var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2F52xaJNXvSgauGDmZR&noBootstrap=1&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2F52xaJNXvSgauGDmZR&noBootstrap=1&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2F52xaJNXvSgauGDmZR&noBootstrap=1&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n Chaorui Yao; Pavlos Nikolopoulos; and Christina Fragouli.\n\n\n \n \n \n \n A Diagonal Splitting Algorithm for Adaptive Group Testing.\n \n \n \n\n\n \n\n\n\n In 2023 IEEE International Symposium on Information Theory (ISIT), pages 1842–1847, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{yao2023diagonal,\n  type={4},\n  tags={chaorui,pavlos},\n  title={A Diagonal Splitting Algorithm for Adaptive Group Testing},\n  author={Yao, Chaorui and Nikolopoulos, Pavlos and Fragouli, Christina},\n  booktitle={2023 IEEE International Symposium on Information Theory (ISIT)},\n  pages={1842--1847},\n  year={2023},\n  organization={IEEE},\n  doi={10.1109/ISIT54713.2023.10206936}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Osama A Hanna; Xinlin Li; Suhas Diggavi; and Christina Fragouli.\n\n\n \n \n \n \n Common information dimension.\n \n \n \n\n\n \n\n\n\n In 2023 IEEE International Symposium on Information Theory (ISIT), pages 406–411, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{hanna2023common,\n  type={4},\n  tags={xinlin,osama},\n  title={Common information dimension},\n  author={Hanna, Osama A and Li, Xinlin and Diggavi, Suhas and Fragouli, Christina},\n  booktitle={2023 IEEE International Symposium on Information Theory (ISIT)},\n  pages={406--411},\n  year={2023},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Osama A Hanna; Merve Karakas; Lin F Yang; and Christina Fragouli.\n\n\n \n \n \n \n Multi-Arm Bandits over Action Erasure Channels.\n \n \n \n\n\n \n\n\n\n In 2023 IEEE International Symposium on Information Theory (ISIT), pages 1312–1317, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{hanna2023multi,\n  type={4},\n  tags={merve,osama},\n  title={Multi-Arm Bandits over Action Erasure Channels},\n  author={Hanna, Osama A and Karakas, Merve and Yang, Lin F and Fragouli, Christina},\n  booktitle={2023 IEEE International Symposium on Information Theory (ISIT)},\n  pages={1312--1317},\n  year={2023},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n article\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n Osama A Hanna; Lin F Yang; and Christina Fragouli.\n\n\n \n \n \n \n Compression for Multi-Arm Bandits.\n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Information Theory. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hanna2023compression,\n  tags={osama},\n  title={Compression for Multi-Arm Bandits},\n  author={Hanna, Osama A and Yang, Lin F and Fragouli, Christina},\n  journal={IEEE Journal on Selected Areas in Information Theory},\n  year={2023},\n  publisher={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Osama Hanna; Lin Yang; and Christina Fragouli.\n\n\n \n \n \n \n Efficient Batched Algorithms for Contextual Linear Bandits with Large Action Space via Soft Elimination.\n \n \n \n\n\n \n\n\n\n Advances in Neural Information Processing Systems. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hanna2023efficient,\n  tags={osama},\n  title={Efficient Batched Algorithms for Contextual Linear Bandits with Large Action Space via Soft Elimination},\n  author={Hanna, Osama and Yang, Lin and Fragouli, Christina},\n  journal={Advances in Neural Information Processing Systems},\n  volume={},\n  pages={},\n  year={2023}\n}\n\n\n\n% Updated by Xinlin @ 2022-Aug.\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n inproceedings\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Osama A Hanna; Lin Yang; and Christina Fragouli.\n\n\n \n \n \n \n Contexts can be cheap: Solving stochastic contextual bandits with linear bandit algorithms.\n \n \n \n\n\n \n\n\n\n In The Thirty Sixth Annual Conference on Learning Theory, pages 1791–1821, 2023. PMLR\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{hanna2023contexts,\n  tags={osama},\n  title={Contexts can be cheap: Solving stochastic contextual bandits with linear bandit algorithms},\n  author={Hanna, Osama A and Yang, Lin and Fragouli, Christina},\n  booktitle={The Thirty Sixth Annual Conference on Learning Theory},\n  pages={1791--1821},\n  year={2023},\n  organization={PMLR}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Mine Gokce Dogan; Yahya H Ezzeldin; and Christina Fragouli.\n\n\n \n \n \n \n Gomory-hu trees over wireless.\n \n \n \n\n\n \n\n\n\n IEEE Communications Letters, 26(5): 1004–1007. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{dogan2022gomory,\n  type={2},\n  tags={na,mine},\n  title={Gomory-hu trees over wireless},\n  author={Dogan, Mine Gokce and Ezzeldin, Yahya H and Fragouli, Christina},\n  journal={IEEE Communications Letters},\n  volume={26},\n  number={5},\n  pages={1004--1007},\n  year={2022},\n  publisher={IEEE}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n Mine Gokce Dogan; Martina Cardone; and Christina Fragouli.\n\n\n \n \n \n \n Proactive Resilience in 1-2-1 Networks.\n \n \n \n\n\n \n\n\n\n In 2022 IEEE International Symposium on Information Theory (ISIT), pages 3220-3225, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9834416,\n  type={4},\n  tags={wireless,mine},\n  author={Dogan, Mine Gokce and Cardone, Martina and Fragouli, Christina},\n  booktitle={2022 IEEE International Symposium on Information Theory (ISIT)}, \n  title={Proactive Resilience in 1-2-1 Networks}, \n  year={2022},\n  volume={},\n  number={},\n  pages={3220-3225},\n  doi={10.1109/ISIT50566.2022.9834416}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Sundara Rajan Srinivasavaradhan; Pavlos Nikolopoulos; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Improving Group Testing via Gradient Descent.\n \n \n \n\n\n \n\n\n\n In 2022 IEEE International Symposium on Information Theory (ISIT), pages 2243-2248, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 10 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9834577,\n  type={4},\n  tags={group_testing,pavlos},\n  author={Srinivasavaradhan, Sundara Rajan and Nikolopoulos, Pavlos and Fragouli, Christina and Diggavi, Suhas},\n  booktitle={2022 IEEE International Symposium on Information Theory (ISIT)}, \n  title={Improving Group Testing via Gradient Descent}, \n  year={2022},\n  volume={},\n  number={},\n  pages={2243-2248},\n  doi={10.1109/ISIT50566.2022.9834577}}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Osama A. Hanna; Xinlin Li; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Can we break the dependency in distributed detection?.\n \n \n \n\n\n \n\n\n\n In 2022 IEEE International Symposium on Information Theory (ISIT), pages 2720-2725, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9834790,\n  type={4},\n  tags={ML_CC,osama,xinlin},\n  author={Hanna, Osama A. and Li, Xinlin and Fragouli, Christina and Diggavi, Suhas},\n  booktitle={2022 IEEE International Symposium on Information Theory (ISIT)}, \n  title={Can we break the dependency in distributed detection?}, \n  year={2022},\n  volume={},\n  number={},\n  pages={2720-2725},\n  doi={10.1109/ISIT50566.2022.9834790}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Sundara Rajan Srinivasavaradhan; Pavlos Nikolopoulos; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Dynamic group testing to control and monitor disease progression in a population.\n \n \n \n\n\n \n\n\n\n In 2022 IEEE International Symposium on Information Theory (ISIT), pages 2255-2260, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9834823,\n  type={4},\n  tags = {group_testing,pavlos},\n  author={Srinivasavaradhan, Sundara Rajan and Nikolopoulos, Pavlos and Fragouli, Christina and Diggavi, Suhas},\n  booktitle={2022 IEEE International Symposium on Information Theory (ISIT)}, \n  title={Dynamic group testing to control and monitor disease progression in a population}, \n  year={2022},\n  volume={},\n  number={},\n  pages={2255-2260},\n  doi={10.1109/ISIT50566.2022.9834823}}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Osama A. Hanna; Lin F. Yang; and Christina Fragouli.\n\n\n \n \n \n \n Solving Multi-Arm Bandit Using a Few Bits of Communication.\n \n \n \n\n\n \n\n\n\n In International Conference on Artificial Intelligence and Statistics, pages 3220-3225, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{Hanna2022SolvingMB,\n  type={4},\n  tags={ML_CC,osama},\n  author={Osama A. Hanna and Lin F. Yang and Christina Fragouli},\n  booktitle={International Conference on Artificial Intelligence and Statistics}, \n  title={Solving Multi-Arm Bandit Using a Few Bits of Communication},\n  year={2022},\n  pages={3220-3225}}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n article\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n Osama A Hanna; Lin F Yang; and Christina Fragouli.\n\n\n \n \n \n \n Learning in distributed contextual linear bandits without sharing the context.\n \n \n \n\n\n \n\n\n\n arXiv preprint arXiv:2206.04180. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hanna2022learning,\n  tags={osama},\n  title={Learning in distributed contextual linear bandits without sharing the context},\n  author={Hanna, Osama A and Yang, Lin F and Fragouli, Christina},\n  journal={arXiv preprint arXiv:2206.04180},\n  year={2022}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Osama Hanna; Lin Yang; and Christina Fragouli.\n\n\n \n \n \n \n Learning from Distributed Users in Contextual Linear Bandits Without Sharing the Context.\n \n \n \n\n\n \n\n\n\n Advances in Neural Information Processing Systems, 35: 11049–11062. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hanna2022learning2,\n  tags={osama},\n  title={Learning from Distributed Users in Contextual Linear Bandits Without Sharing the Context},\n  author={Hanna, Osama and Yang, Lin and Fragouli, Christina},\n  journal={Advances in Neural Information Processing Systems},\n  volume={35},\n  pages={11049--11062},\n  year={2022}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Osama A Hanna; Antonious M Girgis; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Differentially private stochastic linear bandits:(almost) for free.\n \n \n \n\n\n \n\n\n\n arXiv preprint arXiv:2207.03445. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hanna2022differentially,\n  tags={osama},\n  title={Differentially private stochastic linear bandits:(almost) for free},\n  author={Hanna, Osama A and Girgis, Antonious M and Fragouli, Christina and Diggavi, Suhas},\n  journal={arXiv preprint arXiv:2207.03445},\n  year={2022}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n Yanwen Mao; Suhas Diggavi; Christina Fragouli; and Paulo Tabuada.\n\n\n \n \n \n \n Secure State-Reconstruction Over Networks Subject to Attacks.\n \n \n \n\n\n \n\n\n\n IEEE Control Systems Letters, 5(1): 157-162. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9112310,\n  type={2},\n  tags = {security},\n  author={Mao, Yanwen and Diggavi, Suhas and Fragouli, Christina and Tabuada, Paulo},\n  journal={IEEE Control Systems Letters}, \n  title={Secure State-Reconstruction Over Networks Subject to Attacks}, \n  year={2021},\n  volume={5},\n  number={1},\n  pages={157-162},\n  doi={10.1109/LCSYS.2020.3000853}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Gaurav Kumar Agarwal; Mohammed Karmoose; Suhas Diggavi; Christina Fragouli; and Paulo Tabuada.\n\n\n \n \n \n \n Distortion-Based Lightweight Security for Cyber-Physical Systems.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Automatic Control, 66(4): 1588-1601. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9133260,\n  type={2},\n  tags = {security},\n  author={Agarwal, Gaurav Kumar and Karmoose, Mohammed and Diggavi, Suhas and Fragouli, Christina and Tabuada, Paulo},\n  journal={IEEE Transactions on Automatic Control}, \n  title={Distortion-Based Lightweight Security for Cyber-Physical Systems}, \n  year={2021},\n  volume={66},\n  number={4},\n  pages={1588-1601},\n  doi={10.1109/TAC.2020.3006814}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Sundara Rajan Srinivasavaradhan; Michelle Du; Suhas N. Diggavi; and Christina Fragouli.\n\n\n \n \n \n \n Algorithms for Reconstruction Over Single and Multiple Deletion Channels.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 67(6): 3389-3410. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9239329,\n  type={2},\n  tags = {bio,channel_coding},\n  author={Srinivasavaradhan, Sundara Rajan and Du, Michelle and Diggavi, Suhas N. and Fragouli, Christina},\n  journal={IEEE Transactions on Information Theory}, \n  title={Algorithms for Reconstruction Over Single and Multiple Deletion Channels}, \n  year={2021},\n  volume={67},\n  number={6},\n  pages={3389-3410},\n  doi={10.1109/TIT.2020.3033513}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Yahya H. Ezzeldin; Martina Cardone; Christina Fragouli; and Giuseppe Caire.\n\n\n \n \n \n \n Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 67(2): 961-990. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9244138,\n  type={2},\n  tags = {wireless},\n  author={Ezzeldin, Yahya H. and Cardone, Martina and Fragouli, Christina and Caire, Giuseppe},\n  journal={IEEE Transactions on Information Theory}, \n  title={Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications}, \n  year={2021},\n  volume={67},\n  number={2},\n  pages={961-990},\n  doi={10.1109/TIT.2020.3034569}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Xiaoshen Song; Yahya H. Ezzeldin; Giuseppe Caire; and Christina Fragouli.