Citation: | NING Zuoting, ZHANG Dafang, LIU Xuchong, “A Novel Approach of Network Coding in Wireless Networks Overhearing,” Chinese Journal of Electronics, vol. 27, no. 6, pp. 1297-1304, 2018, doi: 10.1049/cje.2018.06.010 |
R. Ahlswede, Ning Cai, S.-Y.R. Li, et al., “Network information flow”, IEEE Transactions on Information Theory, Vol.46, No.4, pp.1204-1216, 2000.
|
Lu Ji, Xiao Song and Wu Cheng-ke, “Opportunistic network coding based delay-sensitive broadcast transmission algorithm”, Acta Electronica Sinica, Vol.39, No.5, pp.1214-1219, 2011.
|
Katti S, Rahul H and Hu W, “Xors in the air: Practical wireless network coding”, IEEE/ACM Transactions on Networking, Vol.16, No.3, pp.497-510, 2008.
|
S.Y.R. Li, R.W. Yeung and N. Cai, “Linear network coding”, IEEE Trans. on Information Theory, Vol.49, No.2, pp.371-381, 2003.
|
T. Ho, R. Karger, M. Medard, et al, “The benefits of coding over routing in a randomized setting”, IEEE International Symposium on Information Theory, Yokohama, Japan p.442, 2003.
|
G. Dimakis, P.B. Godfrey, M. Wainwright, et al., “Network coding for distributed storage systems”, The 26th Annual IEEE Conference on Computer Communications (Infocom 2007), Anchorage, AK, USA, pp.2000-2008, 2007.
|
T. Ho, B. Leong, R. Koetter, et al., “Byzantine modification detection in multicast networks using randomized network coding”, International Symposium on Information Theory, Vol.54, No.6, p.144, 2013.
|
S. Katti, H. Rahul, W. Hu, et al., “XORs in the air: Practical wireless network coding”, SIGCOMM'06, ACM, Vol.36, pp.243-254, 2006.
|
G.S. Paschos, C. Fragiadakis, L. Georgiadis, et al., “Wireless network coding with partial overhearing information”, Proceedings IEEE INFOCOM, pp.2337-2345, 2013.
|
A. Khreishah, C.-C. Wang and N.B. Shroff, “Rate control with pairwise intersession network coding”, IEEE/ACM Transactions on Network, Vol.18, No.3, pp.816-829, 2010.
|
G.S. Paschos, L. Georgiadis and L. Tassiulas, “Scheduling with pairwise OXRing of packets under statistical overhearing information and feedback”, Queueing Systems, Vol.72, No.3, pp.361-395, 2012.
|
L. Georgiadis and L. Tassiulas, “Broadcast erasure channel with feedback capacity and algorithms”, Workshop on Network Coding, Vol.59, No.9, pp.54-61, 2009.
|
S. Athanasiadou, M. Gatzianas, L. Georgiadis, et al., “XOR based coding algorithms for the 3-user broadcast erasure channel with feedback”, RAWNET Workshop: Workshop on Resource Allocation and Cooperation in Wireless Networks, WiOPT, pp.417-424, 2012.
|
Chachulski s, Jennings M, Katti S, et al., “Trading structure for randomness in wireless opportunistic routing”, ACM Sigcomm Computer Communication Review, Vol.37, No.10, pp.169-180, 2007.
|
Le Jilin, JCS Lui and Chiu Dah Ming, “DCAR: Distributed codingaware routing in wireless networks”, Proceedings of 28th IEEE International Conference on Distributed Computing Systems, pp.462-469, 2008.
|
Omiwade So ji, Zheng Rong and Hua Cunqing, “Practical localized network coding in wireless mesh networks”, Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Crowne Plaza: IEEE Computer Society, pp.332-340, 2008.
|
P. Chaporkar and A. Proutiere, “Adaptive network coding and scheduling for maximizing throughput in wireless networks”, International Conference on Mobile Computing and Networking, Montréal, Québec, Canada, pp.135-146, 2007.
|
S. Rayanchu, S. Sen, J. Wu, et al., “Loss-aware network coding for unicast wireless sessions: Design, implementation, and performance evaluation”, ACM Sigmetrics Performance Evaluation Review, Vol.36, No.1, pp.85-96, 2008.
|
S. Chachulski, M. Jennings, S. Katti, et al., “Trading structure for randomness in wireless opportunistic routing”, ACM SIGCOMM Computer Communication Review, Vol.37, No.4, pp.169-180, 2007.
|
B. Scheuermann, W. Hu and J. Crowcroft, “Near-optimal coordinated coding in wireless multihop networks”, ACM Conference on Emerging Vetwork Experiment and Technology, CONEXT 2007, New York, NY, USA, pp.1-12, 2007.
|
L. Jilin, J. Lui and M. Dah, “How many packets can we encode? -An analysis of practical wireless network coding”, IEEE Conference on Computer Communications, pp.371-375, 2008.
|
P. Mannersalo, G. S. Paschos and L. Gkatzikis, “Performance of wireless network coding: Motivating small encoding numbers”, Computer Science, arXiv: 1010.0630v1, 2010.
|
Georgios S. Paschos, Constantinos Fragiadakis, Leonidas Georgiadis, et al., “Wireless network coding with partial overhearing information”, IEEE Proceedings INFOCOM, Vol.12, No.11, pp.2337-2345, 2013.
|
Abdallah Khreishah, Issa M. Khalil, Pouya Ostovari, et al., “Flow-based XOR network coding for lossy wireless networks”, IEEE Transaction on Wireless Communications, Vol.11, No.6, pp.2321-2329, 2012.
|
Wang Yu, Lu Han-cheng, HONG Pei lin, et al., “Overhearing management policies on network coding”, ACTA Electronica Sinica, Vol.1, No.40, pp.47-52, 2010.
|
Tinghuai Ma, Yuliang Zhang, Jie Cao, et al., “KDVEM: A k-degree anonymity with vertex and edge modification algorithm”, Computing, Vol.70, No.6, pp.1336-1344, 2015.
|
Zhangjie Fu, Jiangang Shu, Jin Wang, et al., ”Privacypreserving smart similarity search based on simhash over encrypted data in cloud computing”, Journal of Internet Technology, Vol.16, No.3, pp.453-460, 2015.
|