Abstract is missing.
- Broadcast erasure channel with feedback: The two multicast case - Algorithms and boundsEfe Onaran, Marios Gatzianas, Christina Fragouli. 1-6 [doi]
- On secure network coding with uniform wiretap setsWentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer. 1-6 [doi]
- Securing broadcast against dishonest receiversLászló Czap, Vinod M. Prabhakaran, Suhas N. Diggavi, Christina Fragouli. 1-6 [doi]
- Data secrecy in distributed storage systems under exact repairSreechakra Goparaju, Salim El Rouayheb, A. Robert Calderbank, H. Vincent Poor. 1-6 [doi]
- Algorithms for weakly secure data exchangeMuxi Yan, Alex Sprintson. 1-6 [doi]
- Finite-length analysis of BATS codesTsz-Ching Ng, Shenghao Yang. 1-6 [doi]
- Low cost security for sensor networksEmre Atsan, Iris Safaka, Lorenzo Keller, Christina Fragouli. 1-6 [doi]
- On multiplicative matrix channels over finite chain ringsRoberto W. Nobrega, Chen Feng, Danilo Silva, Bartolomeu F. Uchôa Filho. 1-6 [doi]
- On the secure conditions for distributed storage systemsRui Zhu, Wangmei Guo. 1-6 [doi]
- Storage codes: Managing big data with small overheadsAnwitaman Datta, Frédérique E. Oggier. 1-6 [doi]
- TCP and network coding equilibrium and dynamic propertiesHamlet Medina Ruiz, Michel Kieffer, Béatrice Pesquet-Popescu. 1-6 [doi]
- Multicast packing for coding across multiple unicastsChun Meng, Hulya Seferoglu, Athina Markopoulou, Kenneth W. Shum, Chung Chan. 1-6 [doi]
- Multiple unicasts, graph guessing games, and non-Shannon inequalitiesRahil Baber, Demetres Christofides, Anh N. Dang, Søren Riis, Emil R. Vaughan. 1-6 [doi]
- A refinement of the Four-Atom ConjectureNigel Boston, Ting-Ting Nan. 1-6 [doi]
- Min-cost wireless multihop networks in Euclidean spaceZijun Zhang, Zhenkun Jin, Xiaoxi Zhang. 1-6 [doi]
- Trustworthy decoding of random network coded packets under pollution attack: Physical-layer approachDuk Hee Yoon, Sang Wu Kim. 1-6 [doi]
- Instantly decodable network codes for real-time applicationsAnh Le, Arash Saber Tehrani, Alexandros G. Dimakis, Athina Markopoulou. 1-6 [doi]
- Routing for security in networks with adversarial nodesPak Hou Che, Minghua Chen, Tracey Ho, Sidharth Jaggi, Michael Langberg. 1-6 [doi]
- Strategic network coding - How much and where to code to obtain most of the benefitsÉric Gourdin, Yuhui Wang, Muriel Médard. 1-7 [doi]
- An upper bound on the size of locally recoverable codesViveck R. Cadambe, Arya Mazumdar. 1-5 [doi]
- O2-GIDNC: Beyond instantly decodable network codingNeda Aboutorab, Sameh Sorour, Parastoo Sadeghi. 1-6 [doi]
- Quantum network coding - How can network coding be applied to quantum information?Harumichi Nishimura. 1-5 [doi]
- A new computational approach for determining rate regions and optimal codes for coded networksCongduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber. 1-6 [doi]
- Information multicast in (pseudo-)planar networks: Efficient network coding over small finite fieldsTang Xiahou, Zongpeng Li, Chuan Wu. 1-6 [doi]
- Replication based storage systems with local repairOktay Olmez, Aditya Ramamoorthy. 1-6 [doi]
- On Space Information Flow: Single multicastJiaqing Huang, Xunrui Yin, Xiaoxi Zhang, Xu Du, Zongpeng Li. 1-6 [doi]
- Multicut lower bounds via network codingAnna Blasiak. 1-6 [doi]