首页 > 最新文献

2009 Workshop on Network Coding, Theory, and Applications最新文献

英文 中文
Pipelined encoding for deterministic and noisy relay networks 确定性和噪声中继网络的流水线编码
Pub Date : 2009-06-15 DOI: 10.1109/NETCOD.2009.5191392
G. Kramer
Recent coding strategies for deterministic and noisy relay networks are related to the pipelining of block Markov encoding. For deterministic networks, it is shown that pipelined encoding improves encoding delay, as opposed to end-to-end delay. For noisy networks, it is observed that decode-and-forward exhibits good rate scaling when the signal-to-noise ratio (SNR) increases.
最近针对确定性和噪声中继网络的编码策略都与分组马尔可夫编码的流水线化有关。对于确定性网络,表明管道编码改善编码延迟,而不是端到端延迟。对于有噪声的网络,可以观察到,当信噪比(SNR)增加时,解码和转发表现出良好的速率缩放。
{"title":"Pipelined encoding for deterministic and noisy relay networks","authors":"G. Kramer","doi":"10.1109/NETCOD.2009.5191392","DOIUrl":"https://doi.org/10.1109/NETCOD.2009.5191392","url":null,"abstract":"Recent coding strategies for deterministic and noisy relay networks are related to the pipelining of block Markov encoding. For deterministic networks, it is shown that pipelined encoding improves encoding delay, as opposed to end-to-end delay. For noisy networks, it is observed that decode-and-forward exhibits good rate scaling when the signal-to-noise ratio (SNR) increases.","PeriodicalId":251096,"journal":{"name":"2009 Workshop on Network Coding, Theory, and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127410273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A feedback-based adaptive broadcast coding scheme for reducing in-order delivery delay 一种基于反馈的自适应广播编码方案,用于减少有序传输延迟
Pub Date : 2009-06-15 DOI: 10.1109/NETCOD.2009.5437470
J. Sundararajan, P. Sadeghi, M. Médard
We propose a new feedback-based adaptive coding scheme for a packet erasure broadcast channel. The main performance metric of interest is the delay. We consider two types of delay - decoding delay and delivery delay. Decoding delay is the time difference between the instant when the packet is decoded at an arbitrary receiver and the instant when it arrived at the sender. Delivery delay also includes the period when a decoded packet waits in a resequencing buffer at the receiver until all previous packets have also been decoded. This notion of delay is motivated by applications that accept packets only in order. Our coding scheme has the innovation guarantee property and is hence throughput optimal. It also allows efficient queue management. It uses the simple strategy of mixing only the oldest undecoded packet of each receiver, and therefore extends to any number of receivers. We conjecture that this scheme achieves the asymptotically optimal delivery (and hence decoding) delay. The asymptotic behavior is studied in the limit as the load factor of the system approaches capacity. This conjecture is verified through simulations.