\n\n\n \n \n \n \n Efficient Beam Scheduling for Half-Duplex mmWave Relay Networks.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Communications, 69(9): 5773-5789. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9448027,\ntype={2},\n  author={Song, Xiaoshen and Ezzeldin, Yahya H. and Caire, Giuseppe and Fragouli, Christina},\n  journal={IEEE Transactions on Communications}, \n  title={Efficient Beam Scheduling for Half-Duplex mmWave Relay Networks}, \n  year={2021},\n  volume={69},\n  number={9},\n  tags = {wireless},\n  pages={5773-5789},\n  doi={10.1109/TCOMM.2021.3087203}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Osama A. Hanna; Yahya H. Ezzeldin; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Quantization of Distributed Data for Learning.\n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Information Theory, 2(3): 987-1001. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9521982,\n  type={2},\n  tags={osama},\n  author={Hanna, Osama A. and Ezzeldin, Yahya H. and Fragouli, Christina and Diggavi, Suhas},\n  journal={IEEE Journal on Selected Areas in Information Theory}, \n  title={Quantization of Distributed Data for Learning}, \n  year={2021},\n  volume={2},\n  number={3},\n  pages={987-1001},\n  tags = {ML_CC},\n  doi={10.1109/JSAIT.2021.3105359}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Pavlos Nikolopoulos; Sundara Rajan Srinivasavaradhan; Christina Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n Group Testing for Community Infections.\n \n \n \n\n\n \n\n\n\n IEEE BITS the Information Theory Magazine, 1(1): 57-68. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9609622,\n  type={2},\n  tags={group_testing,pavlos},\n  author={Nikolopoulos, Pavlos and Srinivasavaradhan, Sundara Rajan and Fragouli, Christina and Diggavi, Suhas N.},\n  journal={IEEE BITS the Information Theory Magazine}, \n  title={Group Testing for Community Infections}, \n  year={2021},\n  volume={1},\n  number={1},\n  pages={57-68},\n  doi={10.1109/MBITS.2021.3126244}}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n Yahya H. Ezzeldin; Martina Cardone; and Christina Fragouli.\n\n\n \n \n \n \n Multilevel Secrecy over 1-2-1 Networks.\n \n \n \n\n\n \n\n\n\n In 2020 IEEE Information Theory Workshop (ITW), pages 1-5, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9457663,\n  type={4},\n  author={Ezzeldin, Yahya H. and Cardone, Martina and Fragouli, Christina},\n  booktitle={2020 IEEE Information Theory Workshop (ITW)}, \n  title={Multilevel Secrecy over 1-2-1 Networks}, \n  year={2021},\n  volume={},\n  number={},\n  tags = {wireless,security},\n  pages={1-5},\n  doi={10.1109/ITW46852.2021.9457663}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Mine Gokce Dogan; Yahya H. Ezzeldin; and Christina Fragouli.\n\n\n \n \n \n \n On optimal relay placement in directional networks.\n \n \n \n\n\n \n\n\n\n In 2021 IEEE International Symposium on Information Theory (ISIT), pages 3156-3161, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9517757,\n  type={4},\n  tags={wireless,mine},\n  author={Dogan, Mine Gokce and Ezzeldin, Yahya H. and Fragouli, Christina},\n  booktitle={2021 IEEE International Symposium on Information Theory (ISIT)}, \n  title={On optimal relay placement in directional networks}, \n  year={2021},\n  volume={},\n  number={},\n  pages={3156-3161},\n  doi={10.1109/ISIT45174.2021.9517757}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Sundara Rajan Srinivasavaradhan; Pavlos Nikolopoulos; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n An entropy reduction approach to continual testing.\n \n \n \n\n\n \n\n\n\n In 2021 IEEE International Symposium on Information Theory (ISIT), pages 611-616, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9518188,\n  type={4},\n  tags={group_testing,pavlos},\n  author={Srinivasavaradhan, Sundara Rajan and Nikolopoulos, Pavlos and Fragouli, Christina and Diggavi, Suhas},\n  booktitle={2021 IEEE International Symposium on Information Theory (ISIT)}, \n  title={An entropy reduction approach to continual testing}, \n  year={2021},\n  volume={},\n  number={},\n  pages={611-616},\n  doi={10.1109/ISIT45174.2021.9518188}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Jonathan Bunton; Tzanis Anevlavis; Gunjan Verma; Christina Fragouli; and Paulo Tabuada.\n\n\n \n \n \n \n Split to win: near-optimal sensor network synthesis via path-greedy subproblems.\n \n \n \n\n\n \n\n\n\n In MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM), pages 789-794, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9652975,\n  type={4},\n  tags = {na},\n  author={Bunton, Jonathan and Anevlavis, Tzanis and Verma, Gunjan and Fragouli, Christina and Tabuada, Paulo},\n  booktitle={MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)}, \n  title={Split to win: near-optimal sensor network synthesis via path-greedy subproblems}, \n  year={2021},\n  volume={},\n  number={},\n  pages={789-794},\n  doi={10.1109/MILCOM52596.2021.9652975}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Mine Gokce Dogan; Yahya H. Ezzeldin; Christina Fragouli; and Addison W. Bohannon.\n\n\n \n \n \n \n A Reinforcement Learning Approach for Scheduling in mmWave Networks.\n \n \n \n\n\n \n\n\n\n In MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM), pages 771-776, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9653135,\n  type={4},\n  tags = {wireless,mine},\n  author={Dogan, Mine Gokce and Ezzeldin, Yahya H. and Fragouli, Christina and Bohannon, Addison W.},\n  booktitle={MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)}, \n  title={A Reinforcement Learning Approach for Scheduling in mmWave Networks}, \n  year={2021},\n  volume={},\n  number={},\n  pages={771-776},\n  doi={10.1109/MILCOM52596.2021.9653135}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Pavlos Nikolopoulos; Sundara Rajan Srinivasavaradhan; Tao Guo; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n \n Group testing for connected communities .\n \n \n \n \n\n\n \n\n\n\n In Arindam Banerjee; and Kenji Fukumizu., editor(s), Proceedings of The 24th International Conference on Artificial Intelligence and Statistics, volume 130, of Proceedings of Machine Learning Research, pages 2341–2349, 13–15 Apr 2021. PMLR\n \n\n\n\n
\n\n\n\n \n \n \"GroupPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{pmlr-v130-nikolopoulos21a,\n  type={4},\n  tags={group_testing,pavlos},\n  title =  { Group testing for connected communities },\n  author =  {Nikolopoulos, Pavlos and Rajan Srinivasavaradhan, Sundara and Guo, Tao and Fragouli, Christina and Diggavi, Suhas},\n  booktitle =  {Proceedings of The 24th International Conference on Artificial Intelligence and Statistics},\n  pages =  {2341--2349},\n  year = {2021},\n  editor = {Banerjee, Arindam and Fukumizu, Kenji},\n  volume = {130},\n  series = {Proceedings of Machine Learning Research},\n  month =  {13--15 Apr},\n  publisher =    {PMLR},\n  pdf =    {http://proceedings.mlr.press/v130/nikolopoulos21a/nikolopoulos21a.pdf},\n  url =    {https://proceedings.mlr.press/v130/nikolopoulos21a.html}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Rasmus Vestergaard; Osama Hanna; Linqi Song; Daniel E Lucani; and Christina Fragouli.\n\n\n \n \n \n \n On Coded Broadcasting for Wireless Recommendation Systems.\n \n \n \n\n\n \n\n\n\n In ICC 2021-IEEE International Conference on Communications, pages 1–6, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{vestergaard2021coded,\n  type={4},\n  tags={osama},\n  title={On Coded Broadcasting for Wireless Recommendation Systems},\n  author={Vestergaard, Rasmus and Hanna, Osama and Song, Linqi and Lucani, Daniel E and Fragouli, Christina},\n  booktitle={ICC 2021-IEEE International Conference on Communications},\n  pages={1--6},\n  year={2021},\n  tags = {ML_CC},\n  organization={IEEE}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Pavlos Nikolopoulos; Sundara Rajan Srinivasavaradhan; Tao Guo; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Group testing for overlapping communities.\n \n \n \n\n\n \n\n\n\n In IEEE International Conference on Communications (ICC), July 2021. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{nikolopoulos2020ICC,\n  type={4},\n  tags = {group_testing,pavlos},\n  author = {Nikolopoulos, Pavlos and Srinivasavaradhan, Sundara Rajan and Guo, Tao and Fragouli, Christina and Diggavi, Suhas},\n  booktitle = {{IEEE} {International} {Conference on} {Communications} ({ICC})},\n  title = {Group testing for overlapping communities},\n  month = July,\n  year = {2021}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n inproceedings\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Rasmus Vestergaard; Osama Hanna; Linqi Song; Daniel E Lucani; and Christina Fragouli.\n\n\n \n \n \n \n On Coded Broadcasting for Wireless Recommendation Systems.\n \n \n \n\n\n \n\n\n\n In ICC 2021-IEEE International Conference on Communications, pages 1–6, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{vestergaard2021coded,\n  tags={osama},\n  title={On Coded Broadcasting for Wireless Recommendation Systems},\n  author={Vestergaard, Rasmus and Hanna, Osama and Song, Linqi and Lucani, Daniel E and Fragouli, Christina},\n  booktitle={ICC 2021-IEEE International Conference on Communications},\n  pages={1--6},\n  year={2021},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 1\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Pavlos Nikolopoulos; Tao Guo; Sundara Rajan Srinivasavaradhan; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Community aware group testing.\n \n \n \n\n\n \n\n\n\n arXiv preprint arXiv:2007.08111. July 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{nikolopoulos2020community,\n  type={1},\n  title={Community aware group testing},\n  author={Nikolopoulos, Pavlos and Guo, Tao and Srinivasavaradhan, Sundara Rajan and Fragouli, Christina and Diggavi, Suhas},\n  journal={arXiv preprint arXiv:2007.08111},\n  tags = {group_testing},\n  month = July,\n  year={2020}\n}\n\n% @article{nikolopoulos2020group,\n%   type={1},\n%   title={Group testing for overlapping communities},\n%   author={Nikolopoulos, Pavlos and Srinivasavaradhan, Sundara Rajan and Guo, Tao and Fragouli, Christina and Diggavi, Suhas},\n%   journal={arXiv preprint arXiv:2012.02804},\n%   tags = {group_testing},\n%   month = dec,\n%   year={2020}\n% }\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n Linqi Song; Christina Fragouli; and Tianchu Zhao.\n\n\n \n \n \n \n A Pliable Index Coding Approach to Data Shuffling.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 66(3): 1333-1353. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{8906011,\n  type={2},\n  tags = {network_coding},\n  author={Song, Linqi and Fragouli, Christina and Zhao, Tianchu},\n  journal={IEEE Transactions on Information Theory}, \n  title={A Pliable Index Coding Approach to Data Shuffling}, \n  year={2020},\n  volume={66},\n  number={3},\n  pages={1333-1353},\n  doi={10.1109/TIT.2019.2954338}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Mohammed Karmoose; Linqi Song; Martina Cardone; and Christina Fragouli.\n\n\n \n \n \n \n Privacy in Index Coding: $k$ -Limited-Access Schemes.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 66(5): 2625-2641. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{8922781,\n  type={2},\n  tags={na},\n  author={Karmoose, Mohammed and Song, Linqi and Cardone, Martina and Fragouli, Christina},\n  journal={IEEE Transactions on Information Theory}, \n  title={Privacy in Index Coding:  $k$ -Limited-Access Schemes}, \n  year={2020},\n  volume={66},\n  number={5},\n  pages={2625-2641},\n  doi={10.1109/TIT.2019.2957577}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Yahya H. Ezzeldin; Martina Cardone; Christina Fragouli; and Daniela Tuninetti.\n\n\n \n \n \n \n The Approximate Capacity of Half-Duplex Line Networks.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 66(7): 4449-4467. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9103123,\n  type={2},\n  tags={na},\n  author={Ezzeldin, Yahya H. and Cardone, Martina and Fragouli, Christina and Tuninetti, Daniela},\n  journal={IEEE Transactions on Information Theory}, \n  title={The Approximate Capacity of Half-Duplex Line Networks}, \n  year={2020},\n  volume={66},\n  number={7},\n  pages={4449-4467},\n  doi={10.1109/TIT.2020.2998184}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Yahya H. Ezzeldin; Ayan Sengupta; and Christina Fragouli.\n\n\n \n \n \n \n Wireless Network Simplification: The Performance of Routing.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 66(9): 5703-5711. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9145607,\n  type={2},\n  tags={na},\n  author={Ezzeldin, Yahya H. and Sengupta, Ayan and Fragouli, Christina},\n  journal={IEEE Transactions on Information Theory}, \n  title={Wireless Network Simplification: The Performance of Routing}, \n  year={2020},\n  volume={66},\n  number={9},\n  pages={5703-5711},\n  doi={10.1109/TIT.2020.3010990}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Antonious M. Girgis; Deepesh Data; Kamalika Chaudhuri; Christina Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n Successive Refinement of Privacy.\n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Information Theory, 1(3): 745-759. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9270285,\n  type={2},\n  tags={na},\n  author={Girgis, Antonious M. and Data, Deepesh and Chaudhuri, Kamalika and Fragouli, Christina and Diggavi, Suhas N.},\n  journal={IEEE Journal on Selected Areas in Information Theory}, \n  title={Successive Refinement of Privacy}, \n  year={2020},\n  volume={1},\n  number={3},\n  pages={745-759},\n  doi={10.1109/JSAIT.2020.3040403}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n G. K. Agarwal; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n On secure network coding for multiple unicast traffic.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{agarwal_secure_2020,\n type={2},\n author = {Agarwal, G. K. and Cardone, M. and Fragouli, C.},\n journal = {IEEE Transactions on Information Theory},\n tags = {security},\n title = {On secure network coding for multiple unicast traffic},\n year = {2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n O. A. Hanna; Y. H. Ezzeldin; T. Sadjadpour; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n On Distributed Quantization for Classification.\n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Information Theory. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hanna_distributed_2020,\n type={2},\n tags={osama},\n author = {Hanna, O. A. and Ezzeldin, Y. H. and Sadjadpour, T. and Fragouli, C. and Diggavi, S.},\n journal = {IEEE Journal on Selected Areas in Information Theory},\n tags = {ML_CC},\n title = {On Distributed Quantization for Classification},\n year = {2020}\n}\n\n\n% @article{srinivasavaradhan2020algorithms,\n%   type={1},\n%   title={Algorithms for reconstruction over single and multiple deletion channels},\n%   author={Srinivasavaradhan, SR and Du, Michelle and Diggavi, S. and Fragouli, C.},\n%   journal={arXiv preprint arXiv:2005.14388},\n%   tags = {bio,channel_coding},\n%   year={2020}\n% }\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n G. K. Agarwal; M. Karmoose; S. Diggavi; C. Fragouli; and P. Tabuada.\n\n\n \n \n \n \n Distortion based Light-weight Security for Cyber-Physical Systems.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Automatic Control. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{agarwal_distortion_2020,\n type={2},\n author = {Agarwal, G. K. and Karmoose, M. and Diggavi, S. and Fragouli, C. and Tabuada, P.},\n journal = {IEEE Transactions on Automatic Control},\n tags = {security},\n title = {Distortion based {Light}-weight {Security} for {Cyber}-{Physical} {Systems}},\n year = {2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. H. Ezzeldin; M. Cardone; C. Fragouli; and D. Tuninetti.\n\n\n \n \n \n \n The Approximate Capacity of Half-Duplex Line Networks.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ezzeldin_approximate_2020,\n type={2},\n author = {Ezzeldin, Y. H. and Cardone, M. and Fragouli, C. and Tuninetti, D.},\n journal = {IEEE Transactions on Information Theory},\n tags = {wireless},\n title = {The {Approximate} {Capacity} of {Half}-{Duplex} {Line} {Networks}},\n year = {2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. H. Ezzeldin; A. Sengupta; and C. Fragouli.\n\n\n \n \n \n \n Wireless Network Simplification: The Performance of Routing.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ezzeldin_wireless_2020,\n type={2},\n author = {Ezzeldin, Y. H. and Sengupta, A. and Fragouli, C.},\n journal = {IEEE Transactions on Information Theory},\n tags = {wireless},\n title = {Wireless {Network} {Simplification}: {The} {Performance} of {Routing}},\n year = {2020}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n Sundara Rajan Srinivasavaradhan; Suhas Diggavi; and Christina Fragouli.\n\n\n \n \n \n \n Equivalence of ML decoding to a continuous optimization problem.\n \n \n \n\n\n \n\n\n\n In 2020 IEEE International Symposium on Information Theory (ISIT), pages 343-348, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9174130,\n  type={4},\n  tags = {bio},\n  author={Srinivasavaradhan, Sundara Rajan and Diggavi, Suhas and Fragouli, Christina},\n  booktitle={2020 IEEE International Symposium on Information Theory (ISIT)}, \n  title={Equivalence of ML decoding to a continuous optimization problem}, \n  year={2020},\n  volume={},\n  number={},\n  pages={343-348},\n  doi={10.1109/ISIT44484.2020.9174130}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Yahya H. Ezzeldin; Martina Cardone; Christina Fragouli; and Giuseppe Caire.\n\n\n \n \n \n \n Gaussian 1-2-1 Networks with Imperfect Beamforming.\n \n \n \n\n\n \n\n\n\n In 2020 IEEE International Symposium on Information Theory (ISIT), pages 1599-1604, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9174233,\n  type={4},\n  tags = {wireless},\n  author={Ezzeldin, Yahya H. and Cardone, Martina and Fragouli, Christina and Caire, Giuseppe},\n  booktitle={2020 IEEE International Symposium on Information Theory (ISIT)}, \n  title={Gaussian 1-2-1 Networks with Imperfect Beamforming}, \n  year={2020},\n  volume={},\n  number={},\n  pages={1599-1604},\n  doi={10.1109/ISIT44484.2020.9174233}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Tan Li; Linqi Song; and Christina Fragouli.\n\n\n \n \n \n \n Federated Recommendation System via Differential Privacy.\n \n \n \n\n\n \n\n\n\n In 2020 IEEE International Symposium on Information Theory (ISIT), pages 2592-2597, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9174297,\n  type={4},\n  tags = {na},\n  author={Li, Tan and Song, Linqi and Fragouli, Christina},\n  booktitle={2020 IEEE International Symposium on Information Theory (ISIT)}, \n  title={Federated Recommendation System via Differential Privacy}, \n  year={2020},\n  volume={},\n  number={},\n  pages={2592-2597},\n  doi={10.1109/ISIT44484.2020.9174297}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n J. C. Rebanal; Y. H. Ezzeldin; ; C. Fragouli; and P. Tabuada.\n\n\n \n \n \n \n A coding approach to localization using landmarks.\n \n \n \n\n\n \n\n\n\n In IEEE Globecom, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{rebanal_distorting_2020,\n type={4},\n author = {Rebanal, J. C. and Ezzeldin, Y. H. and and Fragouli, C. and Tabuada, P.},\n booktitle = {{IEEE} Globecom},\n tags = {channel_coding},\n title = {A coding approach to localization using landmarks},\n year = {2020}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y Mao; S. Diggavi; C. Fragouli; and P. Tabuada.\n\n\n \n \n \n \n Secure State-Reconstruction Over Networks Subject to Attacks.\n \n \n \n\n\n \n\n\n\n IEEE Control Systems Letters. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{mao_secure_2020,\n type={4},\n author = {Mao, Y and Diggavi, S. and Fragouli, C. and Tabuada, P.},\n journal = {IEEE Control Systems Letters},\n tags = {security},\n title = {Secure {State}-{Reconstruction} {Over} {Networks} {Subject} to {Attacks}},\n year = {2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n SR Srinivasavaradhan; C. Fragouli; and S. N. Diggavi.\n\n\n \n \n \n \n Equivalence of ML decoding to a continuous optimization problem.\n \n \n \n\n\n \n\n\n\n IEEE Symposium on Information Theory. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{srinivasavaradhan_equivalence_2020,\n type={4},\n author = {Srinivasavaradhan, SR and Fragouli, C. and Diggavi, S. N.},\n journal = {IEEE Symposium on Information Theory},\n tags = {channel_coding, bio},\n title = {Equivalence of {ML} decoding to a continuous optimization problem},\n year = {2020}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n Mohammed Karmoose; Christina Fragouli; Suhas Diggavi; Rafael Misoczki; Lily L. Yang; and Zhenliang Zhang.\n\n\n \n \n \n \n Using mm-Waves for Secret Key Establishment.\n \n \n \n\n\n \n\n\n\n IEEE Communications Letters, 23(6): 1077-1080. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{8684919,\n  type={2},\n  tags={na},\n  author={Karmoose, Mohammed and Fragouli, Christina and Diggavi, Suhas and Misoczki, Rafael and Yang, Lily L. and Zhang, Zhenliang},\n  journal={IEEE Communications Letters}, \n  title={Using mm-Waves for Secret Key Establishment}, \n  year={2019},\n  volume={23},\n  number={6},\n  pages={1077-1080},\n  doi={10.1109/LCOMM.2019.2909918}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Yahya H. Ezzeldin; Martina Cardone; Christina Fragouli; and Daniela Tuninetti.\n\n\n \n \n \n \n Network Simplification in Half-Duplex: Building on Submodularity.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 65(10): 6801-6818. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{8742589,\n  type={2},\n  tags={na},\n  author={Ezzeldin, Yahya H. and Cardone, Martina and Fragouli, Christina and Tuninetti, Daniela},\n  journal={IEEE Transactions on Information Theory}, \n  title={Network Simplification in Half-Duplex: Building on Submodularity}, \n  year={2019},\n  volume={65},\n  number={10},\n  pages={6801-6818},\n  doi={10.1109/TIT.2019.2923994}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Linqi Song; Christina Fragouli; and Devavrat Shah.\n\n\n \n \n \n \n Interactions Between Learning and Broadcasting in Wireless Recommendation Systems.\n \n \n \n\n\n \n\n\n\n In 2019 IEEE International Symposium on Information Theory (ISIT), pages 2549-2553, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{8849556,\n  type={2},\n  tags={na},\n  author={Song, Linqi and Fragouli, Christina and Shah, Devavrat},\n  booktitle={2019 IEEE International Symposium on Information Theory (ISIT)}, \n  title={Interactions Between Learning and Broadcasting in Wireless Recommendation Systems}, \n  year={2019},\n  volume={},\n  number={},\n  pages={2549-2553},\n  doi={10.1109/ISIT.2019.8849556}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Gaurav Kumar Agarwal; Martina Cardone; and Christina Fragouli.\n\n\n \n \n \n \n On Secure Capacity of Multiple Unicast Traffic over Separable Networks.\n \n \n \n\n\n \n\n\n\n In 2019 IEEE Information Theory Workshop (ITW), pages 1-5, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{8988985,\n  type={2},\n  tags={na},\n  author={Agarwal, Gaurav Kumar and Cardone, Martina and Fragouli, Christina},\n  booktitle={2019 IEEE Information Theory Workshop (ITW)}, \n  title={On Secure Capacity of Multiple Unicast Traffic over Separable Networks}, \n  year={2019},\n  volume={},\n  number={},\n  pages={1-5},\n  doi={10.1109/ITW44776.2019.8988985}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. H. Ezzeldin; M. Cardone; C. Fragouli; and D. Tuninetti.\n\n\n \n \n \n \n Network Simplification: Building on Submodularity.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ezzeldin_network_2019,\n type={2},\n author = {Ezzeldin, Y. H. and Cardone, M. and Fragouli, C. and Tuninetti, D.},\n journal = {IEEE Transactions on Information Theory},\n tags = {wireless},\n title = {Network {Simplification}: {Building} on {Submodularity}},\n year = {2019}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Karmoose; L. Song; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n Privacy in Index Coding: k-Limited-Access Schemes.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{karmoose_privacy_2019,\n type={2},\n author = {Karmoose, M. and Song, L. and Cardone, M. and Fragouli, C.},\n journal = {IEEE Transactions on Information Theory},\n tags = {network_coding},\n title = {Privacy in {Index} {Coding}: k-{Limited}-{Access} {Schemes}},\n year = {2019}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n L. Song; C. Fragouli; and D. Shah.\n\n\n \n \n \n \n Interactions Between Learning and Broadcasting in Wireless Recommendation Systems.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{song_interactions_2019,\n type={4},\n author = {Song, L. and Fragouli, C. and Shah, D.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {ML_CC},\n title = {Interactions {Between} {Learning} and {Broadcasting} in {Wireless} {Recommendation} {Systems}},\n year = {2019}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. H. Ezzeldin; C. Fragouli; and S. N. Diggavi.\n\n\n \n \n \n \n Quantizing Signals for Linear Classification.\n \n \n \n\n\n \n\n\n\n IEEE International Symposium of Information Theory (ISIT). 2019.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ezzeldin_quantizing_2019,\n type={4},\n author = {Ezzeldin, Y. H. and Fragouli, C. and Diggavi, S. N.},\n journal = {IEEE International Symposium of Information Theory (ISIT)},\n tags = {ML_CC},\n title = {Quantizing Signals for Linear Classification},\n year = {2019}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n G. K. Agarwal; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n On Secure Capacity of Multiple Unicast Traffic over Separable Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Workshop on Information Theory (ITW), 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{agarwal_secure_2019,\n type={4},\n author = {Agarwal, G. K. and Cardone, M. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Workshop} on {Information} {Theory} ({ITW})},\n tags = {security},\n title = {On {Secure} {Capacity} of {Multiple} {Unicast} {Traffic} over {Separable} {Networks}},\n year = {2019}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. H. Ezzeldin; M. Cardone; C. Fragouli; and Giuseppe Caire.\n\n\n \n \n \n \n On the Multicast Capacity of Full-Duplex 1-2-1 Networks.\n \n \n \n\n\n \n\n\n\n IEEE International Symposium of Information Theory (ISIT). 2019.