[引用][C] Information theory and network coding

RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …

[PDF][PDF] Network Coding Fundamentals

C Fragouli - 2007 - infoscience.epfl.ch
Network coding is an elegant and novel technique introduced at the turn of the millennium to
improve network throughput and performance. It is expected to be a critical technology for …

[PDF][PDF] 网络编码的研究进展

杨林[1, 郑刚, 胡晓惠 - 计算机研究与发展, 2008 - researchgate.net
摘要网络编码允许网络节点在传统数据转发的基础上参与数据处理, 已成为提高网络吞吐量,
鲁棒性和安全性的有效方法. 在介绍网络编码基本原理的基础上, 比较了集中式和分布式网络 …

Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection

Y Fu, Z Lin - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
It is generally believed to be a tedious, time consuming, and error-prone process to develop
a virtual machine introspection (VMI) tool manually because of the semantic gap. Recent …

Comprehensive view of a live network coding P2P system

C Gkantsidis, J Miller, P Rodriguez - Proceedings of the 6th ACM …, 2006 - dl.acm.org
In this paper we present the first implementation of a P2P content distribution system that
uses Network Coding. Using results from live trials with several hundred nodes, we provide …

An efficient privacy-preserving scheme against traffic analysis attacks in network coding

Y Fan, Y Jiang, H Zhu, X Shen - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
Privacy threat is one of the critical issues in network coding, where attacks such as traffic
analysis can be easily launched by a malicious adversary once enough encoded packets …

ER: Efficient retransmission scheme for wireless LANs

E Rozner, AP Iyer, Y Mehta, L Qiu, M Jafry - Proceedings of the 2007 …, 2007 - dl.acm.org
Wireless LANs (WLANs) have been deployed at a remarkable rate at university campuses,
office buildings, airports, hotels, and malls. Providing efficient and reliable wireless …

Multivariate mutual information inspired by secret-key agreement

C Chan, A Al-Bashabsheh, JB Ebrahimi… - Proceedings of the …, 2015 - ieeexplore.ieee.org
The capacity for multiterminal secret-key agreement inspires a natural generalization of
Shannon's mutual information from two random variables to multiple random variables …

[PDF][PDF] Anatomy of a P2P Content Distribution system with Network Coding.

C Gkantsidis, JL Miller, P Rodriguez - IPTPS, 2006 - iptps06.cs.ucsb.edu
Anatomy of a P2P Content Distribution System with Network Coding Page 1 Anatomy of a
P2P Content Distribution System with Network Coding Christos Gkantsidis, John Miller, and …

Network coding based privacy preservation against traffic analysis in multi-hop wireless networks

Y Fan, Y Jiang, H Zhu, J Chen… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Privacy threat is one of the critical issues in multi-hop wireless networks, where attacks such
as traffic analysis and flow tracing can be easily launched by a malicious adversary due to …