提出了一种新的基于反馈的分组擦除广播信道自适应编码方案。主要的性能指标是延迟。我们考虑两种类型的延迟——解码延迟和传输延迟。解码延迟是数据包在任意接收端被解码的瞬间与到达发送端瞬间之间的时间差。传送延迟还包括已解码的数据包在接收器的重排序缓冲区中等待的时间,直到所有先前的数据包也已解码。这种延迟的概念是由只按顺序接受数据包的应用程序引起的。该编码方案具有创新保证特性,是吞吐量最优的编码方案。它还允许高效的队列管理。它使用简单的策略,只混合每个接收器的最古老的未解码数据包,因此可以扩展到任意数量的接收器。我们推测,该方案达到渐近最优的传输(因此解码)延迟。研究了系统在负荷因子接近容量时的极限下的渐近行为。通过仿真验证了这一猜想。
{"title":"A feedback-based adaptive broadcast coding scheme for reducing in-order delivery delay","authors":"J. Sundararajan, P. Sadeghi, M. Médard","doi":"10.1109/NETCOD.2009.5437470","DOIUrl":"https://doi.org/10.1109/NETCOD.2009.5437470","url":null,"abstract":"We propose a new feedback-based adaptive coding scheme for a packet erasure broadcast channel. The main performance metric of interest is the delay. We consider two types of delay - decoding delay and delivery delay. Decoding delay is the time difference between the instant when the packet is decoded at an arbitrary receiver and the instant when it arrived at the sender. Delivery delay also includes the period when a decoded packet waits in a resequencing buffer at the receiver until all previous packets have also been decoded. This notion of delay is motivated by applications that accept packets only in order. Our coding scheme has the innovation guarantee property and is hence throughput optimal. It also allows efficient queue management. It uses the simple strategy of mixing only the oldest undecoded packet of each receiver, and therefore extends to any number of receivers. We conjecture that this scheme achieves the asymptotically optimal delivery (and hence decoding) delay. The asymptotic behavior is studied in the limit as the load factor of the system approaches capacity. This conjecture is verified through simulations.","PeriodicalId":251096,"journal":{"name":"2009 Workshop on Network Coding, Theory, and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125440137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Secure error-correcting (SEC) network codes 安全纠错(SEC)网络代码
Pub Date : 2009-06-15 DOI: 10.1109/NETCOD.2009.5191401
C. Ngai, R. Yeung
We investigate transmission of information in a network in the presence of an adversary that can eavesdrop k channels and inject d errors into the network at the same time. We propose a deterministic construction of a secure error-correcting (SEC) network codes which can transmit information at rate m - 2d - k to all the sink nodes which protecting the information from eavesdropping and contamination by the adversary, where m is the minimum maxflow among all the sink nodes. We also show that this rate is optimal.
我们研究了在对手存在的情况下网络中的信息传输,对手可以窃听k个通道并同时向网络注入d个错误。我们提出了一种安全纠错(SEC)网络码的确定性结构,它可以以m - 2d - k的速率向所有汇聚节点传输信息,以保护信息不被对手窃听和污染,其中m为所有汇聚节点之间的最小maxflow。我们也证明了这个速率是最优的。
{"title":"Secure error-correcting (SEC) network codes","authors":"C. Ngai, R. Yeung","doi":"10.1109/NETCOD.2009.5191401","DOIUrl":"https://doi.org/10.1109/NETCOD.2009.5191401","url":null,"abstract":"We investigate transmission of information in a network in the presence of an adversary that can eavesdrop k channels and inject d errors into the network at the same time. We propose a deterministic construction of a secure error-correcting (SEC) network codes which can transmit information at rate m - 2d - k to all the sink nodes which protecting the information from eavesdropping and contamination by the adversary, where m is the minimum maxflow among all the sink nodes. We also show that this rate is optimal.","PeriodicalId":251096,"journal":{"name":"2009 Workshop on Network Coding, Theory, and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Performance modeling of stochastic networks with network coding 基于网络编码的随机网络性能建模
Pub Date : 2009-06-15 DOI: 10.1109/NETCOD.2009.5191386
Kui Wu, W. Jia, Yuan Yuan, Yuming Jiang
With network coding, a network node can code information flows before forwarding them. While it has been theoretically proved that network coding can achieve maximum network throughput, the theoretical results usually do not consider the burstiness of data traffic, delays, and the stochastic nature in information processing and transmission. There is currently no theory to systematically model and evaluate the performance of network coding, especially when nodes' capacity (i.e., coding and transmission) becomes stochastic. Without such a theory, the performance of network coding under various practical system settings is far from clear. To fill the vacancy, we develop an analytical approach by extending the stochastic network calculus theory to tackle the special difficulties in the evaluation of network coding. We prove the new properties of stochastic network calculus for network coding, which are used to derive the stochastic end-to-end delay and throughput.