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ezzeldin_multicast_2019,\n type={4},\n author = {Ezzeldin, Y. H. and Cardone, M. and Fragouli, C. and Caire, Giuseppe},\n journal = {IEEE International Symposium of Information Theory (ISIT)},\n tags = {wireless},\n title = {On the {Multicast} {Capacity} of {Full}-{Duplex} 1-2-1 {Networks}},\n year = {2019}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. H. Ezzeldin; M. Cardone; C. Fragouli; and Giuseppe Caire.\n\n\n \n \n \n \n Polynomial-time Capacity Calculation and Scheduling for Half-Duplex 1-2-1 Network.\n \n \n \n\n\n \n\n\n\n IEEE International Symposium of Information Theory (ISIT). 2019.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ezzeldin_polynomial-time_2019,\n type={4},\n author = {Ezzeldin, Y. H. and Cardone, M. and Fragouli, C. and Caire, Giuseppe},\n journal = {IEEE International Symposium of Information Theory (ISIT)},\n tags = {wireless},\n title = {Polynomial-time {Capacity} {Calculation} and {Scheduling} for {Half}-{Duplex} 1-2-1 {Network}},\n year = {2019}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Karmoose; C. Fragouli; S. N. Diggavi; Rafael Misoczki; Lily L. Yang; and Zhenliang Zhang.\n\n\n \n \n \n \n Using mm-Waves for Secret Key Establishmen.\n \n \n \n\n\n \n\n\n\n In IEEE Communications Letters, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{karmoose_using_2019,\n type={4},\n author = {Karmoose, M. and Fragouli, C. and Diggavi, S. N. and Misoczki, Rafael and Yang, Lily L. and Zhang, Zhenliang},\n booktitle = {{IEEE} {Communications} {Letters}},\n tags = {security},\n title = {Using mm-{Waves} for {Secret} {Key} {Establishmen}},\n year = {2019}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n SR Srinivasavaradhan; Michelle Du; Suhas Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Symbolwise MAP for Multiple Deletion Channels.\n \n \n \n\n\n \n\n\n\n IEEE International Symposium of Information Theory (ISIT). 2019.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{srinivasavaradhan_symbolwise_2019,\n type={4},\n author = {Srinivasavaradhan, SR and Du, Michelle and Diggavi, Suhas and Fragouli, C.},\n journal = {IEEE International Symposium of Information Theory (ISIT)},\n tags = {channel_coding, bio},\n title = {Symbolwise {MAP} for {Multiple} {Deletion} {Channels}},\n year = {2019}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (4)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n M. Karmoose; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n Simplifying Wireless Social Caching via Network Coding.\n \n \n \n\n\n \n\n\n\n In IEEE Transactions on Communications, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{karmoose_simplifying_2018,\n type={2},\n author = {Karmoose, M. and Cardone, M. and Fragouli, C.},\n booktitle = {{IEEE} {Transactions} on {Communications}},\n tags = {network_coding},\n title = {Simplifying {Wireless} {Social} {Caching} via {Network} {Coding}},\n year = {2018}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Song; and C. Fragouli.\n\n\n \n \n \n \n Making recommendations bandwidth aware.\n \n \n \n\n\n \n\n\n\n In IEEE Transactions on Information Theory, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{song_making_2018,\n type={2},\n author = {Song, L. and Fragouli, C.},\n booktitle = {{IEEE} {Transactions} on {Information} {Theory}},\n tags = {network_coding},\n title = {Making recommendations bandwidth aware},\n year = {2018}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Song; and C. Fragouli.\n\n\n \n \n \n \n A polynomial-time algorithm for pliable index coding.\n \n \n \n\n\n \n\n\n\n In IEEE Transactions on Information Theory, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{song_polynomial-time_2018,\n type={2},\n author = {Song, L. and Fragouli, C.},\n booktitle = {{IEEE} {Transactions} on {Information} {Theory}},\n tags = {network_coding},\n title = {A polynomial-time algorithm for pliable index coding},\n year = {2018}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n G. K. Agarwal; M. Karmoose; S. Diggavi; C. Fragouli; and P. Tabuada.\n\n\n \n \n \n \n Distorting an Adversary's View in Cyber-Physical Systems.\n \n \n \n\n\n \n\n\n\n In IEEE Conference on Decision and Control (CDC), 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{agarwal_distorting_2018,\n type={4},\n author = {Agarwal, G. K. and Karmoose, M. and Diggavi, S. and Fragouli, C. and Tabuada, P.},\n booktitle = {{IEEE} {Conference} on {Decision} and {Control} ({CDC})},\n tags = {security},\n title = {Distorting an {Adversary}'s {View} in {Cyber}-{Physical} {Systems}},\n year = {2018}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n SR Srinivasavaradhan; L. Song; and C. Fragouli.\n\n\n \n \n \n \n Distributed Computing Trade-offs with Random Connectivity.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium of Information Theory (ISIT), 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{srinivasavaradhan_distributed_2018,\n type={4},\n author = {Srinivasavaradhan, SR and Song, L. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} of {Information} {Theory} ({ISIT})},\n tags = {ML_CC},\n title = {Distributed Computing Trade-offs with Random Connectivity},\n year = {2018}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n SR Srinivasavaradhan; Michelle Du; S. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n On Maximum Likelihood Reconstruction over Multiple Deletion Channels.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium of Information Theory (ISIT), 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{srinivasavaradhan_maximum_2018,\n type={4},\n author = {Srinivasavaradhan, SR and Du, Michelle and Diggavi, S. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} of {Information} {Theory} ({ISIT})},\n tags = {bio},\n title = {On Maximum Likelihood Reconstruction over Multiple Deletion Channels},\n year = {2018}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n G. K. Agarwal; Y. H. Ezzeldin; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n Secure Communication over 1-2-1 Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium of Information Theory (ISIT), 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{agarwal_secure_2018,\n type={4},\n author = {Agarwal, G. K. and Ezzeldin, Y. H. and Cardone, M. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} of {Information} {Theory} ({ISIT})},\n tags = {security},\n title = {Secure {Communication} over 1-2-1 {Networks}},\n year = {2018}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. H. Ezzeldin; M. Cardone; C. Fragouli; and Giuseppe Caire.\n\n\n \n \n \n \n Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ezzeldin_gaussian_2018,\n type={4},\n author = {Ezzeldin, Y. H. and Cardone, M. and Fragouli, C. and Caire, Giuseppe},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {wireless},\n title = {Gaussian 1-2-1 {Networks}: {Capacity} {Results} for {mmWave} {Communications}},\n year = {2018}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Karmoose; L. Song; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n Privacy in Index Coding: Improved Bounds and Coding Schemes.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{karmoose_privacy_2018,\n type={4},\n author = {Karmoose, M. and Song, L. and Cardone, M. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {network_coding},\n title = {Privacy in {Index} {Coding}: {Improved} {Bounds} and {Coding} {Schemes}},\n year = {2018}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n article\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Anders Ellersgaard Kalør; Osama A Hanna; and Petar Popovski.\n\n\n \n \n \n \n Random Access Schemes in Wireless Systems With Correlated User Activity.\n \n \n \n\n\n \n\n\n\n arXiv e-prints,arXiv–1803. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ellersgaard2018random,\n  tags={osama},\n  title={Random Access Schemes in Wireless Systems With Correlated User Activity},\n  author={Ellersgaard Kal{\\o}r, Anders and Hanna, Osama A and Popovski, Petar},\n  journal={arXiv e-prints},\n  pages={arXiv--1803},\n  year={2018}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n inproceedings\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Anders E Kalor; Osama A Hanna; and Petar Popovski.\n\n\n \n \n \n \n Random access schemes in wireless systems with correlated user activity.\n \n \n \n\n\n \n\n\n\n In 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pages 1–5, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kalor2018random,\n  tags={osama},\n  title={Random access schemes in wireless systems with correlated user activity},\n  author={Kalor, Anders E and Hanna, Osama A and Popovski, Petar},\n  booktitle={2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)},\n  pages={1--5},\n  year={2018},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n Y. H. Ezzeldin; M. Karmoose; and C. Fragouli.\n\n\n \n \n \n \n Communication vs Distributed Computation: an alternative trade-off curve.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ezzeldin_communication_2017,\n type={4},\n author = {Ezzeldin, Y. H. and Karmoose, M. and Fragouli, C.},\n booktitle = {{IEEE} {Information} {Theory} {Workshop} ({ITW})},\n tags = {ML_CC},\n title = {Communication vs Distributed Computation: an alternative trade-off curve},\n year = {2017}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n G. K. Agarwal; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n Secure Network Coding for Multiple Unicast: On the Case of Single Source.\n \n \n \n\n\n \n\n\n\n In International Conference on Information Theoretic Security (ICITS), 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{agarwal_secure_2017,\n type={4},\n author = {Agarwal, G. K. and Cardone, M. and Fragouli, C.},\n booktitle = {International {Conference} on {Information} {Theoretic} {Security} ({ICITS})},\n tags = {security},\n title = {Secure {Network} {Coding} for {Multiple} {Unicast}: {On} the {Case} of {Single} {Source}},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. H. Ezzeldin; M. Cardone; C. Fragouli; and D. Tuninetti.\n\n\n \n \n \n \n Efficiently Finding Simple Schedules in Gaussian Half-Duplex Relay Line Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ezzeldin_efficiently_2017,\n type={4},\n author = {Ezzeldin, Y. H. and Cardone, M. and Fragouli, C. and Tuninetti, D.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {wireless},\n title = {Efficiently {Finding} {Simple} {Schedules} in {Gaussian} {Half}-{Duplex} {Relay} {Line} {Networks}},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. H. Ezzeldin; M. Cardone; C. Fragouli; and D. Tuninetti.\n\n\n \n \n \n \n Half-Duplex Routing is NP-hard.\n \n \n \n\n\n \n\n\n\n In Annual Allerton Conference on Communication, Control and Computing (Allerton), 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ezzeldin_half-duplex_2017,\n type={4},\n author = {Ezzeldin, Y. H. and Cardone, M. and Fragouli, C. and Tuninetti, D.},\n booktitle = {Annual {Allerton} {Conference} on {Communication}, {Control} and {Computing} ({Allerton})},\n tags = {wireless},\n title = {Half-{Duplex} {Routing} is {NP}-hard},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Karmoose; L. Song; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n Preserving Privacy while Broadcasting: k-Limited-Access Schemes.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{karmoose_preserving_2017,\n type={4},\n author = {Karmoose, M. and Song, L. and Cardone, M. and Fragouli, C.},\n booktitle = {{IEEE} {Information} {Theory} {Workshop} ({ITW})},\n tags = {network_coding},\n title = {Preserving {Privacy} while {Broadcasting}: k-{Limited}-{Access} {Schemes}},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Karmoose; L. Song; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n Private Broadcasting: an Index Coding Approach.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), January 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{karmoose_private_2017,\n type={4},\n author = {Karmoose, M. and Song, L. and Cardone, M. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n month = {January},\n tags = {network_coding},\n title = {Private {Broadcasting}: an {Index} {Coding} {Approach}},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Song; SR Srinivasavaradhan; and C. Fragouli.\n\n\n \n \n \n \n The Benefit of Being Flexible in Distributed Computation.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{song_benefit_2017,\n type={4},\n author = {Song, L. and Srinivasavaradhan, SR and Fragouli, C.},\n booktitle = {{IEEE} {Information} {Theory} {Workshop} ({ITW})},\n tags = {network_coding},\n title = {The {Benefit} of {Being} {Flexible} in {Distributed} {Computation}},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Song; and C. Fragouli.\n\n\n \n \n \n \n Making recommendations bandwidth aware.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{song_making_2017,\n type={4},\n author = {Song, L. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {network_coding},\n title = {Making recommendations bandwidth aware},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Song; and C. Fragouli.\n\n\n \n \n \n \n A pliable index coding approach to data shuffling.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{song_pliable_2017,\n type={4},\n author = {Song, L. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {network_coding},\n title = {A pliable index coding approach to data shuffling},\n year = {2017}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n CY Tsai; G. K. Agarwal; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n A Distortion Based Approach for Protecting Inferences.