.1109/ITA.2012.6181798</a></li> <li>Tekin, Ömer Faruk and Vyetrenko, Svitlana, el al. (2011) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170208-174937818">Erasure correction for nested receivers</a>; ISBN 978-1-4577-1818-2; 49th Annual Allerton Conference on Communication, Control, and Computing; 1454-1461; <a href="https://doi.org/10.1109/Allerton.2011.6120339">10.1109/Allerton.2011.6120339</a></li> <li>Yao, Hongyi and Ho, Tracey (2011) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170223-131434715">Privacy preserving data aggregating with multiple access channel</a>; ISBN 978-1-4577-1818-2; 49th Annual Allerton Conference on Communication, Control, and Computing; 1809-1815; <a href="https://doi.org/10.1109/Allerton.2011.6120388">10.1109/Allerton.2011.6120388</a></li> <li>Yao, Hongyi and Ho, Tracey, el al. (2011) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20120405-094455952">On the Equivalence of Shannon Capacity and Stable Capacity in Networks with Memoryless Channels</a>; ISBN 978-1-4577-0596-0; 2011 IEEE International Symposium on Information Theory Proceedings; 503-507; <a href="https://doi.org/10.1109/ISIT.2011.6034178">10.1109/ISIT.2011.6034178</a></li> <li>Leong, Derek and Dimakis, Alexandros G., el al. (2011) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20120406-091523956">Distributed Storage Allocations for Optimal Delay</a>; ISBN 978-1-4577-0596-0; 2011 IEEE International Symposium on Information Theory Proceedings; 1447-1451; <a href="https://doi.org/10.1109/ISIT.2011.6033779">10.1109/ISIT.2011.6033779</a></li> <li>Bakshi, Mayank and Effros, Michelle, el al. (2011) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20120406-092406435">On Equivalence for Networks of Noisy Channels under Byzantine Attacks</a>; ISBN 978-1-4577-0596-0; 2011 IEEE International Symposium on Information Theory Proceedings; 973-977; <a href="https://doi.org/10.1109/ISIT.2011.6034284">10.1109/ISIT.2011.6034284</a></li> <li>Yao, Hongyi and Ho, Tracey (2011) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20120109-100003943">Error Estimating Codes with Constant Overhead: A Random Walk Approach</a>; ISBN 978-1-61284-233-2; 2011 IEEE International Conference on Communications (ICC); 1-5; <a href="https://doi.org/10.1109/icc.2011.5963049">10.1109/icc.2011.5963049</a></li> <li>Ho, Tracey and Jaggi, Sidharth, el al. (2011) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20120405-100929836">Universal and Robust Distributed Network Codes</a>; ISBN 978-1-4244-9919-9; 2011 IEEE Infocom Conference Proceedings; 766-774; <a href="https://doi.org/10.1109/INFCOM.2011.5935297">10.1109/INFCOM.2011.5935297</a></li> <li>Ho, Tracey and Kim, Sukwon, el al. (2011) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170308-155527646">On network error correction with limited feedback capacity</a>; ISBN 978-1-4577-0361-4; 2011 Information Theory and Applications Workshop; <a href="https://doi.org/10.1109/ITA.2011.5743579">10.1109/ITA.2011.5743579</a></li> <li>Dikaliotis, Theodoros K. and Ho, Tracey, el al. (2011) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20110314-145005157">Multiple-Access Network Information-Flow and Correction Codes</a>; IEEE Transactions on Information Theory; Vol. 57; No. 2; 1067-1079; <a href="https://doi.org/10.1109/TIT.2010.2095130">10.1109/TIT.2010.2095130</a></li> <li>Kim, Sukwon and Ho, Tracey, el al. (2011) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20110316-153639993">Network Error Correction With Unequal Link Capacities</a>; IEEE Transactions on Information Theory; Vol. 57; No. 2; 1144-1164; <a href="https://doi.org/10.1109/TIT.2010.2095090">10.1109/TIT.2010.2095090</a></li> <li>Vyetrenko, Svitlana and Ho, Tracey, el al. (2010) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170316-132954207">Outer bounds on the error correction capacity