Wireless network coding: Opportunities & challenges

C Fragouli, D Katabi, A Markopoulou… - MILCOM 2007-IEEE …, 2007 - ieeexplore.ieee.org
Wireless networks suffer from a variety of unique problems such as low throughput, dead
spots, and inadequate support for mobility. However, their characteristics such as the …

[图书][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Resilient asymptotic consensus in robust networks

HJ LeBlanc, H Zhang, X Koutsoukos… - IEEE Journal on …, 2013 - ieeexplore.ieee.org
This paper addresses the problem of resilient in-network consensus in the presence of
misbehaving nodes. Secure and fault-tolerant consensus algorithms typically assume …

[引用][C] Information theory and network coding

RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …

Coding for errors and erasures in random network coding

R Koetter, FR Kschischang - IEEE Transactions on Information …, 2008 - ieeexplore.ieee.org
The problem of error-control in random linear network coding is considered. A “noncoherent”
or “channel oblivious” model is assumed where neither transmitter nor receiver is assumed …

Resilient output regulation in heterogeneous networked systems under Byzantine agents

J Yan, C Deng, C Wen - Automatica, 2021 - Elsevier
In this paper, we consider the problem of output regulation in heterogeneous networked
systems. In order to cooperatively achieve the global objective, each agent is required to …

Trading structure for randomness in wireless opportunistic routing

S Chachulski, M Jennings, S Katti… - ACM SIGCOMM Computer …, 2007 - dl.acm.org
Opportunistic routing is a recent technique that achieves high throughput in the face of lossy
wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing …

Distributed function calculation via linear iterative strategies in the presence of malicious agents

S Sundaram, CN Hadjicostis - IEEE Transactions on Automatic …, 2010 - ieeexplore.ieee.org
Given a network of interconnected nodes, each with its own value (such as a measurement,
position, vote, or other data), we develop a distributed strategy that enables some or all of …

Linear network coding: Theory and algorithms

SYR Li, QT Sun, Z Shao - Proceedings of the IEEE, 2011 - ieeexplore.ieee.org
Network coding is a new paradigm in data transport that combines coding with data
propagation over a network. Theory of linear network coding (LNC) adopts a linear coding …

A rank-metric approach to error control in random network coding

D Silva, FR Kschischang… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
The problem of error control in random linear network coding is addressed from a matrix
perspective that is closely related to the subspace perspective of KÖtter and Kschischang. A …