网络编码是指网络节点对信息流进行编码后再进行转发。虽然理论上已经证明网络编码可以实现最大的网络吞吐量,但理论结果通常没有考虑数据流量的突发性、延迟以及信息处理和传输中的随机性。目前还没有理论可以系统地建模和评估网络编码的性能,特别是当节点的容量(即编码和传输)变得随机时。没有这样的理论,网络编码在各种实际系统设置下的性能还远远不清楚。为了填补这一空缺,我们通过扩展随机网络演算理论,发展了一种分析方法来解决网络编码评估中的特殊困难。我们证明了网络编码的随机网络微积分的新性质,并将其用于推导随机端到端延迟和吞吐量。
{"title":"Performance modeling of stochastic networks with network coding","authors":"Kui Wu, W. Jia, Yuan Yuan, Yuming Jiang","doi":"10.1109/NETCOD.2009.5191386","DOIUrl":"https://doi.org/10.1109/NETCOD.2009.5191386","url":null,"abstract":"With network coding, a network node can code information flows before forwarding them. While it has been theoretically proved that network coding can achieve maximum network throughput, the theoretical results usually do not consider the burstiness of data traffic, delays, and the stochastic nature in information processing and transmission. There is currently no theory to systematically model and evaluate the performance of network coding, especially when nodes' capacity (i.e., coding and transmission) becomes stochastic. Without such a theory, the performance of network coding under various practical system settings is far from clear. To fill the vacancy, we develop an analytical approach by extending the stochastic network calculus theory to tackle the special difficulties in the evaluation of network coding. We prove the new properties of stochastic network calculus for network coding, which are used to derive the stochastic end-to-end delay and throughput.","PeriodicalId":251096,"journal":{"name":"2009 Workshop on Network Coding, Theory, and Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121641957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Broadcast erasure channel with feedback - Capacity and algorithms 带反馈的广播擦除信道。容量和算法
Pub Date : 2009-06-15 DOI: 10.1109/NETCOD.2009.5191394
L. Georgiadis, L. Tassiulas
We consider the two-user broadcast erasure channel where feedback in the form of ack messages is fed back to the transmitter. We provide an upper bound to the capacity region of this system. We then present two algorithms whose rate region (information bits per transmitted bit) becomes arbitrarily close to the upper bound for large packet sizes. The first algorithm relies on random coding techniques while the second relies only on XOR operations between pairs of packets. Complexity and feedback information tradeoffs for the two algorithms are discussed. For the case where, in addition to traffic destined exclusively to either one of the users there is additional multicast traffic, we present an algorithm that shows that the rate region of the system can be increased by allowing intersession coding. Finally, for the case where there are random arrivals to the system we present an algorithm, based on the previous algorithms, whose stability region gets close to the capacity region for reasonably large packet sizes. The latter algorithm operates without knowledge of arrival process and channel statistics.