region for non-multicast networks</a>; ISBN 978-1-4244-8216-0; 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton); 867-874; <a href="https://doi.org/10.1109/ALLERTON.2010.5706999">10.1109/ALLERTON.2010.5706999</a></li> <li>Leong, Ben and Wang, Youming, el al. (2010) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20161122-143227109">Improving peer-to-peer file distribution: winner doesn't have to take all</a>; ISBN 978-1-4503-0195-4; APSys '10 Proceedings of the first ACM asia-pacific workshop on Workshop on systems; 55-60; <a href="https://doi.org/10.1145/1851276.1851289">10.1145/1851276.1851289</a></li> <li>Yao, Hongyi and Dikaliotis, Theodoros K., el al. (2010) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170314-152947986">Multi-source operator channels: Efficient capacity-achieving codes</a>; ISBN 978-1-4244-8264-1; 2010 IEEE Information Theory Workshop; <a href="https://doi.org/10.1109/CIG.2010.5592812">10.1109/CIG.2010.5592812</a></li> <li>Dikaliotis, Theodoros K. and Dimakis, Alexandros, el al. (2010) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20140529-141715127">On the Delay Advantage of Coding in Packet Erasure Networks</a>; ISBN 978-1-4244-8262-7; 2010 IEEE Information Theory Workshop (ITW); 1-5; <a href="https://doi.org/10.1109/CIG.2010.5592713">10.1109/CIG.2010.5592713</a></li> <li>Cui, Tao and Chen, Lijun, el al. (2010) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100520-142930645">On distributed scheduling in wireless networks exploiting broadcast and network coding</a>; IEEE Transactions on Communications; Vol. 58; No. 4; 1223-1234; <a href="https://doi.org/10.1109/TCOMM.2010.04.080564">10.1109/TCOMM.2010.04.080564</a></li> <li>Zhang, Li and Cui, Tao, el al. (2010) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20091224-092459953">Power scheduling of distributed estimation in sensor networks with repetition coding</a>; Signal Processing; Vol. 90; No. 3; 946-951; <a href="https://doi.org/10.1016/j.sigpro.2009.07.032">10.1016/j.sigpro.2009.07.032</a></li> <li>Kim, Sukwon and Ho, Tracey, el al. (2010) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100805-081437710">Network error correction with unequal link capacities</a>; ISBN 978-1-4244-5870-7; 47th Annual Allerton Conference on Communication, Control and Computing; 1387-1394; <a href="https://doi.org/10.1109/ALLERTON.2009.5394512">10.1109/ALLERTON.2009.5394512</a></li> <li>Dikaliotis, Theodoros K. and Dimakis, Alexandros G., el al. (2010) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20110329-162952462">Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits</a>; ISBN 978-1-4244-7891-0; 2010 IEEE International Symposium on Information Theory; 1948-1952; <a href="https://doi.org/10.1109/ISIT.2010.5513354">10.1109/ISIT.2010.5513354</a></li> <li>Leong, Derek and Dimakis, Alexandros G., el al. (2010) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20110406-104359419">Symmetric Allocations for Distributed Storage</a>; ISBN 978-1-4244-5638-3; 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010); 1-6; <a href="https://doi.org/10.1109/GLOCOM.2010.5683962">10.1109/GLOCOM.2010.5683962</a></li> <li>Vyetrenko, Svitlana and Khosla, Aditya, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170328-174035672">On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack</a>; ISBN 978-1-4244-5827-1; 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers; 788-792; <a href="https://doi.org/10.1109/ACSSC.2009.5469966">10.1109/ACSSC.2009.5469966</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20091104-153456802">Memoryless relay strategies for two-way relay channels</a>; IEEE Transactions on Communications; Vol. 57; No. 10; 3132-3143; <a href="https://doi.org/10.1109/TCOMM.2009.10.080222">10.1109/TCOMM.2009.10.080222</a></li> <li>Vyetrenko, Svitlana and