Minimizing age-of-information with throughput requirements in multi-path network communication

Q Liu, H Zeng, M Chen - Proceedings of the Twentieth ACM International …, 2019 - dl.acm.org
We consider the scenario where a sender periodically sends a batch of data to a receiver
over a multi-hop network, possibly using multiple paths. Our objective is to minimize …

Optimal learning rate of sending one bit over arbitrary acyclic BISO-channel networks

CC Wang, DJ Love - 2023 IEEE International Symposium on …, 2023 - ieeexplore.ieee.org
This work considers the problem of sending a 1-bit message over an acyclic network, where
the “edge” connecting any two nodes is a memoryless binary-input/symmetric-output (BISO) …

Network coding gaps for completion times of multiple unicasts

B Haeupler, D Wajc, G Zuzic - 2020 IEEE 61st Annual …, 2020 - ieeexplore.ieee.org
We study network coding gaps for the problem of makespan minimization of multiple
unicasts. In this problem distinct packets at different nodes in a network need to be delivered …

On multi-hop short-packet communications: Recoding or end-to-end fountain coding?

Y Li, B Tang, J Wang, Z Bao - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
This paper compares the end-to-end (E2E) fountain codes and random linear network
coding (RLNC) for lossy multi-hop short-packet communications, under the constraint that …

[PDF][PDF] Broadcast CONGEST algorithms against eavesdroppers

Y Hitron, M Parter, E Yogev - 36th International Symposium on …, 2022 - drops.dagstuhl.de
An eavesdropper is a passive adversary that aims at extracting private information on the
input and output values of the network's participants, by listening to the traffic exchanged …

Exploiting parallelism with random linear network coding in high-speed ethernet systems

A Engelmann, W Bziuk, A Jukan… - IEEE/ACM Transactions …, 2018 - ieeexplore.ieee.org
Parallelism has become one of the key architectural features in 40-/100-/400-Gb Ethernet
multi lane distribution (MLD) standards. The MLD packetizes and distributes traffic …

The two-unicast problem

S Kamath, V Anantharam, D Tse… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We consider the communication capacity of wireline networks for a two-unicast traffic
pattern. The network has two sources and two destinations with each source communicating …

Sequentially mixing randomly arriving packets improves channel dispersion over block-based designs

PW Su, YC Huang, SC Lin, IH Wang… - … on Information Theory …, 2022 - ieeexplore.ieee.org
Channel dispersion quantifies the convergence speed of coding rate to channel capacity
under different latency constraints. Under the setting of packet erasure channels (PECs) with …

Delay-constrained unicast and the triangle-cast problem

C Chekuri, S Kamath, S Kannan… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
We consider the single-unicast communication problem in a network with a delay constraint.
For this setting, it has recently been shown that network coding offers an advantage over …

Tight network topology dependent bounds on rounds of communication

A Chattopadhyay, M Langberg, S Li, A Rudra - Proceedings of the Twenty …, 2017 - SIAM
We prove tight network topology dependent bounds on the round complexity of computing
well studied k-party functions such as set disjointness and element distinctness. Unlike the …