我们考虑双用户广播擦除信道,其中反馈以回消息的形式反馈给发射机。给出了该系统容量区域的上界。然后,我们提出了两种算法,其速率区域(每传输位的信息位)变得任意接近大数据包大小的上界。第一种算法依赖于随机编码技术,而第二种算法仅依赖于数据包对之间的异或操作。讨论了两种算法的复杂性和反馈信息权衡。在这种情况下,除了专用于任何一个用户的流量之外,还有额外的多播流量,我们提出了一种算法,该算法表明可以通过允许会话间编码来增加系统的速率区域。最后,对于随机到达系统的情况,我们在之前算法的基础上提出了一种算法,其稳定区域接近于合理大数据包大小的容量区域。后一种算法在不了解到达过程和信道统计的情况下运行。
{"title":"Broadcast erasure channel with feedback - Capacity and algorithms","authors":"L. Georgiadis, L. Tassiulas","doi":"10.1109/NETCOD.2009.5191394","DOIUrl":"https://doi.org/10.1109/NETCOD.2009.5191394","url":null,"abstract":"We consider the two-user broadcast erasure channel where feedback in the form of ack messages is fed back to the transmitter. We provide an upper bound to the capacity region of this system. We then present two algorithms whose rate region (information bits per transmitted bit) becomes arbitrarily close to the upper bound for large packet sizes. The first algorithm relies on random coding techniques while the second relies only on XOR operations between pairs of packets. Complexity and feedback information tradeoffs for the two algorithms are discussed. For the case where, in addition to traffic destined exclusively to either one of the users there is additional multicast traffic, we present an algorithm that shows that the rate region of the system can be increased by allowing intersession coding. Finally, for the case where there are random arrivals to the system we present an algorithm, based on the previous algorithms, whose stability region gets close to the capacity region for reasonably large packet sizes. The latter algorithm operates without knowledge of arrival process and channel statistics.","PeriodicalId":251096,"journal":{"name":"2009 Workshop on Network Coding, Theory, and Applications","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115221483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 131
On the limiting behavior of Random Linear Network Codes 随机线性网络码的极限行为
Pub Date : 2009-06-15 DOI: 10.1109/NETCOD.2009.5191385
Huseyin Balli, Zhen Zhang
The performance analysis of Random Linear Network Codes is important both theoretically and for its applications. In this paper, we derive improved upper bounds for the failure probability of random linear network codes and analyze the limiting behavior as the field size goes to infinity. Unlike the previously reported bounds, the new bound is shown to be tight as the field size |F| goes to infinity.
随机线性网络码的性能分析具有重要的理论意义和实际应用价值。本文导出了随机线性网络码失效概率的改进上界,并分析了其在域大小趋于无穷时的极限行为。与之前报道的边界不同,当场大小|F|趋于无穷时,新的边界被证明是紧密的。
{"title":"On the limiting behavior of Random Linear Network Codes","authors":"Huseyin Balli, Zhen Zhang","doi":"10.1109/NETCOD.2009.5191385","DOIUrl":"https://doi.org/10.1109/NETCOD.2009.5191385","url":null,"abstract":"The performance analysis of Random Linear Network Codes is important both theoretically and for its applications. In this paper, we derive improved upper bounds for the failure probability of random linear network codes and analyze the limiting behavior as the field size goes to infinity. Unlike the previously reported bounds, the new bound is shown to be tight as the field size |F| goes to infinity.","PeriodicalId":251096,"journal":{"name":"2009 Workshop on Network Coding, Theory, and Applications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117333228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adaptive network coding for broadcast channels 广播信道的自适应网络编码
Pub Date : 2009-06-15 DOI: 10.1109/NETCOD.2009.5191398
P. Sadeghi, D. Traskov, R. Koetter
We consider the throughput-delay tradeoff in network coded transmission over erasure broadcast channels. Interested in minimizing decoding delay, we formulate the problem of instantly decodable network coding as an integer linear program and propose algorithms to solve it heuristically. In particular, we investigate channels with memory and propose algorithms that can exploit channel erasure dependence to increase throughput and decrease delay.
