


default search action
NetCod 2013: Calgary, AB, Canada
- International Symposium on Network Coding, NetCod 2013, Calgary, AB, Canada, June 7-9, 2013. IEEE 2013, ISBN 978-1-4799-0821-9

 - Congduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber:

A new computational approach for determining rate regions and optimal codes for coded networks. 1-6 - Sreechakra Goparaju, Salim El Rouayheb, A. Robert Calderbank, H. Vincent Poor:

Data secrecy in distributed storage systems under exact repair. 1-6 - Tang Xiahou, Zongpeng Li, Chuan Wu

:
Information multicast in (pseudo-)planar networks: Efficient network coding over small finite fields. 1-6 - Zijun Zhang, Zhenkun Jin, Xiaoxi Zhang:

Min-cost wireless multihop networks in Euclidean space. 1-6 - Neda Aboutorab, Sameh Sorour, Parastoo Sadeghi

:
O2-GIDNC: Beyond instantly decodable network coding. 1-6 - Muxi Yan, Alex Sprintson

:
Algorithms for weakly secure data exchange. 1-6 - Viveck R. Cadambe

, Arya Mazumdar:
An upper bound on the size of locally recoverable codes. 1-5 - Anna Blasiak

:
Multicut lower bounds via network coding. 1-6 - Duk Hee Yoon, Sang Wu Kim:

Trustworthy decoding of random network coded packets under pollution attack: Physical-layer approach. 1-6 - Harumichi Nishimura:

Quantum network coding - How can network coding be applied to quantum information? 1-5 - László Czap, Vinod M. Prabhakaran, Suhas N. Diggavi, Christina Fragouli:

Securing broadcast against dishonest receivers. 1-6 - Nigel Boston, Ting-Ting Nan:

A refinement of the Four-Atom Conjecture. 1-6 - Oktay Ölmez, Aditya Ramamoorthy:

Replication based storage systems with local repair. 1-6 - Efe Onaran, Marios Gatzianas

, Christina Fragouli:
Broadcast erasure channel with feedback: The two multicast case - Algorithms and bounds. 1-6 - Anwitaman Datta

, Frédérique E. Oggier:
Storage codes: Managing big data with small overheads. 1-6 - Chun Meng, Hulya Seferoglu, Athina Markopoulou

, Kenneth W. Shum, Chung Chan
:
Multicast packing for coding across multiple unicasts. 1-6 - Hamlet Medina Ruiz, Michel Kieffer

, Béatrice Pesquet-Popescu:
TCP and network coding equilibrium and dynamic properties. 1-6 - Roberto Wanderley da Nóbrega, Chen Feng

, Danilo Silva
, Bartolomeu F. Uchôa Filho
:
On multiplicative matrix channels over finite chain rings. 1-6 - Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:

On secure network coding with uniform wiretap sets. 1-6 - Tsz-Ching Ng

, Shenghao Yang:
Finite-length analysis of BATS codes. 1-6 - Rui Zhu, Wangmei Guo:

On the secure conditions for distributed storage systems. 1-6 - Éric Gourdin, Yuhui Wang, Muriel Médard:

Strategic network coding - How much and where to code to obtain most of the benefits. 1-7 - Jiaqing Huang, Xunrui Yin, Xiaoxi Zhang, Xu Du, Zongpeng Li:

On Space Information Flow: Single multicast. 1-6 - Rahil Baber, Demetres Christofides

, Ntah Ahn Dang, Søren Riis
, Emil R. Vaughan:
Multiple unicasts, graph guessing games, and non-Shannon inequalities. 1-6 - Pak Hou Che, Minghua Chen

, Tracey Ho, Sidharth Jaggi, Michael Langberg:
Routing for security in networks with adversarial nodes. 1-6 - Anh Le, Arash Saber Tehrani, Alexandros G. Dimakis, Athina Markopoulou

:
Instantly decodable network codes for real-time applications. 1-6 - Emre Atsan, Iris Safaka, Lorenzo Keller, Christina Fragouli:

Low cost security for sensor networks. 1-6 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