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium of Information Theory (ISIT), January 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{tsai_distortion_2017,\n type={4},\n author = {Tsai, CY and Agarwal, G. K. and Fragouli, C. and Diggavi, S.},\n booktitle = {{IEEE} {International} {Symposium} of {Information} {Theory} ({ISIT})},\n month = {January},\n tags = {security},\n title = {A {Distortion} {Based} {Approach} for {Protecting} {Inferences}},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Brahma; A. Ozgur; and C. Fragouli.\n\n\n \n \n \n \n On the Complexity of Scheduling in Half-Duplex Diamond Networks.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{brahma_complexity_2016,\n type={2},\n author = {Brahma, S. and Ozgur, A. and Fragouli, C.},\n journal = {IEEE Transactions on Information Theory},\n tags = {wireless},\n title = {On the {Complexity} of {Scheduling} in {Half}-{Duplex} {Diamond} {Networks}},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; C. Fragouli; V. M. Prabhakaran; and S. Diggavi.\n\n\n \n \n \n \n An LP Characterization of the Secret-message Capacity of Three Erasure Networks with Feedback.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{czap_lp_2016,\n type={2},\n author = {Czap, L. and Fragouli, C. and Prabhakaran, V. M. and Diggavi, S.},\n journal = {IEEE Transactions on Information Theory},\n tags = {security},\n title = {An {LP} {Characterization} of the {Secret}-message {Capacity} of {Three} {Erasure} {Networks} with {Feedback}},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n I. Safaka; L. Czap; C. Fragouli; and K. Argyraki.\n\n\n \n \n \n \n Creating secrets out of packet erasures.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Forensics & Security. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{safaka_creating_2016,\n type={2},\n author = {Safaka, I. and Czap, L. and Fragouli, C. and Argyraki, K.},\n journal = {IEEE Transactions on Information Forensics \\&amp; Security},\n tags = {security},\n title = {Creating secrets out of packet erasures},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n G. K. Agarwal; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n On Secure Network Coding for Two Unicast Sessions.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2016. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{agarwal_secure_2016,\n type={4},\n author = {Agarwal, G. K. and Cardone, M. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {security},\n title = {On {Secure} {Network} {Coding} for {Two} {Unicast} {Sessions}},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n G. K. Agarwal; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n On secure network coding for two unicast sessions: studying butterflies.\n \n \n \n\n\n \n\n\n\n In IEEE Symposium on Network Coding (NetCod), 2016. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{agarwal_secure_2016-1,\n type={4},\n author = {Agarwal, G. K. and Cardone, M. and Fragouli, C.},\n booktitle = {{IEEE} {Symposium} on {Network} {Coding} ({NetCod})},\n tags = {security},\n title = {On secure network coding for two unicast sessions: studying butterflies},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Cardone; C. Fragouli; and D. Tuninetti.\n\n\n \n \n \n \n On Network Simplification for Gaussian Half-Duplex Diamond Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2016. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{cardone_network_2016,\n type={4},\n author = {Cardone, M. and Fragouli, C. and Tuninetti, D.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {wireless},\n title = {On {Network} {Simplification} for {Gaussian} {Half}-{Duplex} {Diamond} {Networks}},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. H. Ezzeldin; A. Sengupta; and C. Fragouli.\n\n\n \n \n \n \n Wireless Network Simplification: Beyond Diamond Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2016. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ezzeldin_wireless_2016,\n type={4},\n author = {Ezzeldin, Y. H. and Sengupta, A. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {wireless},\n title = {Wireless {Network} {Simplification}: {Beyond} {Diamond} {Networks}},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Karmoose; M. Cardone; and C. Fragouli.\n\n\n \n \n \n \n Simplifying Wireless Social Caching.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2016. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{karmoose_simplifying_2016,\n type={4},\n author = {Karmoose, M. and Cardone, M. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {network_coding},\n title = {Simplifying {Wireless} {Social} {Caching}},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Song; and C. Fragouli.\n\n\n \n \n \n \n A Deterministic Algorithm for Pliable Index Coding.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2016. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{song_deterministic_2016,\n type={4},\n author = {Song, L. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {network_coding},\n title = {A {Deterministic} {Algorithm} for {Pliable} {Index} {Coding}},\n year = {2016}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Brahma; and C. Fragouli.\n\n\n \n \n \n \n Pliable Index Coding.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{brahma_pliable_2015,\n type={2},\n author = {Brahma, S. and Fragouli, C.},\n journal = {IEEE Transactions on Information Theory},\n tags = {network_coding},\n title = {Pliable {Index} {Coding}},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; C. Fragouli; V. M. Prabhakaran; and Suhas Diggavi.\n\n\n \n \n \n \n Secret communication over broadcast erasure channels with state-feedback.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{czap_secret_2015,\n type={2},\n author = {Czap, L. and Fragouli, C. and Prabhakaran, V. M. and Diggavi, Suhas},\n journal = {IEEE Transactions on Information Theory},\n tags = {security},\n title = {Secret communication over broadcast erasure channels with state-feedback},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; C. Fragouli; V. M. Prabhakaran; and Suhas Diggavi.\n\n\n \n \n \n \n Secure network coding with erasures and feedback.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{czap_secure_2015,\n type={2},\n author = {Czap, L. and Fragouli, C. and Prabhakaran, V. M. and Diggavi, Suhas},\n journal = {IEEE Transactions on Information Theory},\n tags = {security},\n title = {Secure network coding with erasures and feedback},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A. Le; L. Keller; H. Seferoglu; B. Cici; C. Fragouli; and A. Markopoulou.\n\n\n \n \n \n \n MicroCast: Cooperative Video Streaming using Cellular and Local Connections.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Networking. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{le_microcast_2015,\n type={2},\n author = {Le, A. and Keller, L. and Seferoglu, H. and Cici, B. and Fragouli, C. and Markopoulou, A.},\n journal = {IEEE Transactions on Networking},\n tags = {network_coding,wireless},\n title = {{MicroCast}: {Cooperative} {Video} {Streaming} using {Cellular} and {Local} {Connections}},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; and E. Soljanin.\n\n\n \n \n \n \n (Secure) Linear network coding multicast A theoretical minimum and some open problems.\n \n \n \n\n\n \n\n\n\n Designs, Codes and Cryptography, Springer Verlag. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_secure_2015,\n type={4},\n author = {Fragouli, C. and Soljanin, E.},\n journal = {Designs, Codes and Cryptography, Springer Verlag},\n tags = {security},\n title = {({Secure}) {Linear} network coding multicast {A} theoretical minimum and some open problems},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; L. Czap; V. M. Prabhakaran; and Suhas Diggavi.\n\n\n \n \n \n \n Wireless network security: building on erasures.\n \n \n \n\n\n \n\n\n\n The Proceedings of the IEEE. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_wireless_2015,\n type={4},\n author = {Fragouli, C. and Czap, L. and Prabhakaran, V. M. and Diggavi, Suhas},\n journal = {The Proceedings of the IEEE},\n tags = {security},\n title = {Wireless network security: building on erasures},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Eva Hosszu; C. Fragouli; and Janos Tapolcai.\n\n\n \n \n \n \n Combinatorial error detection in linear encoders.\n \n \n \n\n\n \n\n\n\n In IEEE 16th International Conference on High Performance Switching and Routing (HPSR), July 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{hosszu_combinatorial_2015,\n type={4},\n author = {Hosszu, Eva and Fragouli, C. and Tapolcai, Janos},\n booktitle = {{IEEE} 16th {International} {Conference} on {High} {Performance} {Switching} and {Routing} ({HPSR})},\n month = {July},\n tags = {channel_coding},\n title = {Combinatorial error detection in linear encoders},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A. Papadopoulos; L. Czap; and C. Fragouli.\n\n\n \n \n \n \n LP formulations for secrecy over erasure networks with feedback.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Infromation Theory (ISIT), 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{papadopoulos_lp_2015,\n type={4},\n author = {Papadopoulos, A. and Czap, L. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Infromation} {Theory} ({ISIT})},\n tags = {security},\n title = {{LP} formulations for secrecy over erasure networks with feedback},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n I. Safaka; L. Czap; K. Argyraki; and C. Fragouli.\n\n\n \n \n \n \n Towards unconditional tor-like anonymity.\n \n \n \n\n\n \n\n\n\n In IEEE Symposium on Network Coding (NetCod), July 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{safaka_towards_2015,\n type={4},\n author = {Safaka, I. and Czap, L. and Argyraki, K. and Fragouli, C.},\n booktitle = {{IEEE} {Symposium} on {Network} {Coding} ({NetCod})},\n month = {July},\n tags = {security},\n title = {Towards unconditional tor-like anonymity},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Song; and C. Fragouli.\n\n\n \n \n \n \n Content-type coding.\n \n \n \n\n\n \n\n\n\n In IEEE Symposium on Network Coding (NetCod), July 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{song_content-type_2015,\n type={4},\n author = {Song, L. and Fragouli, C.},\n booktitle = {{IEEE} {Symposium} on {Network} {Coding} ({NetCod})},\n month = {July},\n tags = {network_coding},\n title = {Content-type coding},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Nazaroglu; A. Ozgur; and C. Fragouli.\n\n\n \n \n \n \n Wireless network simplification: the Gaussian N-Relay diamond network.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2014.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{nazaroglu_wireless_2014,\n type={2},\n author = {Nazaroglu, C. and Ozgur, A. and Fragouli, C.},\n journal = {IEEE Transactions on Information Theory},\n tags = {wireless},\n title = {Wireless network simplification: the {Gaussian} {N}-{Relay} diamond network},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A. Sengupta; I. -Hsiang Wang; and C. Fragouli.\n\n\n \n \n \n \n Cooperative relaying at finite SNR–role of Quantize-Map-and-Forward.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Wireless Communications. 2014.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{sengupta_cooperative_2014,\n type={2},\n author = {Sengupta, A. and Wang, I. -Hsiang and Fragouli, C.},\n journal = {IEEE Transactions on Wireless Communications},\n tags = {wireless},\n title = {Cooperative relaying at finite {SNR}–role of {Quantize}-{Map}-and-{Forward}},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Brahma; A. Sengupta; Melissa Duarte Gelvez; C. Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n QUILT: A decode/quantize-interleave-transmit approach to cooperative relaying.\n \n \n \n\n\n \n\n\n\n In IEEE INFOCOM, 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{brahma_quilt_2014,\n type={4},\n author = {Brahma, S. and Sengupta, A. and Duarte Gelvez, Melissa and Fragouli, C. and Diggavi, Suhas},\n booktitle = {{IEEE} {INFOCOM}},\n tags = {wireless},\n title = {{QUILT}: {A} decode/quantize-interleave-transmit approach to cooperative relaying},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Brahma; and C. Fragouli.\n\n\n \n \n \n \n A simple relaying strategy for diamond networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{brahma_simple_2014,\n type={4},\n author = {Brahma, S. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {wireless},\n title = {A simple relaying strategy for diamond networks},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Brahma; and C. Fragouli.\n\n\n \n \n \n \n Structure of optimal schedules in diamond networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{brahma_structure_2014,\n type={4},\n author = {Brahma, S. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {wireless},\n title = {Structure of optimal schedules in diamond networks},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Brahma; A. Sengupta; and C. Fragouli.\n\n\n \n \n \n \n Switched local schedules for diamond networks.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{brahma_switched_2014,\n type={4},\n author = {Brahma, S. and Sengupta, A. and Fragouli, C.