我们考虑了网络编码传输在擦除广播信道上的吞吐量-延迟权衡。为了最小化解码延迟,我们将即时可解码的网络编码问题表述为一个整数线性规划,并提出了启发式解决该问题的算法。我们特别研究了有内存的信道,并提出了利用信道擦除依赖性来提高吞吐量和降低延迟的算法。
{"title":"Adaptive network coding for broadcast channels","authors":"P. Sadeghi, D. Traskov, R. Koetter","doi":"10.1109/NETCOD.2009.5191398","DOIUrl":"https://doi.org/10.1109/NETCOD.2009.5191398","url":null,"abstract":"We consider the throughput-delay tradeoff in network coded transmission over erasure broadcast channels. Interested in minimizing decoding delay, we formulate the problem of instantly decodable network coding as an integer linear program and propose algorithms to solve it heuristically. In particular, we investigate channels with memory and propose algorithms that can exploit channel erasure dependence to increase throughput and decrease delay.","PeriodicalId":251096,"journal":{"name":"2009 Workshop on Network Coding, Theory, and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123228288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Multiple source multiple destination topology inference using network coding 多源多目的拓扑推理使用网络编码
Pub Date : 2009-06-15 DOI: 10.1109/NETCOD.2009.5191391
Pegah Sattari, A. Markopoulou, C. Fragouli
In this paper, we combine network coding and tomographic techniques for topology inference. Our goal is to infer the topology of a network by sending probes between a given set of multiple sources and multiple receivers and by having intermediate nodes perform network coding operations. We combine and extend two ideas that have been developed independently. On one hand, network coding introduces topology-dependent correlation, which can then be exploited at the receivers to infer the topology [1]. On the other hand, it has been shown that a traditional (i.e., without network coding) multiple source, multiple receiver tomography problem can be decomposed into multiple two source, two receiver subproblems [2]. Our first contribution is to show that, when intermediate nodes perform network coding, topological information contained in network coded packets allows to accurately distinguish among all different 2-by-2 subnetwork components, which was not possible with traditional tomographic techniques. Our second contribution is to use this knowledge to merge the subnetworks and accurately reconstruct the general topology. Our approach is applicable to any general Internet-like topology, and is robust to the presence of delay variability and packet loss.
在本文中,我们结合网络编码和层析技术进行拓扑推断。我们的目标是通过在给定的多个源和多个接收器之间发送探测,以及让中间节点执行网络编码操作来推断网络的拓扑结构。我们结合并扩展了两个独立发展的想法。一方面,网络编码引入了拓扑相关,然后可以在接收器上利用它来推断拓扑[1]。另一方面,已有研究表明,传统的(即不带网络编码的)多源、多接收机层析成像问题可以分解为多个两源、两接收机子问题[2]。我们的第一个贡献是表明,当中间节点执行网络编码时,网络编码数据包中包含的拓扑信息允许准确区分所有不同的2 × 2子网组件,这是传统层析成像技术无法做到的。我们的第二个贡献是利用这些知识来合并子网并准确地重建一般拓扑。我们的方法适用于任何一般的类似互联网的拓扑结构,并且对延迟可变性和数据包丢失的存在具有鲁棒性。
{"title":"Multiple source multiple destination topology inference using network coding","authors":"Pegah Sattari, A. Markopoulou, C. Fragouli","doi":"10.1109/NETCOD.2009.5191391","DOIUrl":"https://doi.org/10.1109/NETCOD.2009.5191391","url":null,"abstract":"In this paper, we combine network coding and tomographic techniques for topology inference. Our goal is to infer the topology of a network by sending probes between a given set of multiple sources and multiple receivers and by having intermediate nodes perform network coding operations. We combine and extend two ideas that have been developed independently. On one hand, network coding introduces topology-dependent correlation, which can then be exploited at the receivers to infer the topology [1]. On the other hand, it has been shown that a traditional (i.e., without network coding) multiple source, multiple receiver tomography problem can be decomposed into multiple two source, two receiver subproblems [2]. Our first contribution is to show that, when intermediate nodes perform network coding, topological information contained in network coded packets allows to accurately distinguish among all different 2-by-2 subnetwork components, which was not possible with traditional tomographic techniques. Our second contribution is to use this knowledge to merge the subnetworks and accurately reconstruct the general topology. Our approach is applicable to any general Internet-like topology, and is robust to the presence of delay variability and packet loss.","PeriodicalId":251096,"journal":{"name":"2009 Workshop on Network Coding, Theory, and Applications","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129981485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Energy consumption in coded queues for wireless information exchange 用于无线信息交换的编码队列中的能耗
Pub Date : 2009-06-15 DOI: 10.1109/NETCOD.2009.5191390
J. Goseling, R. Boucherie, Jan-Kees van Ommeren
We show the close relation between network coding and queuing networks with negative and positive customers. Moreover, we develop Markov reward error bounding techniques for networks with negative and positive customers. We obtain bounds on the energy consumption in a wireless information exchange setting using network coding.
