


default search action
NetCod 2012: Cambridge, MA, USA
- International Symposium on Network Coding, NetCod 2012, Cambridge, MA, USA, June 29-30, 2012. IEEE 2012, ISBN 978-1-4673-1890-7

- Antonia Wachter-Zeh, Vladimir Sidorenko:

Rank metric convolutional codes for Random Linear Network Coding. 1-6 - Vitaly Skachek, Olgica Milenkovic, Angelia Nedic

:
Hybrid noncoherent network coding. 7-12 - Atoosa Hatefi, Raphaël Visoz, Antoine O. Berthet:

Near outage limit joint network coding and decoding for the Semi-Orthogonal Multiple-Access Relay Channel. 13-18 - Jinjing Jiang, Tie Liu, Scott L. Miller:

The rate region of secure symmetrical multilevel diversity coding. 19-24 - Radu Stancu, Frédérique E. Oggier:

Finite nilpotent and metacyclic groups never violate the Ingleton inequality. 25-30 - Maricica Nistor, Daniel Enrique Lucani

, João Barros:
A total energy approach to protocol design in coded wireless sensor networks. 31-36 - Tang Xiahou, Chuan Wu

, Jiaqing Huang, Zongpeng Li:
A geometric framework for investigating the multiple unicast network coding conjecture. 37-42 - Fang Zhao, Muriel Médard, Martin Hundeboll, Jeppe Ledet-Pedersen, Stephan A. Rein, Frank H. P. Fitzek

:
Comparison of analytical and measured performance results on network coding in IEEE 802.11 ad-hoc networks. 43-48 - Hamlet Medina Ruiz, Michel Kieffer, Béatrice Pesquet-Popescu:

Redundancy adaptation scheme for network coding with TCP. 49-54 - Anoosheh Heidarzadeh, Amir H. Banihashemi:

Coding delay analysis of Chunked codes over line networks. 55-60 - Xiaoli Xu, Satyajit Thakor, Yong Liang Guan:

Reduced Functional dependence graphs and their applications. 61-66 - Dajin Wang, Liangyan Gui:

Noisy network coding with causal channel state information. 67-72 - Jithin Ravi, Bikash Kumar Dey:

Exact topology inference for DAGs using network coding. 73-78 - Yasin Buyukalp, Ghid Maatouk, Vinod M. Prabhakaran, Christina Fragouli:

Untrusting network coding. 79-84 - Mahdi Jafari Siavoshani, Christina Fragouli:

Multi-terminal secrecy in a linear non-coherent packetized networks. 85-90 - Eirina Bourtsoulatze, Nikolaos Thomos, Pascal Frossard:

Correlation-aware reconstruction of network coded sources. 91-96 - Chung Chan

:
Universal secure network coding by non-linear secret key agreement. 97-102 - Zoltán Király, Erika Renata Kovács:

Deterministic network coding algorithms and applications for wireless networks. 103-107 - Marios Gatzianas

, Shirin Saeedi Bidokhti, Christina Fragouli:
Feedback-based coding algorithms for broadcast erasure channels with degraded message sets. 108-113 - Amir Salimi, Tie Liu, Shuguang Cui

:
Generalized cut-set bounds for networks with collocated messages. 114-118 - Serhat Nazim Avci, Ender Ayanoglu:

Extended diversity coding: Coding protection and primary paths for network restoration. 119-124 - Kaveh Mahdaviani, Masoud Ardakani, Hossein Bagheri, Chintha Tellambura:

Gamma Codes: A low-overhead linear-complexity network coding solution. 125-130 - Amin Sakzad, Emanuele Viterbo

, Yi Hong, Joseph Jean Boutros:
On the ergodic rate for compute-and-forward. 131-136 - Samar Agnihotri, Sidharth Jaggi, Minghua Chen

:
Analog network coding in general SNR regime: Performance of a greedy scheme. 137-142 - Yao Li, Péter Vingelmann, Morten Videbæk Pedersen, Emina Soljanin

:
Round-robin streaming with generations. 143-148 - André Moreira, Daniel E. Lucani

:
On coding for asymmetric wireless interfaces. 149-154 - Anh Le, Athina Markopoulou

:
NC-Audit: Auditing for network coding storage. 155-160 - Ye Li, Wai-Yip Chan, Steven D. Blostein:

Network coding with unequal size overlapping generations. 161-166 - Qifu Tyler Sun:

Variable-rate, static and universal generic linear network codes. 167-172 - Danilo Silva:

Minimum-overhead network coding in the short packet regime. 173-178 - Chuchu Wu, Mario Gerla, Mihaela van der Schaar:

Social norm incentives for secure network coding in MANETs. 179-184 - Xiaolin Li, Wai Ho Mow:

The precoding problem for sparse random linear network coding. 185-190 - Yu-Pin Hsu

, Alex Sprintson:
Opportunistic network coding: Competitive analysis. 191-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