},\n booktitle = {{IEEE} {Information} {Theory} {Workshop} ({ITW})},\n tags = {wireless},\n title = {Switched local schedules for diamond networks},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V. M. Prabhakaran; Suhas Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Triangle network secrecy.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{czap_triangle_2014,\n type={4},\n author = {Czap, L. and Prabhakaran, V. M. and Diggavi, Suhas and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {security},\n title = {Triangle network secrecy},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A. Papadopoulos; L. Czap; and C. Fragouli.\n\n\n \n \n \n \n Achievable secrecy in arbitrary erasure networks with feedback.\n \n \n \n\n\n \n\n\n\n In IEEE Global Conference on Signal and Information Processing (GlobalSIP), December 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{papadopoulos_achievable_2014,\n type={4},\n author = {Papadopoulos, A. and Czap, L. and Fragouli, C.},\n booktitle = {{IEEE} {Global} {Conference} on {Signal} and {Information} {Processing} ({GlobalSIP})},\n month = {December},\n tags = {security},\n title = {Achievable secrecy in arbitrary erasure networks with feedback},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A. Papadopoulos; L. Czap; and C. Fragouli.\n\n\n \n \n \n \n Secret message capacity of a line network.\n \n \n \n\n\n \n\n\n\n In Annual Allerton Conference on Communication, Control and Computing (Allerton), September 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{papadopoulos_secret_2014,\n type={4},\n author = {Papadopoulos, A. and Czap, L. and Fragouli, C.},\n booktitle = {Annual {Allerton} {Conference} on {Communication}, {Control} and {Computing} ({Allerton})},\n month = {September},\n tags = {security},\n title = {Secret message capacity of a line network},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A. Sengupta; S. Brahma; and C. Fragouli.\n\n\n \n \n \n \n Efficient subnetwork selection in relay networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sengupta_efficient_2014,\n type={4},\n author = {Sengupta, A. and Brahma, S. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n tags = {wireless},\n title = {Efficient subnetwork selection in relay networks},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n L. Keller; Emre Atsan; K. Argyraki; and C. Fragouli.\n\n\n \n \n \n \n SenseCode: Network Coding for Reliable Sensor Networks.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Sensor Networks. 2013.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{keller_sensecode_2013,\n type={2},\n author = {Keller, L. and Atsan, Emre and Argyraki, K. and Fragouli, C.},\n journal = {IEEE Transactions on Sensor Networks},\n tags = {sensor_networks},\n title = {{SenseCode}: {Network} {Coding} for {Reliable} {Sensor} {Networks}},\n year = {2013}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A. Markopoulou; M. Gjoka; and C. Fragouli.\n\n\n \n \n \n \n A network coding approach to network tomography.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2013.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{markopoulou_network_2013,\n type={2},\n author = {Markopoulou, A. and Gjoka, M. and Fragouli, C.},\n journal = {IEEE Transactions on Information Theory},\n tags = {network_coding},\n title = {A network coding approach to network tomography},\n year = {2013}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n K. Argyraki; Suhas Diggavi; Melissa Duarte Gelvez; C. Fragouli; Marios Apostolos Gkatzianas; and Panagiotis Kostopoulos.\n\n\n \n \n \n \n Creating Secrets out of Erasures.\n \n \n \n\n\n \n\n\n\n In Proceedings of the ACM Conference on Mobile Computing and Networking (MobiCom), 2013. \n event-place: Miami, Florida, USA\n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{argyraki_creating_2013,\n abstract = {Current security systems often rely on the adversary's computational limitations. Wireless networks offer the opportunity for a different, complementary kind of security, which relies on the adversary's limited network presence (i.e., that the adversary cannot be located at many different points in the network at the same time). We present a system that leverages this opportunity to enable N wireless nodes to create a shared secret S, in a way that an eavesdropper, Eve, obtains very little information on S. Our system consists of two steps: (1) The nodes transmit packets following a special pattern, such that Eve learns very little about a given fraction of the transmitted packets. This is achieved through a combination of beam forming (from many different sources) and wiretap codes. (2) The nodes participate in a protocol that reshuffles the information known to each node, such that the nodes end up sharing a secret that Eve knows very little about. Our protocol is easily implementable in existing wireless devices and scales well with the number of nodes; these properties are achieved through a combination of public feedback, broadcasting, and network coding. We evaluate our system through a 5-node testbed. We demonstrate that a group of wireless nodes can generate thousands of new shared secret bits per second, with their secrecy being independent of the adversary's computational capabilities.},\n type={4},\n author = {Argyraki, K. and Diggavi, Suhas and Duarte Gelvez, Melissa and Fragouli, C. and Gkatzianas, Marios Apostolos and Kostopoulos, Panagiotis},\n booktitle = {Proceedings of the {ACM} {Conference} on {Mobile} {Computing} and {Networking} ({MobiCom})},\n doi = {10.1145/2500423.2500440},\n keywords = {Group secret agreement, Physical-layer security},\n note = {event-place: Miami, Florida, USA},\n tags = {security},\n title = {Creating {Secrets} out of {Erasures}},\n year = {2013}\n}\n\n
\n
\n\n\n
\n Current security systems often rely on the adversary's computational limitations. Wireless networks offer the opportunity for a different, complementary kind of security, which relies on the adversary's limited network presence (i.e., that the adversary cannot be located at many different points in the network at the same time). We present a system that leverages this opportunity to enable N wireless nodes to create a shared secret S, in a way that an eavesdropper, Eve, obtains very little information on S. Our system consists of two steps: (1) The nodes transmit packets following a special pattern, such that Eve learns very little about a given fraction of the transmitted packets. This is achieved through a combination of beam forming (from many different sources) and wiretap codes. (2) The nodes participate in a protocol that reshuffles the information known to each node, such that the nodes end up sharing a secret that Eve knows very little about. Our protocol is easily implementable in existing wireless devices and scales well with the number of nodes; these properties are achieved through a combination of public feedback, broadcasting, and network coding. We evaluate our system through a 5-node testbed. We demonstrate that a group of wireless nodes can generate thousands of new shared secret bits per second, with their secrecy being independent of the adversary's computational capabilities.\n
\n\n\n
\n\n\n
\n \n\n \n \n Emre Atsan; I. Safaka; L. Keller; and C. Fragouli.\n\n\n \n \n \n \n Low cost security for sensor networks.\n \n \n \n\n\n \n\n\n\n In Proceedings of the 2013 IEEE International Symposium on Network Coding (NetCod), 2013. \n event-place: Calgary, Canada\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{atsan_low_2013,\n abstract = {We design and evaluate a lightweight encryption protocol suitable for sensor networks, that enables weak security in the presence of passive eavesdroppers. At every communication round, our protocol creates a key between each sensor node and the sink, by appropriately mixing and coding information packets that the nodes passively overhear. Evaluation using the TOSSIM simulator indicates that with our protocol we can gain significant security benefits at low overhead cost.},\n type={4},\n author = {Atsan, Emre and Safaka, I. and Keller, L. and Fragouli, C.},\n booktitle = {Proceedings of the 2013 {IEEE} {International} {Symposium} on {Network} {Coding} ({NetCod})},\n keywords = {information-theoretic security, Sensor networks, Week security},\n note = {event-place: Calgary, Canada},\n tags = {security,sensor_networks},\n title = {Low cost security for sensor networks},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We design and evaluate a lightweight encryption protocol suitable for sensor networks, that enables weak security in the presence of passive eavesdroppers. At every communication round, our protocol creates a key between each sensor node and the sink, by appropriately mixing and coding information packets that the nodes passively overhear. Evaluation using the TOSSIM simulator indicates that with our protocol we can gain significant security benefits at low overhead cost.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Brahma; and C. Fragouli.\n\n\n \n \n \n \n Pliable Index Coding - The Multiple Requests Case.\n \n \n \n\n\n \n\n\n\n In Proceedings of the IEEE International Symposium on Infromation Theory (ISIT), 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{brahma_pliable_2013,\n type={4},\n author = {Brahma, S. and Fragouli, C.},\n booktitle = {Proceedings of the {IEEE} {International} {Symposium} on {Infromation} {Theory} ({ISIT})},\n tags = {network_coding},\n title = {Pliable {Index} {Coding} - {The} {Multiple} {Requests} {Case}},\n year = {2013}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Brahma; C. Fragouli; and A. Ozgur.\n\n\n \n \n \n \n On the structure of approximately optimal schedules for half-duplex diamond networks.\n \n \n \n\n\n \n\n\n\n In Proceedings of the Annual Allerton Conference on Communication, Control, and Computing, 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{brahma_structure_2013,\n type={4},\n author = {Brahma, S. and Fragouli, C. and Ozgur, A.},\n booktitle = {Proceedings of the {Annual} {Allerton} {Conference} on {Communication}, {Control}, and {Computing}},\n tags = {wireless},\n title = {On the structure of approximately optimal schedules for half-duplex diamond networks},\n year = {2013}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V. M. Prabhakaran; S. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Exploiting Common Randomness: a Resource for Network Secrecy.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{czap_exploiting_2013,\n type={4},\n author = {Czap, L. and Prabhakaran, V. M. and Diggavi, S. and Fragouli, C.},\n booktitle = {{IEEE} {Information} {Theory} {Workshop} ({ITW})},\n tags = {security},\n title = {Exploiting {Common} {Randomness}: a {Resource} for {Network} {Secrecy}},\n year = {2013}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; C. Fragouli; V. M. Prabhakaran; and Suhas Diggavi.\n\n\n \n \n \n \n Secure Network Coding with Erasures and Feedback.\n \n \n \n\n\n \n\n\n\n In Annual Allerton Conference on Communication, Control, and Computing, 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{czap_secure_2013,\n type={4},\n author = {Czap, L. and Fragouli, C. and Prabhakaran, V. M. and Diggavi, Suhas},\n booktitle = {Annual {Allerton} {Conference} on {Communication}, {Control}, and {Computing}},\n tags = {security},\n title = {Secure {Network} {Coding} with {Erasures} and {Feedback}},\n year = {2013}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V. M. Prabhakaran; S. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Securing Broadcast Against Dishonest Receivers.\n \n \n \n\n\n \n\n\n\n In IEEE Symposium on Network Coding (NetCod), 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{czap_securing_2013,\n type={4},\n author = {Czap, L. and Prabhakaran, V. M. and Diggavi, S. and Fragouli, C.},\n booktitle = {{IEEE} {Symposium} on {Network} {Coding} ({NetCod})},\n tags = {security},\n title = {Securing {Broadcast} {Against} {Dishonest} {Receivers}},\n year = {2013}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Melissa Duarte Gelvez; A. Sengupta; S. Brahma; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n Quantize-Map-Forward (QMF) Relaying - An Experimental Study.\n \n \n \n\n\n \n\n\n\n In ACM MOBIHOC, 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{duarte_gelvez_quantize-map-forward_2013,\n type={4},\n author = {Duarte Gelvez, Melissa and Sengupta, A. and Brahma, S. and Fragouli, C. and Diggavi, S.},\n booktitle = {{ACM} {MOBIHOC}},\n tags = {wireless},\n title = {Quantize-{Map}-{Forward} ({QMF}) {Relaying} - {An} {Experimental} {Study}},\n year = {2013}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Efe Onaran; Marios Gatzianas; and C. Fragouli.\n\n\n \n \n \n \n Broadcast erasure channel with feedback: the two multicast case - algorithms and bounds.\n \n \n \n\n\n \n\n\n\n In IEEE Symposium on Network Coding (NetCod), June 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{onaran_broadcast_2013,\n type={4},\n author = {Onaran, Efe and Gatzianas, Marios and Fragouli, C.},\n booktitle = {{IEEE} {Symposium} on {Network} {Coding} ({NetCod})},\n month = {June},\n tags = {wireless},\n title = {Broadcast erasure channel with feedback: the two multicast case - algorithms and bounds},\n year = {2013}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n I. Safaka; C. Fragouli; K. Argyraki; and Suhas Diggavi.\n\n\n \n \n \n \n Exchanging Pairwise Secrets Efficiently.