Ho, Tracey, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100816-140417790">On noncoherent correction of network errors and erasures with random locations</a>; ISBN 978-1-4244-4312-3; ISIT 2009; 996-1000; <a href="https://doi.org/10.1109/ISIT.2009.5205602">10.1109/ISIT.2009.5205602</a></li> <li>Dikaliotis, Theodoros K. and Dimakis, Alexandros G., el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100816-110713053">On the delay of network coding over line networks</a>; ISBN 978-1-4244-4312-3; ISIT 2009; 1408-1412; <a href="https://doi.org/10.1109/ISIT.2009.5205897">10.1109/ISIT.2009.5205897</a></li> <li>Vyetrenko, Svitlana and Ho, Tracey, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100816-135601648">Rate regions for coherent and noncoherent multisource network error correction</a>; ISBN 978-1-4244-4312-3; ISIT 2009; 1001-1005; <a href="https://doi.org/10.1109/ISIT.2009.5206077">10.1109/ISIT.2009.5206077</a></li> <li>Chang, Christopher S. and Ho, Tracey, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100722-131717463">On robust network coding subgraph construction under uncertainty</a>; ISBN 978-1-4244-2940-0; Conference record of the 42nd Asilomar Conference on Signals, Systems and Computers; 2211-2215; <a href="https://doi.org/10.1109/ACSSC.2008.5074828">10.1109/ACSSC.2008.5074828</a></li> <li>Kim, Sukwon and Ho, Tracey, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100716-091516848">Network coding with periodic recomputation for minimum energy multicasting in mobile ad-hoc networks</a>; ISBN 978-1-4244-2925-7; 46th annual Allerton Conference on Communication, Control, and Computing; 154-161; <a href="https://doi.org/10.1109/ALLERTON.2008.4797549">10.1109/ALLERTON.2008.4797549</a></li> <li>Kim, Sukwon and Effros, Michelle, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100716-104652225">Distributed design of network codes for wireless multiple unicasts</a>; ISBN 978-1-4244-2925-7; 46th annual Allerton Conference on Communication, Control, and Computing; 324-331; <a href="https://doi.org/10.1109/ALLERTON.2008.4797575">10.1109/ALLERTON.2008.4797575</a></li> <li>Zhang, Li and Cui, Tao, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100511-151403304">Optimal Quantization in Energy-Constrained Sensor Networks under Imperfect Transmission</a>; ISBN 9781424427338; 43rd Annual Conference on Information Sciences and Systems, 2009. CISS 2009; 613-617; <a href="https://doi.org/10.1109/CISS.2009.5054792">10.1109/CISS.2009.5054792</a></li> <li>Ho, Tracey and Viswanathan, Harish (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20090806-074929936">Dynamic algorithms for multicast with intra-session network coding</a>; IEEE Transactions on Information Theory; Vol. 55; No. 2; 797-815; <a href="https://doi.org/10.1109/TIT.2008.2009809">10.1109/TIT.2008.2009809</a></li> <li>Cui, Tao and Gao, Feifei, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20090514-153538553">Distributed space-time coding for two-way wireless relay networks</a>; IEEE Transactions on Signal Processing; Vol. 57; No. 2; 658-671; <a href="https://doi.org/10.1109/TSP.2008.2009025">10.1109/TSP.2008.2009025</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100816-100837500">Achievable rate and optimal physical layer rate allocation in interference-free wireless networks</a>; ISBN 978-1-4244-4312-3; ISIT 2009; 2674-2678; <a href="https://doi.org/10.1109/ISIT.2009.5205903">10.1109/ISIT.2009.5205903</a></li> <li>Leong, Derek and Ho, Tracey, el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100510-112135867">Optimal content delivery with network coding</a>; ISBN 978-1-4244-2733-8; Information Sciences and Systems, 2009; 414-419; <a href="https://doi.org/10.1109/CISS.2009.5054756">10.1109/CISS.2009.5054756</a></li> <li>Cui, Tao and Ho, Tracey (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100816-095201318">On