@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20161128-122403199, title = "IEEE Global Communications Conference (GLOBECOM), 2015", chapter = "Priority-Based Real-Time Stream Coding under Burst Erasures", year = "2015", url = "https://resolver.caltech.edu/CaltechAUTHORS:20161128-122403199", id = "record", isbn = "978-1-4799-5952-5", doi = "10.1109/GLOCOM.2015.7417571" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20160922-113810491, title = "2015 International Conference on Computing, Networking and Communications (ICNC)", chapter = "VIP: Joint Traffic Engineering and Caching in Named Data Networks", year = "2015", url = "https://resolver.caltech.edu/CaltechAUTHORS:20160922-113810491", id = "record", isbn = "978-1-4799-6959-3", doi = "10.1109/ICCNC.2015.7069430" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898, title = "2014 52nd Annual Allerton Conference on Communication, Control, and Computing", chapter = "Single-source/sink network error correction is as hard as multiple-unicast", year = "2014", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898", id = "record", isbn = "978-1-4799-8009-3", doi = "10.1109/ALLERTON.2014.7028486" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20141117-151706662, title = "ICN'14 Proceedings", chapter = "VIP: A Framework for Joint Dynamic Forwarding and Caching in Named Data Networks", year = "2014", url = "https://resolver.caltech.edu/CaltechAUTHORS:20141117-151706662", id = "record", isbn = "978-1-4503-3206-4", doi = "10.1145/2660129.2660151" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150227-092238378, title = "2014 IEEE International Symposium on Information Theory (ISIT)", chapter = "On the power of cooperation: Can a little help a lot?", year = "2014", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150227-092238378", id = "record", isbn = "978-1-4799-5186-4", doi = "10.1109/ISIT.2014.6875411" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150227-082218360, title = "2014 IEEE International Symposium on Information Theory (ISIT)", chapter = "Distributed Reed-Solomon codes for simple multiple access networks", year = "2014", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150227-082218360", id = "record", isbn = "978-1-4799-5186-4", doi = "10.1109/ISIT.2014.6874913" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781, title = "2014 IEEE International Symposium on Information Theory (ISIT)", chapter = "Reverse Edge Cut-Set Bounds for Secure Network Coding", year = "2014", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781", id = "record", isbn = "978-1-4799-5186-4", doi = "10.1109/ISIT.2014.6874804" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150922-132032542, chapter = "Distributed gabidulin codes for multiple-source network error correction", year = "2014", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150922-132032542", id = "record", doi = "10.1109/NETCOD.2014.6892135" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708, title = "Network Coding (NetCod) 2013", chapter = "On Secure Network Coding with Uniform Wiretap Sets", year = "2013", url = "https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708", id = "record", isbn = "978-1-4799-0821-9", doi = "10.1109/NetCod.2013.6570814" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091, title = "Infocom, 2013 Proceedings", chapter = "Rateless Resilient Network Coding Against Byzantine Adversaries", year = "2013", url = "https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091", id = "record", isbn = "978-1-4673-5944-3", doi = "10.1109/INFCOM.2013.6566776" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20130731-073911147, title = "2012 50th Annual Allerton Conference on Communication, Control, and Computing", chapter = "Network Equivalence in the Presence of an Eavesdropper", year = "2012", url = "https://resolver.caltech.edu/CaltechAUTHORS:20130731-073911147", id = "record", isbn = "978-1-4673-4537-8", doi = "10.1109/Allerton.2012.6483322" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120828-151414949, title = "2012 IEEE International Symposium on Information Theory Proceedings (ISIT)", chapter = "Erasure Coding for Real-Time Streaming", year = "2012", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120828-151414949", id = "record", isbn = "978-1-4673-2580-6", doi = "10.1109/ISIT.2012.6284055" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120907-074616471, title = "2012 International Conference on Signal Processing and Communications (SPCOM)", chapter = "Low-Complexity Near-Optimal Codes for Gaussian Relay Networks", year = "2012", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120907-074616471", id = "record", isbn = "978-1-4673-2013-9", doi = "10.1109/SPCOM.2012.6290236" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170201-145713012, title = "2012 Information Theory and Applications Workshop", chapter = "On erasure correction coding for streaming", year = "2012", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170201-145713012", id = "record", isbn = "978-1-4673-1472-5", doi = "10.1109/ITA.2012.6181798" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170208-174937818, title = "49th Annual Allerton Conference on Communication, Control, and Computing", chapter = "Erasure correction for nested receivers", year = "2011", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170208-174937818", id = "record", isbn = "978-1-4577-1818-2", doi = "10.1109/Allerton.2011.6120339" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170223-131434715, title = "49th Annual Allerton Conference on Communication, Control, and Computing", chapter = "Privacy preserving data aggregating with multiple access channel", year = "2011", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170223-131434715", id = "record", isbn = "978-1-4577-1818-2", doi = "10.1109/Allerton.2011.6120388" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120406-091523956, title = "2011 IEEE International Symposium on Information Theory Proceedings", chapter = "Distributed Storage Allocations for Optimal Delay", year = "2011", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120406-091523956", id = "record", isbn = "978-1-4577-0596-0", doi = "10.1109/ISIT.2011.6033779" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120405-094455952, title = "2011 IEEE International Symposium on Information Theory Proceedings", chapter = "On the Equivalence of Shannon Capacity and Stable Capacity in Networks with Memoryless Channels", year = "2011", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120405-094455952", id = "record", isbn = "978-1-4577-0596-0", doi = "10.1109/ISIT.2011.6034178" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120406-092406435, title = "2011 IEEE International Symposium on Information Theory Proceedings", chapter = "On Equivalence for Networks of Noisy Channels under Byzantine Attacks", year = "2011", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120406-092406435", id = "record", isbn = "978-1-4577-0596-0", doi = "10.1109/ISIT.2011.6034284" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120109-100003943, title = "2011 IEEE International Conference on Communications (ICC)", chapter = "Error Estimating Codes with Constant Overhead: A Random Walk Approach", year = "2011", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120109-100003943", id = "record", isbn = "978-1-61284-233-2", doi = "10.1109/icc.2011.5963049" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20120405-100929836, title = "2011 IEEE Infocom Conference Proceedings", chapter = "Universal and Robust Distributed Network Codes", year = "2011", url = "https://resolver.caltech.edu/CaltechAUTHORS:20120405-100929836", id = "record", isbn = "978-1-4244-9919-9", doi = "10.1109/INFCOM.2011.5935297" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170308-155527646, title = "2011 Information Theory and Applications Workshop", chapter = "On network error correction with limited feedback capacity", year = "2011", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170308-155527646", id = "record", isbn = "978-1-4577-0361-4", doi = "10.1109/ITA.2011.5743579" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170316-132954207, title = "48th Annual Allerton Conference on Communication, Control, and Computing (Allerton)", chapter = "Outer bounds on the error correction capacity region for non-multicast networks", year = "2010", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170316-132954207", id = "record", isbn = "978-1-4244-8216-0", doi = "10.1109/ALLERTON.2010.5706999" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20161122-143227109, title = "APSys '10 Proceedings of the first ACM asia-pacific workshop on Workshop on systems", chapter = "Improving peer-to-peer file distribution: winner doesn't have to take all", year = "2010", url = "https://resolver.caltech.edu/CaltechAUTHORS:20161122-143227109", id = "record", isbn = "978-1-4503-0195-4", doi = "10.1145/1851276.1851289" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20140529-141715127, title = "2010 IEEE Information Theory Workshop (ITW)", chapter = "On the Delay Advantage of Coding in Packet Erasure Networks", year = "2010", url = "https://resolver.caltech.edu/CaltechAUTHORS:20140529-141715127", id = "record", isbn = "978-1-4244-8262-7", doi = "10.1109/CIG.2010.5592713" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170314-152947986, title = "2010 IEEE Information Theory Workshop", chapter = "Multi-source operator channels: Efficient capacity-achieving codes", year = "2010", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170314-152947986", id = "record", isbn = "978-1-4244-8264-1", doi = "10.1109/CIG.2010.5592812" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100805-081437710, title = "47th Annual Allerton Conference on Communication, Control and Computing", chapter = "Network error correction with unequal link capacities", year = "2010", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100805-081437710", id = "record", isbn = "978-1-4244-5870-7", doi = "10.1109/ALLERTON.2009.5394512" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20110329-162952462, title = "2010 IEEE International Symposium on Information Theory", chapter = "Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits", year = "2010", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110329-162952462", id = "record", isbn = "978-1-4244-7891-0", doi = "10.1109/ISIT.2010.5513354" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20110406-104359419, title = "2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)", chapter = "Symmetric Allocations for Distributed Storage", year = "2010", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110406-104359419", id = "record", isbn = "978-1-4244-5638-3", doi = "10.1109/GLOCOM.2010.5683962" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170328-174035672, title = "2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers", chapter = "On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170328-174035672", id = "record", isbn = "978-1-4244-5827-1", doi = "10.1109/ACSSC.2009.5469966" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100816-135601648, title = "ISIT 2009", chapter = "Rate regions for coherent and noncoherent multisource network error correction", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100816-135601648", id = "record", isbn = "978-1-4244-4312-3", doi = "10.1109/ISIT.2009.5206077" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100816-110713053, title = "ISIT 2009", chapter = "On the delay of network coding over line networks", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100816-110713053", id = "record", isbn = "978-1-4244-4312-3", doi = "10.1109/ISIT.2009.5205897" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100816-140417790, title = "ISIT 2009", chapter = "On noncoherent correction of network errors and erasures with random locations", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100816-140417790", id = "record", isbn = "978-1-4244-4312-3", doi = "10.1109/ISIT.2009.5205602" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100722-131717463, title = "Conference record of the 42nd Asilomar Conference on Signals, Systems and Computers", chapter = "On robust network coding subgraph construction under uncertainty", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100722-131717463", id = "record", isbn = "978-1-4244-2940-0", doi = "10.1109/ACSSC.2008.5074828" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100716-091516848, title = "46th annual Allerton Conference on Communication, Control, and Computing", chapter = "Network coding with periodic recomputation for minimum energy multicasting in mobile ad-hoc networks", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100716-091516848", id = "record", isbn = "978-1-4244-2925-7", doi = "10.1109/ALLERTON.2008.4797549" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100716-104652225, title = "46th annual Allerton Conference on Communication, Control, and Computing", chapter = "Distributed design of network codes for wireless multiple unicasts", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100716-104652225", id = "record", isbn = "978-1-4244-2925-7", doi = "10.1109/ALLERTON.2008.4797575" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100511-151403304, title = "43rd Annual Conference on Information Sciences and Systems, 2009. CISS 2009", chapter = "Optimal Quantization in Energy-Constrained Sensor Networks under Imperfect Transmission", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100511-151403304", id = "record", isbn = "9781424427338", doi = "10.1109/CISS.2009.5054792" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100510-105350270, title = "Networking and Information Theory, 2009", chapter = "Approximate capacity of the symmetric half-duplex Gaussian butterfly network", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100510-105350270", id = "record", isbn = "978-1-4244-4535-6", doi = "10.1109/ITWNIT.2009.5158593" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100510-112135867, title = "Information Sciences and Systems, 2009", chapter = "Optimal content delivery with network coding", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100510-112135867", id = "record", isbn = "978-1-4244-2733-8", doi = "10.1109/CISS.2009.5054756" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100510-112640133, title = "Network Coding, Theory, and Applications, 2009", chapter = "Distributed Storage Allocation Problems", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100510-112640133", id = "record", isbn = "978-1-4244-4723-7", doi = "10.1109/NETCOD.2009.5191399" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100816-095201318, title = "ISIT 2009", chapter = "On multiple access random medium access control", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100816-095201318", id = "record", isbn = "978-1-4244-4312-3", doi = "10.1109/ISIT.2009.5205457" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100816-100837500, title = "ISIT 2009", chapter = "Achievable rate and optimal physical layer rate allocation in interference-free wireless networks", year = "2009", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100816-100837500", id = "record", isbn = "978-1-4244-4312-3", doi = "10.1109/ISIT.2009.5205903" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170404-165519201, title = "46th Annual Allerton Conference on Communication, Control, and Computing", chapter = "Network codes with deadlines", year = "2008", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170404-165519201", id = "record", isbn = "978-1-4244-2925-7", doi = "10.1109/ALLERTON.2008.4797577" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:GUWisit07, title = "IEEE International Symposium on Information Theory (ISIT 2007), Nice France, 24-29 June 2007", chapter = "On Source Coding with Coded Side Information for a Binary Source with Binary Side Information", year = "2008", url = "https://resolver.caltech.edu/CaltechAUTHORS:GUWisit07", id = "record", isbn = "978-1-4244-1397-3", doi = "10.1109/ISIT.2007.4557427" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100707-141558183, title = "IEEE INFOCOM 2008 : the 27th Conference on Computer Communications : [April 13-18, 2008, Phoenix, Arizona", chapter = "Energy Efficient Opportunistic