\n \n \n \n\n\n \n\n\n\n In Proceedings of the 32nd Annual IEEE International Conference on Computer Communications (INFOCOM), 2013. \n event-place: Turin, Italy\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{safaka_exchanging_2013,\n abstract = {We consider the problem where a group of wireless nodes, connected to the same broadcast domain, want to create pairwise secrets, in the presence of an adversary Eve, who tries to listen in and steal these secrets. Existing solutions assume that Eve cannot perform certain computations (e.g., large-integer factorization) in useful time. We ask the question: can we solve this problem without assuming anything about Eve's computational capabilities? We propose a simple secret-agreement protocol, where the wireless nodes keep exchanging bits until they have agreed on pairwise secrets that Eve cannot reconstruct with very high probability. Our protocol relies on Eve's limited network presence (the fact that she cannot be located at an arbitrary number of points in the network at the same time), but assumes nothing about her computational capabilities. We formally show that, under standard theoretical assumptions, our protocol is information-theoretically secure (it leaks zero information to Eve about the secrets). Using a small wireless testbed of smartphones, we provide experimental evidence that it is feasible for 5 nodes to create thousands of secret bits per second, with their secrecy being independent from the adversary's capabilities.},\n type={4},\n author = {Safaka, I. and Fragouli, C. and Argyraki, K. and Diggavi, Suhas},\n booktitle = {Proceedings of the 32nd {Annual} {IEEE} {International} {Conference} on {Computer} {Communications} ({INFOCOM})},\n keywords = {information-theoretic security, Pairwise secrets},\n note = {event-place: Turin, Italy},\n tags = {security},\n title = {Exchanging {Pairwise} {Secrets} {Efficiently}},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We consider the problem where a group of wireless nodes, connected to the same broadcast domain, want to create pairwise secrets, in the presence of an adversary Eve, who tries to listen in and steal these secrets. Existing solutions assume that Eve cannot perform certain computations (e.g., large-integer factorization) in useful time. We ask the question: can we solve this problem without assuming anything about Eve's computational capabilities? We propose a simple secret-agreement protocol, where the wireless nodes keep exchanging bits until they have agreed on pairwise secrets that Eve cannot reconstruct with very high probability. Our protocol relies on Eve's limited network presence (the fact that she cannot be located at an arbitrary number of points in the network at the same time), but assumes nothing about her computational capabilities. We formally show that, under standard theoretical assumptions, our protocol is information-theoretically secure (it leaks zero information to Eve about the secrets). Using a small wireless testbed of smartphones, we provide experimental evidence that it is feasible for 5 nodes to create thousands of secret bits per second, with their secrecy being independent from the adversary's capabilities.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n M. J. Siavoshani; C. Fragouli; and S. N. Diggavi.\n\n\n \n \n \n \n Subspace properties of network coding and their applications.\n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 58(5): 2599–2619. 2012.\n Publisher: IEEE\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{siavoshani_subspace_2012,\n type={2},\n author = {Siavoshani, M. J. and Fragouli, C. and Diggavi, S. N.},\n journal = {Information Theory, IEEE Transactions on},\n note = {Publisher: IEEE},\n number = {5},\n pages = {2599--2619},\n tags = {network_coding},\n title = {Subspace properties of network coding and their applications},\n volume = {58},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (17)\n \n \n
\n
\n \n \n
\n \n\n \n \n Marios Gatzianas; Shirin Saeedi; and C. Fragouli.\n\n\n \n \n \n \n Feedback-based coding algorithms for broadcast erasure channels with degraded message sets.\n \n \n \n\n\n \n\n\n\n In Proceedings NETCOD, June 2012. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{gatzianas_feedback-based_2012,\n type={4},\n author = {Gatzianas, Marios and Saeedi, Shirin and Fragouli, C.},\n booktitle = {Proceedings {NETCOD}},\n month = {June},\n tags = {wireless,network_coding},\n title = {Feedback-based coding algorithms for broadcast erasure channels with degraded message sets},\n year = {2012}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Emre Atsan; Raymond Knopp; Suhas N. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Towards integrating Quantize-Map-Forward relaying into LTE.\n \n \n \n\n\n \n\n\n\n In Information Theory Workshop (ITW), 2012. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{atsan_towards_2012,\n abstract = {We present a method to integrate the Quantize-Map-Forward (QMF) relaying scheme into the standard LTE operation, for a two-relay diamond network configuration. Our approach implements QMF using mainly existing LTE modules and functionalities, and results in minimal changes in the standard link-layer LTE operation. In particular, the destination operation is only affected in that we adapt the log-likelihood ratio (LLR) calculations at the decoder input to take into account the existence of relays; thus, the decoding complexity and operations (apart the LLR calculations) are not modified. We report extensive performance evaluations of our scheme using the OpenAirInterface (OAI) link-level simulation tools.},\n type={4},\n author = {Atsan, Emre and Knopp, Raymond and Diggavi, Suhas N. and Fragouli, C.},\n booktitle = {Information {Theory} {Workshop} ({ITW})},\n publisher = {IEEE},\n tags = {wireless},\n title = {Towards integrating {Quantize}-{Map}-{Forward} relaying into {LTE}},\n year = {2012}\n}\n\n
\n
\n\n\n
\n We present a method to integrate the Quantize-Map-Forward (QMF) relaying scheme into the standard LTE operation, for a two-relay diamond network configuration. Our approach implements QMF using mainly existing LTE modules and functionalities, and results in minimal changes in the standard link-layer LTE operation. In particular, the destination operation is only affected in that we adapt the log-likelihood ratio (LLR) calculations at the decoder input to take into account the existence of relays; thus, the decoding complexity and operations (apart the LLR calculations) are not modified. We report extensive performance evaluations of our scheme using the OpenAirInterface (OAI) link-level simulation tools.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Brahma; and C. Fragouli.\n\n\n \n \n \n \n Pliable index coding.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, pages 2251–2255, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{brahma_pliable_2012,\n type={4},\n author = {Brahma, S. and Fragouli, C.},\n booktitle = {Information {Theory} {Proceedings} ({ISIT}), 2012 {IEEE} {International} {Symposium} on},\n pages = {2251--2255},\n publisher = {IEEE},\n tags = {network_coding},\n title = {Pliable index coding},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Brahma; A. Ozgur; and C. Fragouli.\n\n\n \n \n \n \n Simple schedules for half-duplex networks.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, pages 1112–1116, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{brahma_simple_2012,\n type={4},\n author = {Brahma, S. and Ozgur, A. and Fragouli, C.},\n booktitle = {Information {Theory} {Proceedings} ({ISIT}), 2012 {IEEE} {International} {Symposium} on},\n pages = {1112--1116},\n publisher = {IEEE},\n tags = {wireless},\n title = {Simple schedules for half-duplex networks},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. Buyukalp; G. Maatouk; V. M. Prabhakaran; and C. Fragouli.\n\n\n \n \n \n \n Untrusting network coding.\n \n \n \n\n\n \n\n\n\n In Network Coding (NetCod), 2012 International Symposium on, pages 79–84, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{buyukalp_untrusting_2012,\n type={4},\n author = {Buyukalp, Y. and Maatouk, G. and Prabhakaran, V. M. and Fragouli, C.},\n booktitle = {Network {Coding} ({NetCod}), 2012 {International} {Symposium} on},\n pages = {79--84},\n publisher = {IEEE},\n tags = {network_coding,security},\n title = {Untrusting network coding},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V. M. Prabhakaran; Suhas N. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Broadcasting Private Messages Securely.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), February 2012. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{czap_broadcasting_2012,\n type={4},\n author = {Czap, L. and Prabhakaran, V. M. and Diggavi, Suhas N. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n month = {February},\n publisher = {IEEE},\n tags = {security},\n title = {Broadcasting {Private} {Messages} {Securely}},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V. M. Prabhakaran; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n Encrypt and mix: unconditionally optimal secure wireless broadcast.\n \n \n \n\n\n \n\n\n\n In In submission, 2012. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{czap_encrypt_2012,\n type={4},\n author = {Czap, L. and Prabhakaran, V. M. and Fragouli, C. and Diggavi, S.},\n booktitle = {In submission},\n tags = {security},\n title = {Encrypt and mix: unconditionally optimal secure wireless broadcast},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Eleni Drinea; L. Keller; and C. Fragouli.\n\n\n \n \n \n \n \n Real-time delay with network coding and feedback.\n \n \n \n \n\n\n \n\n\n\n Physical Communication, (0). 2012.\n \n\n\n\n
\n\n\n\n \n \n \"Real-timePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{drinea_real-time_2012,\n type={4},\n author = {Drinea, Eleni and Keller, L. and Fragouli, C.},\n doi = {10.1016/j.phycom.2012.05.005},\n issn = {1874-4907},\n journal = {Physical Communication},\n keywords = {Delay},\n number = {0},\n tags = {network_coding},\n title = {Real-time delay with network coding and feedback},\n url = {http://www.sciencedirect.com/science/article/pii/S1874490712000444},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n J. B. Ebrahimi; and C. Fragouli.\n\n\n \n \n \n \n Properties of network polynomials.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, pages 1306–1310, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ebrahimi_properties_2012,\n type={4},\n author = {Ebrahimi, J. B. and Fragouli, C.},\n booktitle = {Information {Theory} {Proceedings} ({ISIT}), 2012 {IEEE} {International} {Symposium} on},\n pages = {1306--1310},\n publisher = {IEEE},\n tags = {network_coding},\n title = {Properties of network polynomials},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Marios Gatzianas; Shirin Saeedi; and C. Fragouli.\n\n\n \n \n \n \n Feedback-based coding algorithms for broadcast erasure channels with degraded message sets.\n \n \n \n\n\n \n\n\n\n In Proceedings NETCOD, June 2012. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{gatzianas_feedback-based_2012,\n type={4},\n author = {Gatzianas, Marios and Saeedi, Shirin and Fragouli, C.},\n booktitle = {Proceedings {NETCOD}},\n month = {June},\n tags = {wireless,network_coding},\n title = {Feedback-based coding algorithms for broadcast erasure channels with degraded message sets},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Nikhil Karamchandani; L. Keller; C. Fragouli; and Massimo Franceschetti.\n\n\n \n \n \n \n \n Function computation via subspace coding.\n \n \n \n \n\n\n \n\n\n\n Physical Communication, (0). 2012.\n \n\n\n\n
\n\n\n\n \n \n \"FunctionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{karamchandani_function_2012,\n abstract = {This paper considers function computation in a network where intermediate nodes perform randomized network coding, through appropriate choice of the subspace codebooks at the source nodes. Unlike traditional network coding for computing functions, that requires intermediate nodes to be aware of the function to be computed, our designs are transparent to the intermediate node operations.},\n type={4},\n author = {Karamchandani, Nikhil and Keller, L. and Fragouli, C. and Franceschetti, Massimo},\n doi = {10.1016/j.phycom.2012.02.007},\n issn = {1874-4907},\n journal = {Physical Communication},\n keywords = {Wireless sensor network},\n number = {0},\n tags = {sensor_networks},\n title = {Function computation via subspace coding},\n url = {http://www.sciencedirect.com/science/article/pii/S1874490712000201},\n year = {2012}\n}\n\n
\n
\n\n\n