multiple access random medium access control</a>; ISBN 978-1-4244-4312-3; ISIT 2009; 1869-1873; <a href="https://doi.org/10.1109/ISIT.2009.5205457">10.1109/ISIT.2009.5205457</a></li> <li>Avestimehr, A. Salman and Ho, Tracey (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100510-105350270">Approximate capacity of the symmetric half-duplex Gaussian butterfly network</a>; ISBN 978-1-4244-4535-6; Networking and Information Theory, 2009; 311-315; <a href="https://doi.org/10.1109/ITWNIT.2009.5158593">10.1109/ITWNIT.2009.5158593</a></li> <li>Leong, Derek and Dimakis, Alexandros G., el al. (2009) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100510-112640133">Distributed Storage Allocation Problems</a>; ISBN 978-1-4244-4723-7; Network Coding, Theory, and Applications, 2009; 86-91; <a href="https://doi.org/10.1109/NETCOD.2009.5191399">10.1109/NETCOD.2009.5191399</a></li> <li>Ephremides, Anthony and Jaggi, Sidharth, el al. (2008) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20091224-082815709">Network Coding</a>; Journal of Communications and Networks; Vol. 10; No. 4; 367-370</li> <li>Erez, Elona and Effros, Michelle, el al. (2008) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170404-165519201">Network codes with deadlines</a>; ISBN 978-1-4244-2925-7; 46th Annual Allerton Conference on Communication, Control, and Computing; 339-346; <a href="https://doi.org/10.1109/ALLERTON.2008.4797577">10.1109/ALLERTON.2008.4797577</a></li> <li>Gu, WeiHsin and Koetter, Ralf, el al. (2008) <a href="https://resolver.caltech.edu/CaltechAUTHORS:GUWisit07">On Source Coding with Coded Side Information for a Binary Source with Binary Side Information</a>; ISBN 978-1-4244-1397-3; IEEE International Symposium on Information Theory (ISIT 2007), Nice France, 24-29 June 2007; 1456-1460; <a href="https://doi.org/10.1109/ISIT.2007.4557427">10.1109/ISIT.2007.4557427</a></li> <li>Jaggi, Sidharth and Langberg, Michael, el al. (2008) <a href="https://resolver.caltech.edu/CaltechAUTHORS:JAGieeetit08">Resilient Network Coding in the Presence of Byzantine Adversaries</a>; IEEE Transactions on Information Theory; Vol. 54; No. 6; 2596-2603; <a href="https://doi.org/10.1109/TIT.2008.921711">10.1109/TIT.2008.921711</a></li> <li>Ho, Tracey and Leong, Ben, el al. (2008) <a href="https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit08">Byzantine Modification Detection in Multicast Networks With Random Network Coding</a>; IEEE Transactions on Information Theory; Vol. 54; No. 6; 2798-2803; <a href="https://doi.org/10.1109/TIT.2008.921894">10.1109/TIT.2008.921894</a></li> <li>Cui, Tao and Chen, Lijun, el al. (2008) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100707-141558183">Energy Efficient Opportunistic Network Coding for Wireless Networks</a>; ISBN 978-1-4244-2025-4; IEEE INFOCOM 2008 : the 27th Conference on Computer Communications : [April 13-18, 2008, Phoenix, Arizona; 1022-1030; <a href="https://doi.org/10.1109/INFOCOM.2008.81">10.1109/INFOCOM.2008.81</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2008) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170418-174812677">Some results on relay strategies for memoryless two-way relay channels</a>; ISBN 978-1-4244-2670-6; 2008 Information Theory and Applications Workshop; 158-164; <a href="https://doi.org/10.1109/ITA.2008.4601042">10.1109/ITA.2008.4601042</a></li> <li>Ho, Tracey and Lun, Desmond (2008) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20180809-095044148">Network Coding: an introduction</a>; ISBN 9780511754623; <a href="https://doi.org/10.1017/cbo9780511754623">10.1017/cbo9780511754623</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2008) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20110407-113333118">Space-Time Communication Protocols for N-way Relay Networks</a>; ISBN 978-1-4244-2324-8; 2008 