Network Coding for Wireless Networks", year = "2008", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100707-141558183", id = "record", isbn = "978-1-4244-2025-4", doi = "10.1109/INFOCOM.2008.81" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170418-174812677, title = "2008 Information Theory and Applications Workshop", chapter = "Some results on relay strategies for memoryless two-way relay channels", year = "2008", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170418-174812677", id = "record", isbn = "978-1-4244-2670-6", doi = "10.1109/ITA.2008.4601042" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100629-080753182, title = "2008 IEEE International Conference on Communications", chapter = "Memoryless Relay Strategies for Two-Way Relay Channels: Performance Analysis and Optimization", year = "2008", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100629-080753182", id = "record", isbn = "978-1-4244-2074-2", doi = "10.1109/ICC.2008.222" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20110407-113333118, title = "2008 IEEE Global Telecommunications Conference", chapter = "Space-Time Communication Protocols for N-way Relay Networks", year = "2008", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110407-113333118", id = "record", isbn = "978-1-4244-2324-8", doi = "10.1109/GLOCOM.2008.ECP.205" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170420-135023438, title = "MILCOM 2007 - IEEE Military Communications Conference", chapter = "On network coding for security", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170420-135023438", id = "record", isbn = "978-1-4244-1512-0", doi = "10.1109/MILCOM.2007.4454907" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100909-133322426, title = "2007 IEEE International Conference on Communications", chapter = "Statistical Pruning for Near Maximum Likelihood Detection of MIMO Systems", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100909-133322426", id = "record", isbn = "978-1-4244-0352-3", doi = "10.1109/ICC.2007.905" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170420-133141763, title = "2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks", chapter = "On the Performance of Joint and Separate Channel and Network Coding in Wireless Fading Networks", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170420-133141763", id = "record", isbn = "978-1-4244-1199-3", doi = "10.1109/ITWITWN.2007.4318067" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:MEHicassp07, title = "IEEE International Conference on Acoustics, Speech and Signal Processing, (ICASSP 2007), Honolulu, HI, 15-20 April 2007", chapter = "Optimal Strategies for Efficient Peer-to-Peer File Sharing", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:MEHicassp07", id = "record", isbn = "1-4244-0728-1", doi = "10.1109/ICASSP.2007.367325" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170425-161810594, title = "2007 IEEE International Symposium on Information Theory", chapter = "Minimum Cost Integral Network Coding", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170425-161810594", id = "record", isbn = "978-1-4244-1397-3", doi = "10.1109/ISIT.2007.4557632" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170425-162520744, title = "2007 IEEE International Symposium on Information Theory", chapter = "On Distributed Distortion Optimization for Correlated Sources", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170425-162520744", id = "record", isbn = "978-1-4244-1397-3", doi = "10.1109/ISIT.2007.4557631" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170425-143555263, title = "5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops", chapter = "Network With Costs: Timing and Flow Decomposition", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170425-143555263", id = "record", isbn = "978-1-4244-0960-0", doi = "10.1109/WIOPT.2007.4480102" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100827-082408080, title = "46th IEEE Conference on Decision and Control", chapter = "Optimization based rate control for multicast with network coding: A multipath formulation", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100827-082408080", id = "record", isbn = "978-1-4244-1497-0", doi = "10.1109/CDC.2007.4434960" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100827-112133009, title = "Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on", chapter = "Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100827-112133009", id = "record", isbn = "978-1-4244-1454-3", doi = "10.1109/MOBHOC.2007.4428675" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100826-092317616, title = "INFOCOM 2007", chapter = "Optimization Based Rate Control for Multicast with Network Coding", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100826-092317616", id = "record", isbn = "978-1-4244-1046-0", doi = "10.1109/INFCOM.2007.139" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100826-151540718, title = "46th IEEE Conference on Decision and Control", chapter = "Distributed minimum cost multicasting with lossless source coding and network coding", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100826-151540718", id = "record", isbn = "978-1-4244-1497-0", doi = "10.1109/CDC.2007.4434962" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20100827-084745453, title = "46th IEEE Conference on Decision and Control", chapter = "Distributed optimization in wireless networks using broadcast advantage", year = "2007", url = "https://resolver.caltech.edu/CaltechAUTHORS:20100827-084745453", id = "record", isbn = "978-1-4244-1497-0", doi = "10.1109/CDC.2007.4434958" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170515-163823021, title = "2006 IEEE International Symposium on Information Theory", chapter = "Linear Programming Detection and Decoding for MIMO Systems", year = "2006", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170515-163823021", id = "record", isbn = "1-4244-0505-X", doi = "10.1109/ISIT.2006.261741" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170503-172212389, title = "2006 IEEE International Symposium on Information Theory", chapter = "Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks", year = "2006", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170503-172212389", id = "record", isbn = "1-4244-0505-X", doi = "10.1109/ISIT.2006.261832" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:EFFitw06, title = "IEEE Information Theory Workshop (ITW '06), Punta del Este, Uruguay, 13-17 March, 2006", chapter = "A tiling approach to network code design for wireless networks", year = "2006", url = "https://resolver.caltech.edu/CaltechAUTHORS:EFFitw06", id = "record", isbn = "1-4244-0035-X", doi = "10.1109/ITW.2006.1633782" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20110506-104232997, title = "2006 IEEE International Conference on Communications", chapter = "Polynomial Moment Relaxation for MIMO Detection", year = "2006", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110506-104232997", id = "record", isbn = "978-1-4244-0354-7", doi = "10.1109/ICC.2006.255286" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20110506-105351004, title = "2006 IEEE International Conference on Communications", chapter = "Heuristic Tree Search for Detection and Decoding of Uncoded and Linear Block Coded Communication Systems", year = "2006", url = "https://resolver.caltech.edu/CaltechAUTHORS:20110506-105351004", id = "record", isbn = "978-1-4244-0354-7", doi = "10.1109/ICC.2006.254759" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:HOTisit05, title = "IEEE International Symposium on Information Theory (ISIT '05), Adelaide, Australia, 4-9 September 2005", chapter = "Network monitoring in multicast networks using network coding", year = "2005", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTisit05", id = "record", isbn = "0-7803-9151-9", doi = "10.1109/ISIT.2005.1523691" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:JAGisit05, title = "International Symposium on Information Theory (ISIT 2005), Adelaide, South Australia, Australia, 4-9 September 2005", chapter = "Correction of adversarial errors in networks", year = "2005", url = "https://resolver.caltech.edu/CaltechAUTHORS:JAGisit05", id = "record", isbn = "0-7803-9151-9", doi = "10.1109/ISIT.2005.1523584" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:HOTiwwan04, title = "International Workshop on Wireless Ad-Hoc Networks, Oulu, Finald, May 31-June 3, 2004", chapter = "On the utility of network coding in dynamic environments", year = "2005", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTiwwan04", id = "record", isbn = "0-7803-8275-7", doi = "10.1109/IWWAN.2004.1525570" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:HOTisit04, title = "IEEE International Symposium on Information Theory (ISIT '04), Chicago, IL, 27 June-2 July 2004", chapter = "Byzantine modification detection in multicast networks using randomized network coding", year = "2005", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTisit04", id = "record", isbn = "0-7803-8280-3", doi = "10.1109/ISIT.2004.1365180" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:HOTisit03a, title = "IEEE International Symposium on Information Theory (ISIT '04), Chicago, IL, 27 June-2 July, 2004", chapter = "The benefits of coding over routing in a randomized setting", year = "2003", url = "https://resolver.caltech.edu/CaltechAUTHORS:HOTisit03a", id = "record", isbn = "0-7803-7728-1", doi = "10.1109/ISIT.2003.1228459" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20111014-145416422, title = "2003 IEEE International Symposium on Information Theory", chapter = "Network coding from a network flow perspective", year = "2003", url = "https://resolver.caltech.edu/CaltechAUTHORS:20111014-145416422", id = "record", isbn = "0-7803-7728-1", doi = "10.1109/ISIT.2003.1228458" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20111005-132747410, title = "IEEE INFOCOM 2003 : the conference on computer communications", chapter = "An information theoretic view of network management", year = "2003", url = "https://resolver.caltech.edu/CaltechAUTHORS:20111005-132747410", id = "record", isbn = "0-7803-7752-4", doi = "10.1109/INFCOM.2003.1208981" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150210-075301992, title = "Advances in Network Information Theory", chapter = "Linear network codes: A unified framework for source, channel, and network coding", year = "2003", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150210-075301992", id = "record", isbn = "0821834673" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20111019-141653699, title = "2002 IEEE International Symposium on Information Theory", chapter = "A coding view of network recovery and management", year = "2002", url = "https://resolver.caltech.edu/CaltechAUTHORS:20111019-141653699", id = "record", isbn = "0-7803-7501-7", doi = "10.1109/ISIT.2002.1023409" }