Sciweavers

2945 search results - page 124 / 589
» Noisy Network Coding
Sort
View
INFOCOM
2012
IEEE
13 years 5 months ago
On detecting pollution attacks in inter-session network coding
Abstract—Dealing with pollution attacks in inter-session network coding is challenging due to the fact that sources, in addition to intermediate nodes, can be malicious. In this ...
Anh Le, Athina Markopoulou
130
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
SIGCOMM
2006
ACM
15 years 9 months ago
Growth codes: maximizing sensor network data persistence
Sensor networks are especially useful in catastrophic or emergency scenarios such as floods, fires, terrorist attacks or earthquakes where human participation may be too dangero...
Abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rube...
162
Voted
ICC
2011
IEEE
177views Communications» more  ICC 2011»
14 years 3 months ago
High-Throughput Routing with Superposition Coding and Successive Interference Cancellation
—Network coding aware routing protocols have been an interesting research topic in recent years. In this paper, we explore similar routing gains with physical layer coding techni...
Xueyuan Su, Sammy Chan
138
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Superimposed XOR: A New Physical Layer Network Coding Scheme for Two-Way Relay Channels
— We present a new physical layer network coding (PLNC) scheme, called superimposed XOR, for two-way relay channels. The new scheme specifically takes into account the channel a...
Jianquan Liu, Meixia Tao, Youyun Xu, Xiaodong Wang