IEEE Global Telecommunications Conference; 1-5; <a href="https://doi.org/10.1109/GLOCOM.2008.ECP.205">10.1109/GLOCOM.2008.ECP.205</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2008) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100629-080753182">Memoryless Relay Strategies for Two-Way Relay Channels: Performance Analysis and Optimization</a>; ISBN 978-1-4244-2074-2; 2008 IEEE International Conference on Communications; 1139-1143; <a href="https://doi.org/10.1109/ICC.2008.222">10.1109/ICC.2008.222</a></li> <li>Han, Keesook and Ho, Tracey, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170420-135023438">On network coding for security</a>; ISBN 978-1-4244-1512-0; MILCOM 2007 - IEEE Military Communications Conference; <a href="https://doi.org/10.1109/MILCOM.2007.4454907">10.1109/MILCOM.2007.4454907</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100909-133322426">Statistical Pruning for Near Maximum Likelihood Detection of MIMO Systems</a>; ISBN 978-1-4244-0352-3; 2007 IEEE International Conference on Communications; 5462-5467; <a href="https://doi.org/10.1109/ICC.2007.905">10.1109/ICC.2007.905</a></li> <li>Kliewer, Jörg and Dikaliotis, Thedoros, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170420-133141763">On the Performance of Joint and Separate Channel and Network Coding in Wireless Fading Networks</a>; ISBN 978-1-4244-1199-3; 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks; <a href="https://doi.org/10.1109/ITWITWN.2007.4318067">10.1109/ITWITWN.2007.4318067</a></li> <li>Mehyar, Mortada and Gu, WeiHsin, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:MEHicassp07">Optimal Strategies for Efficient Peer-to-Peer File Sharing</a>; ISBN 1-4244-0728-1; IEEE International Conference on Acoustics, Speech and Signal Processing, (ICASSP 2007), Honolulu, HI, 15-20 April 2007; IV-1337; <a href="https://doi.org/10.1109/ICASSP.2007.367325">10.1109/ICASSP.2007.367325</a></li> <li>Cui, Tao and Ho, Tracey (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170425-161810594">Minimum Cost Integral Network Coding</a>; ISBN 978-1-4244-1397-3; 2007 IEEE International Symposium on Information Theory; 2736-2740; <a href="https://doi.org/10.1109/ISIT.2007.4557632">10.1109/ISIT.2007.4557632</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170425-162520744">On Distributed Distortion Optimization for Correlated Sources</a>; ISBN 978-1-4244-1397-3; 2007 IEEE International Symposium on Information Theory; 2731-2735; <a href="https://doi.org/10.1109/ISIT.2007.4557631">10.1109/ISIT.2007.4557631</a></li> <li>Cui, Tao and Chen, Lijun, el al. (2007) <a href="https://resolver.caltech.edu/CaltechCSTR:2007.003">Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks</a>; <a href="https://doi.org/10.7907/Z9G73BP6">10.7907/Z9G73BP6</a></li> <li>Bodas, Shreeshankar and Grubb, Jared, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170425-143555263">Network With Costs: Timing and Flow Decomposition</a>; ISBN 978-1-4244-0960-0; 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops; <a href="https://doi.org/10.1109/WIOPT.2007.4480102">10.1109/WIOPT.2007.4480102</a></li> <li>Cui, Tao and Chen, Lijun, el al. (2007) <a href="https://resolver.caltech.edu/CaltechCSTR:2007.002">Distributed Optimization in Wireless Networks Using Broadcast Advantage</a>; <a href="https://doi.org/10.7907/Z9BK19BR">10.7907/Z9BK19BR</a></li> <li>Cui, Tao and Chen, Lijun, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100827-112133009">Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks</a>; ISBN 978-1-4244-1454-3; Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on; 664-674; <a href="https://doi.org/10.1109/MOBHOC.2007.4428675">10.1109/MOBHOC.2007.4428675</a></li> <li>Cui, Tao and Chen, Lijun, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100827-084745453">Distributed optimization in