Search Results - "Karger, D.R."
-
1
Chord: a scalable peer-to-peer lookup protocol for Internet applications
Published in IEEE/ACM transactions on networking (01-02-2003)“…A fundamental problem that confronts peer-to-peer applications is the efficient location of the node that stores a desired data item. This paper presents…”
Get full text
Journal Article -
2
A Random Linear Network Coding Approach to Multicast
Published in IEEE transactions on information theory (01-10-2006)“…We present a distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks…”
Get full text
Journal Article -
3
Using linear programming to Decode Binary linear codes
Published in IEEE transactions on information theory (01-03-2005)“…A new method is given for performing approximate maximum-likelihood (ML) decoding of an arbitrary binary linear code based on observations received from any…”
Get full text
Journal Article -
4
The benefits of coding over routing in a randomized setting
Published in IEEE International Symposium on Information Theory, 2003. Proceedings (2003)“…A novel randomized network coding approach for robust, distributed transmission and compression of information in networks is presented, and its advantages…”
Get full text
Conference Proceeding -
5
Minimum-cost multicast over coded packet networks
Published in IEEE transactions on information theory (01-06-2006)“…We consider the problem of establishing minimum-cost multicast connections over coded packet networks, i.e., packet networks where the contents of outgoing…”
Get full text
Journal Article -
6
Byzantine Modification Detection in Multicast Networks With Random Network Coding
Published in IEEE transactions on information theory (01-06-2008)“…An information-theoretic approach for detecting Byzantine or adversarial modifications in networks employing random linear network coding is described. Each…”
Get full text
Journal Article -
7
Network coding from a network flow perspective
Published in IEEE International Symposium on Information Theory, 2003. Proceedings (2003)“…Precise connections between algebraic network coding and network flows are explained in this article. Our combinatorial formulations offer new insights,…”
Get full text
Conference Proceeding -
8
Byzantine modification detection in multicast networks using randomized network coding
Published in International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings (2004)“…Distributed randomized network coding, a robust approach to multicasting in distributed network settings, can be extended to provide Byzantine modification…”
Get full text
Conference Proceeding -
9
Toward using the network as a switch: on the use of TDM in linear optical networks
Published in IEEE journal on selected areas in communications (01-08-2005)“…A common problem in optical networking is that the large quantity of raw bandwidth available in such networks is often difficult to access. We show that…”
Get full text
Journal Article -
10
On the Expected VCG Overpayment in Large Networks
Published in Proceedings of the 45th IEEE Conference on Decision and Control (01-12-2006)“…Motivated by the increasing need to price networks, we study the prices resulting from of a variant of the VCG mechanism, specifically defined for networks by…”
Get full text
Conference Proceeding -
11
Sharing information in time-division duplexing channels: A network coding approach
Published in 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) (01-09-2009)“…We study random linear network coding for time-division duplexing channels for sharing information between nodes. We assume a packet erasure channel with nodes…”
Get full text
Conference Proceeding -
12
(De)randomized construction of small sample spaces in /spl Nscr//spl Cscr
Published in Proceedings 35th Annual Symposium on Foundations of Computer Science (1994)“…D. Koller and N. Megiddo (1993) introduced the paradigm of constructing compact distributions that satisfy a given set of constraints, and showed how it can be…”
Get full text
Conference Proceeding -
13
Approximation algorithms for orienteering and discounted-reward TSP
Published in 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings (2003)“…In this paper, we give the first constant-factor approximation algorithm for the rooted orienteering problem, as well as a new problem that we call the…”
Get full text
Conference Proceeding -
14
Decoding turbo-like codes via linear programming
Published in Annual Symposium on Foundations of Computer Science (2002)“…We introduce a novel algorithm for decoding turbo-like codes based on linear programming. We prove that for the case of repeat-accumulate (RA) codes, under the…”
Get full text
Conference Proceeding -
15
Finding the hidden path: time bounds for all-pairs shortest paths
Published in [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science (1991)“…The all-pairs shortest paths problem in weighted graphs is investigated. An algorithm called the hidden paths algorithm, which finds these paths in time O(m*+n…”
Get full text
Conference Proceeding