default search action
NetCod 2013: Calgary, AB, Canada
- International Symposium on Network Coding, NetCod 2013, Calgary, AB, Canada, June 7-9, 2013. IEEE 2013, ISBN 978-1-4799-0821-9
- Congduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber:
A new computational approach for determining rate regions and optimal codes for coded networks. 1-6 - Sreechakra Goparaju, Salim El Rouayheb, A. Robert Calderbank, H. Vincent Poor:
Data secrecy in distributed storage systems under exact repair. 1-6 - Tang Xiahou, Zongpeng Li, Chuan Wu:
Information multicast in (pseudo-)planar networks: Efficient network coding over small finite fields. 1-6 - Zijun Zhang, Zhenkun Jin, Xiaoxi Zhang:
Min-cost wireless multihop networks in Euclidean space. 1-6 - Neda Aboutorab, Sameh Sorour, Parastoo Sadeghi:
O2-GIDNC: Beyond instantly decodable network coding. 1-6 - Muxi Yan, Alex Sprintson:
Algorithms for weakly secure data exchange. 1-6 - Viveck R. Cadambe, Arya Mazumdar:
An upper bound on the size of locally recoverable codes. 1-5 - Anna Blasiak:
Multicut lower bounds via network coding. 1-6 - Duk Hee Yoon, Sang Wu Kim:
Trustworthy decoding of random network coded packets under pollution attack: Physical-layer approach. 1-6 - Harumichi Nishimura:
Quantum network coding - How can network coding be applied to quantum information? 1-5 - László Czap, Vinod M. Prabhakaran, Suhas N. Diggavi, Christina Fragouli:
Securing broadcast against dishonest receivers. 1-6 - Nigel Boston, Ting-Ting Nan:
A refinement of the Four-Atom Conjecture. 1-6 - Oktay Ölmez, Aditya Ramamoorthy:
Replication based storage systems with local repair. 1-6 - Efe Onaran, Marios Gatzianas, Christina Fragouli:
Broadcast erasure channel with feedback: The two multicast case - Algorithms and bounds. 1-6 - Anwitaman Datta, Frédérique E. Oggier:
Storage codes: Managing big data with small overheads. 1-6 - Chun Meng, Hulya Seferoglu, Athina Markopoulou, Kenneth W. Shum, Chung Chan:
Multicast packing for coding across multiple unicasts. 1-6 - Hamlet Medina Ruiz, Michel Kieffer, Béatrice Pesquet-Popescu:
TCP and network coding equilibrium and dynamic properties. 1-6 - Roberto Wanderley da Nóbrega, Chen Feng, Danilo Silva, Bartolomeu F. Uchôa Filho:
On multiplicative matrix channels over finite chain rings. 1-6 - Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
On secure network coding with uniform wiretap sets. 1-6 - Tsz-Ching Ng, Shenghao Yang:
Finite-length analysis of BATS codes. 1-6 - Rui Zhu, Wangmei Guo:
On the secure conditions for distributed storage systems. 1-6 - Éric Gourdin, Yuhui Wang, Muriel Médard:
Strategic network coding - How much and where to code to obtain most of the benefits. 1-7 - Jiaqing Huang, Xunrui Yin, Xiaoxi Zhang, Xu Du, Zongpeng Li:
On Space Information Flow: Single multicast. 1-6 - Rahil Baber, Demetres Christofides, Ntah Ahn Dang, Søren Riis, Emil R. Vaughan:
Multiple unicasts, graph guessing games, and non-Shannon inequalities. 1-6 - Pak Hou Che, Minghua Chen, Tracey Ho, Sidharth Jaggi, Michael Langberg:
Routing for security in networks with adversarial nodes. 1-6 - Anh Le, Arash Saber Tehrani, Alexandros G. Dimakis, Athina Markopoulou:
Instantly decodable network codes for real-time applications. 1-6 - Emre Atsan, Iris Safaka, Lorenzo Keller, Christina Fragouli:
Low cost security for sensor networks. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.