wireless networks using broadcast advantage</a>; ISBN 978-1-4244-1497-0; 46th IEEE Conference on Decision and Control; 5839-5844; <a href="https://doi.org/10.1109/CDC.2007.4434958">10.1109/CDC.2007.4434958</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100826-151540718">Distributed minimum cost multicasting with lossless source coding and network coding</a>; ISBN 978-1-4244-1497-0; 46th IEEE Conference on Decision and Control; 5853-5858; <a href="https://doi.org/10.1109/CDC.2007.4434962">10.1109/CDC.2007.4434962</a></li> <li>Chen, Lijun and Ho, Tracey, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100826-092317616">Optimization Based Rate Control for Multicast with Network Coding</a>; ISBN 978-1-4244-1046-0; INFOCOM 2007; 1163-1171; <a href="https://doi.org/10.1109/INFCOM.2007.139">10.1109/INFCOM.2007.139</a></li> <li>Cui, Tao and Chen, Lijun, el al. (2007) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20100827-082408080">Optimization based rate control for multicast with network coding: A multipath formulation</a>; ISBN 978-1-4244-1497-0; 46th IEEE Conference on Decision and Control; 5841-5846; <a href="https://doi.org/10.1109/CDC.2007.4434960">10.1109/CDC.2007.4434960</a></li> <li>Ho, Tracey and Médard, Muriel, el al. (2006) <a href="https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit06">A Random Linear Network Coding Approach to Multicast</a>; IEEE Transactions on Information Theory; Vol. 52; No. 10; 4413-4430; <a href="https://doi.org/10.1109/TIT.2006.881746">10.1109/TIT.2006.881746</a></li> <li>Chen, Lijun and Ho, Tracey, el al. (2006) <a href="https://resolver.caltech.edu/CaltechCDSTR:2006.004">Rate Control for Multicast with Network Coding</a></li> <li>Jin, Jia-Qi and Ho, Tracey, el al. (2006) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170503-172212389">Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks</a>; ISBN 1-4244-0505-X; 2006 IEEE International Symposium on Information Theory; 197-201; <a href="https://doi.org/10.1109/ISIT.2006.261832">10.1109/ISIT.2006.261832</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2006) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170515-163823021">Linear Programming Detection and Decoding for MIMO Systems</a>; ISBN 1-4244-0505-X; 2006 IEEE International Symposium on Information Theory; 1783-1787; <a href="https://doi.org/10.1109/ISIT.2006.261741">10.1109/ISIT.2006.261741</a></li> <li>Effros, Michelle and Ho, Tracey, el al. (2006) <a href="https://resolver.caltech.edu/CaltechAUTHORS:EFFitw06">A tiling approach to network code design for wireless networks</a>; ISBN 1-4244-0035-X; IEEE Information Theory Workshop (ITW '06), Punta del Este, Uruguay, 13-17 March, 2006; 62-66; <a href="https://doi.org/10.1109/ITW.2006.1633782">10.1109/ITW.2006.1633782</a></li> <li>Lun, Desmond S. and Ratnakar, Niranjan, el al. (2006) <a href="https://resolver.caltech.edu/CaltechAUTHORS:LUNieeetit06">Minimum-cost multicast over coded packet networks</a>; IEEE Transactions on Information Theory; Vol. 52; No. 6; 2608-2623; <a href="https://doi.org/10.1109/TIT.2006.874523">10.1109/TIT.2006.874523</a></li> <li>Ho, Tracey and Jin, Jia-Qi (2006) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20140928-225407828">On network coding and routing in dynamic wireless multicast networks</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2006) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20110506-105351004">Heuristic Tree Search for Detection and Decoding of Uncoded and Linear Block Coded Communication Systems</a>; ISBN 978-1-4244-0354-7; 2006 IEEE International Conference on Communications; 391-396; <a href="https://doi.org/10.1109/ICC.2006.254759">10.1109/ICC.2006.254759</a></li> <li>Cui, Tao and Ho, Tracey, el al. (2006) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20110506-104232997">Polynomial Moment