我们证明了网络编码与具有消极顾客和积极顾客的排队网络之间的密切关系。此外,我们开发了具有负客户和正客户的网络的马尔可夫奖励误差边界技术。我们利用网络编码得到了无线信息交换设置中能量消耗的边界。
{"title":"Energy consumption in coded queues for wireless information exchange","authors":"J. Goseling, R. Boucherie, Jan-Kees van Ommeren","doi":"10.1109/NETCOD.2009.5191390","DOIUrl":"https://doi.org/10.1109/NETCOD.2009.5191390","url":null,"abstract":"We show the close relation between network coding and queuing networks with negative and positive customers. Moreover, we develop Markov reward error bounding techniques for networks with negative and positive customers. We obtain bounds on the energy consumption in a wireless information exchange setting using network coding.","PeriodicalId":251096,"journal":{"name":"2009 Workshop on Network Coding, Theory, and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On error control codes for random network coding 随机网络编码中的错误控制码
Pub Date : 2009-06-15 DOI: 10.1109/NETCOD.2009.5191396
Rudolf Ahlswede, Harout K. Aydinian
The random network coding approach is an effective technique for linear network coding, however it is highly susceptible to errors and adversarial attacks. Recently Kötter and Kschischang [14] introduced the operator channel, where the inputs and outputs are subspaces of a given vector space, showing that this is a natural transmission model in noncoherent random network coding. A suitable metric, defined for subspaces: dS(U; V ) = dimU + dim V - 2 dim(U ∩ V), gives rise to the notion of codes capable of correcting different kinds of errors (like packet errors, erasures etc.) in noncoherent random network coding. In this paper we continue the study of coding for operator channels started in [14]. We consider codes correcting insertions/deletions (dimension enlargement and dimension reduction respectively). Bounds and constructions for those codes are presented.
随机网络编码方法是一种有效的线性网络编码方法,但它极易受到错误和对抗性攻击的影响。最近Kötter和Kschischang[14]引入了算子信道,其中输入和输出是给定向量空间的子空间,表明这是非相干随机网络编码中的自然传输模型。一个合适的度量,为子空间定义:dS(U;V) = dimU + dim V - 2 dim(U∩V),产生了在非相干随机网络编码中能够纠正不同类型错误(如数据包错误,擦除等)的代码的概念。本文继续研究从b[14]开始的运营商信道的编码问题。我们考虑代码纠正插入/删除(分别是维数扩大和维数减少)。给出了这些规范的边界和结构。
{"title":"On error control codes for random network coding","authors":"Rudolf Ahlswede, Harout K. Aydinian","doi":"10.1109/NETCOD.2009.5191396","DOIUrl":"https://doi.org/10.1109/NETCOD.2009.5191396","url":null,"abstract":"The random network coding approach is an effective technique for linear network coding, however it is highly susceptible to errors and adversarial attacks. Recently Kötter and Kschischang [14] introduced the operator channel, where the inputs and outputs are subspaces of a given vector space, showing that this is a natural transmission model in noncoherent random network coding. A suitable metric, defined for subspaces: dS(U; V ) = dimU + dim V - 2 dim(U ∩ V), gives rise to the notion of codes capable of correcting different kinds of errors (like packet errors, erasures etc.) in noncoherent random network coding. In this paper we continue the study of coding for operator channels started in [14]. We consider codes correcting insertions/deletions (dimension enlargement and dimension reduction respectively). Bounds and constructions for those codes are presented.","PeriodicalId":251096,"journal":{"name":"2009 Workshop on Network Coding, Theory, and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115840411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
2009 Workshop on Network Coding, Theory, and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1