Relaxation for MIMO Detection</a>; ISBN 978-1-4244-0354-7; 2006 IEEE International Conference on Communications; 3129-3134; <a href="https://doi.org/10.1109/ICC.2006.255286">10.1109/ICC.2006.255286</a></li> <li>Ho, Tracey and Leong, Ben, el al. (2005) <a href="https://resolver.caltech.edu/CaltechAUTHORS:HOTiwwan04">On the utility of network coding in dynamic environments</a>; ISBN 0-7803-8275-7; International Workshop on Wireless Ad-Hoc Networks, Oulu, Finald, May 31-June 3, 2004; 196-200; <a href="https://doi.org/10.1109/IWWAN.2004.1525570">10.1109/IWWAN.2004.1525570</a></li> <li>Ho, Tracey and Leong, Ben, el al. (2005) <a href="https://resolver.caltech.edu/CaltechAUTHORS:HOTisit05">Network monitoring in multicast networks using network coding</a>; ISBN 0-7803-9151-9; IEEE International Symposium on Information Theory (ISIT '05), Adelaide, Australia, 4-9 September 2005; 1977-1981; <a href="https://doi.org/10.1109/ISIT.2005.1523691">10.1109/ISIT.2005.1523691</a></li> <li>Jaggi, Sidharth and Langberg, Michael, el al. (2005) <a href="https://resolver.caltech.edu/CaltechAUTHORS:JAGisit05">Correction of adversarial errors in networks</a>; ISBN 0-7803-9151-9; International Symposium on Information Theory (ISIT 2005), Adelaide, South Australia, Australia, 4-9 September 2005; 1455-1459; <a href="https://doi.org/10.1109/ISIT.2005.1523584">10.1109/ISIT.2005.1523584</a></li> <li>Ho, Tracey and Médard, Muriel, el al. (2005) <a href="https://resolver.caltech.edu/CaltechAUTHORS:HOTieeetit05">An information-theoretic view of network management</a>; IEEE Transactions on Information Theory; Vol. 51; No. 4; 1295-1312; <a href="https://doi.org/10.1109/TIT.2005.844062">10.1109/TIT.2005.844062</a></li> <li>Ho, Tracey and Leong, Ben, el al. (2005) <a href="https://resolver.caltech.edu/CaltechAUTHORS:HOTisit04">Byzantine modification detection in multicast networks using randomized network coding</a>; ISBN 0-7803-8280-3; IEEE International Symposium on Information Theory (ISIT '04), Chicago, IL, 27 June-2 July 2004; 143; <a href="https://doi.org/10.1109/ISIT.2004.1365180">10.1109/ISIT.2004.1365180</a></li> <li>Ho, Tracey and Koetter, Ralf, el al. (2003) <a href="https://resolver.caltech.edu/CaltechAUTHORS:HOTisit03a">The benefits of coding over routing in a randomized setting</a>; ISBN 0-7803-7728-1; IEEE International Symposium on Information Theory (ISIT '04), Chicago, IL, 27 June-2 July, 2004; 442; <a href="https://doi.org/10.1109/ISIT.2003.1228459">10.1109/ISIT.2003.1228459</a></li> <li>Ho, Tracey and Karger, David R., el al. (2003) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20111014-145416422">Network coding from a network flow perspective</a>; ISBN 0-7803-7728-1; 2003 IEEE International Symposium on Information Theory; 441-441; <a href="https://doi.org/10.1109/ISIT.2003.1228458">10.1109/ISIT.2003.1228458</a></li> <li>Ho, Tracey and Médard, Muriel, el al. (2003) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20111005-132747410">An information theoretic view of network management</a>; ISBN 0-7803-7752-4; IEEE INFOCOM 2003 : the conference on computer communications; 1456-1466; <a href="https://doi.org/10.1109/INFCOM.2003.1208981">10.1109/INFCOM.2003.1208981</a></li> <li>Effros, Michelle and Médard, Muriel, el al. (2003) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150210-075301992">Linear network codes: A unified framework for source, channel, and network coding</a>; ISBN 0821834673; Advances in Network Information Theory; 197-216</li> <li>Ho, Tracey and Médard, Muriel, el al. (2002) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20111019-141653699">A coding view of network recovery and management</a>; ISBN 0-7803-7501-7; 2002 IEEE International Symposium on Information Theory; 137-137; <a href="https://doi.org/10.1109/ISIT.2002.1023409">10.1109/ISIT.2002.1023409</a></li> </ul>