\n This paper considers function computation in a network where intermediate nodes perform randomized network coding, through appropriate choice of the subspace codebooks at the source nodes. Unlike traditional network coding for computing functions, that requires intermediate nodes to be aware of the function to be computed, our designs are transparent to the intermediate node operations.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Keller; A. Le; B. Cici; H. Seferoglu; C. Fragouli; and A. Markopoulou.\n\n\n \n \n \n \n Microcast: Cooperative video streaming on smartphones.\n \n \n \n\n\n \n\n\n\n In Proceedings of the 10th international conference on Mobile systems, applications, and services, pages 57–70, 2012. ACM\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{keller_microcast_2012,\n abstract = {Video streaming is one of the increasingly popular, as well as demanding, applications on smartphones today. In this paper, we consider a group of smartphone users, within proximity of each other, who are interested in watching the same video from the Internet at the same time. The common practice today is that each user downloads the video independently using her own cellular connection, which often leads to poor quality. We design, implement, and evaluate a novel system, MicroCast, that uses the resources on all smartphones of the group in a cooperative way so as to improve the streaming experience. Each 4 phone uses simultaneously two network interfaces: the cellular to connect to the video server and the WiFi to connect to the rest of the group. Key ingredients of our design include the following. First, we propose a scheduling algorithm, MicroDownload, that decides which parts of the video each phone should download from the server, based on the phones’ download rate. Second, we propose a novel all-to-all local dissemination scheme, MicroNC-P2, for sharing content among group members, which outperforms state-of-the-art peer-to-peer schemes in our setting. MicroNC-P2 is designed to exploit WiFi overhearing and network coding, based on a local packet broadcast framework, MicroBroadcast, which we developed specifically for Android phones. We evaluate MicroCast on a testbed consisting of seven Android phones, and we show that it brings significant performance benefits without battery penalty.},\n type={4},\n author = {Keller, L. and Le, A. and Cici, B. and Seferoglu, H. and Fragouli, C. and Markopoulou, A.},\n booktitle = {Proceedings of the 10th international conference on {Mobile} systems, applications, and services},\n pages = {57--70},\n publisher = {ACM},\n tags = {network_coding,wireless},\n title = {Microcast: {Cooperative} video streaming on smartphones},\n year = {2012}\n}\n\n
\n
\n\n\n
\n Video streaming is one of the increasingly popular, as well as demanding, applications on smartphones today. In this paper, we consider a group of smartphone users, within proximity of each other, who are interested in watching the same video from the Internet at the same time. The common practice today is that each user downloads the video independently using her own cellular connection, which often leads to poor quality. We design, implement, and evaluate a novel system, MicroCast, that uses the resources on all smartphones of the group in a cooperative way so as to improve the streaming experience. Each 4 phone uses simultaneously two network interfaces: the cellular to connect to the video server and the WiFi to connect to the rest of the group. Key ingredients of our design include the following. First, we propose a scheduling algorithm, MicroDownload, that decides which parts of the video each phone should download from the server, based on the phones’ download rate. Second, we propose a novel all-to-all local dissemination scheme, MicroNC-P2, for sharing content among group members, which outperforms state-of-the-art peer-to-peer schemes in our setting. MicroNC-P2 is designed to exploit WiFi overhearing and network coding, based on a local packet broadcast framework, MicroBroadcast, which we developed specifically for Android phones. We evaluate MicroCast on a testbed consisting of seven Android phones, and we show that it brings significant performance benefits without battery penalty.\n
\n\n\n
\n\n\n
\n \n\n \n \n A. Le; L. Keller; C. Fragouli; and A. Markopoulou.\n\n\n \n \n \n \n MicroPlay: a networking framework for local multiplayer games.\n \n \n \n\n\n \n\n\n\n In Proceedings of the first ACM international workshop on Mobile gaming, pages 13–18, 2012. ACM\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{le_microplay_2012,\n abstract = {Smartphones are an ideal platform for local multiplayer games, thanks to their computational and networking capabilities as well as their popularity and portability. However, existing game engines do not exploit the locality of players to improve game latency. In this paper, we propose MicroPlay, a complete networking framework for local multiplayer mobile games. To the best of our knowledge, this is the first framework that exploits local connections between smartphones, and in particular, the broadcast nature of the wireless medium, to provide smooth, accurate rendering of all players with two desired properties. First, it performs direct-input rendering (i.e., without any inter- or extrapo- lation of game state) for all players; second, it provides very low game latency. We implement a MicroPlay prototype on Android phones, as well as an example multiplayer car racing game, called Racer, in order to demonstrate MicroPlay’s capabilities. Our experiments show that cars can be rendered smoothly, without any prediction of state, and with only 20–30 ms game latency.},\n type={4},\n author = {Le, A. and Keller, L. and Fragouli, C. and Markopoulou, A.},\n booktitle = {Proceedings of the first {ACM} international workshop on {Mobile} gaming},\n pages = {13--18},\n publisher = {ACM},\n tags = {network_coding,wireless},\n title = {{MicroPlay}: a networking framework for local multiplayer games},\n year = {2012}\n}\n\n
\n
\n\n\n
\n Smartphones are an ideal platform for local multiplayer games, thanks to their computational and networking capabilities as well as their popularity and portability. However, existing game engines do not exploit the locality of players to improve game latency. In this paper, we propose MicroPlay, a complete networking framework for local multiplayer mobile games. To the best of our knowledge, this is the first framework that exploits local connections between smartphones, and in particular, the broadcast nature of the wireless medium, to provide smooth, accurate rendering of all players with two desired properties. First, it performs direct-input rendering (i.e., without any inter- or extrapo- lation of game state) for all players; second, it provides very low game latency. We implement a MicroPlay prototype on Android phones, as well as an example multiplayer car racing game, called Racer, in order to demonstrate MicroPlay’s capabilities. Our experiments show that cars can be rendered smoothly, without any prediction of state, and with only 20–30 ms game latency.\n
\n\n\n
\n\n\n
\n \n\n \n \n I. Safaka; C. Fragouli; K. Argyraki; and Suhas Diggavi.\n\n\n \n \n \n \n Creating shared secrets out of thin air.\n \n \n \n\n\n \n\n\n\n In Proceedings of the 11th ACM Workshop on Hot Topics in Networks, of HotNets-XI, pages 73–78, New York, NY, USA, 2012. ACM\n event-place: Redmond, Washington\n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{safaka_creating_2012,\n address = {New York, NY, USA},\n type={4},\n author = {Safaka, I. and Fragouli, C. and Argyraki, K. and Diggavi, Suhas},\n booktitle = {Proceedings of the 11th {ACM} {Workshop} on {Hot} {Topics} in {Networks}},\n doi = {10.1145/2390231.2390244},\n isbn = {978-1-4503-1776-4},\n keywords = {information-theoretic security, group secrets},\n note = {event-place: Redmond, Washington},\n pages = {73--78},\n publisher = {ACM},\n series = {{HotNets}-{XI}},\n tags = {security},\n title = {Creating shared secrets out of thin air},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n P. Sattari; C. Fragouli; and A. Markopoulou.\n\n\n \n \n \n \n Active topology inference using network coding.\n \n \n \n\n\n \n\n\n\n Physical Communication. 2012.\n Publisher: Elsevier\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{sattari_active_2012,\n type={4},\n author = {Sattari, P. and Fragouli, C. and Markopoulou, A.},\n journal = {Physical Communication},\n note = {Publisher: Elsevier},\n tags = {network_coding},\n title = {Active topology inference using network coding},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Ayan Sengupta; I. -Hsiang Wang; and C. Fragouli.\n\n\n \n \n \n \n Optimizing Quantize-Map-and-Forward in Slow Fading Relay Networks.\n \n \n \n\n\n \n\n\n\n In 2012 50Th Annual Allerton Conference On Communication, Control, And Computing (Allerton), pages 1928–1934, New York, 2012. Ieee\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sengupta_optimizing_2012,\n abstract = {Quantize-Map-and-Forward (QMF) relaying has been shown to achieve the optimal diversity-multiplexing trade-off (DMT) for the slow fading single-antenna relay channel, regardless of whether the relay is full-duplex or half-duplex. A key reason for the DMT optimality is that quantizing at the noise level suffices to achieve the cut-set bound approximately and hence the relay does not need any instantaneous channel state information (CSI). However, DMT only captures the high SNR performance and potentially, limited CSI at the relay can help improve the performance in moderate SNR regimes. In this work we propose an optimization framework for QMF relaying in slow fading relay channels. Focusing on vector Gaussian quantizers, for the full-duplex relay we optimize the outage probability by finding the best quantization level according to the available CSI at the relay and the channel statistics. For the half-duplex relay we find good relay schedules using the same framework. Numerical evaluations show the improvement of taking the CSI into account over noise-level quantization and static schedules in moderate SNR regimes.},\n address = {New York},\n type={4},\n author = {Sengupta, Ayan and Wang, I. -Hsiang and Fragouli, C.},\n booktitle = {2012 {50Th} {Annual} {Allerton} {Conference} {On} {Communication}, {Control}, {And} {Computing} ({Allerton})},\n isbn = {978-1-4673-4539-2},\n pages = {1928--1934},\n publisher = {Ieee},\n tags = {wireless},\n title = {Optimizing {Quantize}-{Map}-and-{Forward} in {Slow} {Fading} {Relay} {Networks}},\n year = {2012}\n}\n\n
\n
\n\n\n
\n Quantize-Map-and-Forward (QMF) relaying has been shown to achieve the optimal diversity-multiplexing trade-off (DMT) for the slow fading single-antenna relay channel, regardless of whether the relay is full-duplex or half-duplex. A key reason for the DMT optimality is that quantizing at the noise level suffices to achieve the cut-set bound approximately and hence the relay does not need any instantaneous channel state information (CSI). However, DMT only captures the high SNR performance and potentially, limited CSI at the relay can help improve the performance in moderate SNR regimes. In this work we propose an optimization framework for QMF relaying in slow fading relay channels. Focusing on vector Gaussian quantizers, for the full-duplex relay we optimize the outage probability by finding the best quantization level according to the available CSI at the relay and the channel statistics. For the half-duplex relay we find good relay schedules using the same framework. Numerical evaluations show the improvement of taking the CSI into account over noise-level quantization and static schedules in moderate SNR regimes.\n
\n\n\n
\n\n\n
\n \n\n \n \n M. J. Siavoshani; and C. Fragouli.\n\n\n \n \n \n \n Multi-terminal secrecy in a linear non-coherent packetized networks.\n \n \n \n\n\n \n\n\n\n In Network Coding (NetCod), 2012 International Symposium on, pages 85–90, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{siavoshani_multi-terminal_2012,\n type={4},\n author = {Siavoshani, M. J. and Fragouli, C.},\n booktitle = {Network {Coding} ({NetCod}), 2012 {International} {Symposium} on},\n pages = {85--90},\n publisher = {IEEE},\n tags = {network_coding,wireless},\n title = {Multi-terminal secrecy in a linear non-coherent packetized networks},\n year = {2012}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n Javad Ebrahimi; and C. Fragouli.\n\n\n \n \n \n \n Algorithms for vector network coding.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory (Special Issue on Facets of Coding Theory: from Algorithms to Networks). 2011.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ebrahimi_algorithms_2011,\n abstract = {We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding coefficients in scalar coding. We start our work by extending the algebraic framework developed for multicasting over graphs in [1] to include operations over matrices; we build on this generalized framework, to provide a new approach for both scalar and vector code design which attempts to minimize the employed field size and employed vector length, while selecting the coding operations. Our algorithms also lead as a special case to network code designs that employ structured matrices.},\n type={2},\n author = {Ebrahimi, Javad and Fragouli, C.},\n journal = {IEEE Transactions on Information Theory (Special Issue on Facets of Coding Theory: from Algorithms to Networks)},\n tags = {network_coding},\n title = {Algorithms for vector network coding},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding coefficients in scalar coding. We start our work by extending the algebraic framework developed for multicasting over graphs in [1] to include operations over matrices; we build on this generalized framework, to provide a new approach for both scalar and vector code design which attempts to minimize the employed field size and employed vector length, while selecting the coding operations. Our algorithms also lead as a special case to network code designs that employ structured matrices.\n
\n\n\n
\n\n\n
\n \n\n \n \n Javad Ebrahimi; and C. Fragouli.\n\n\n \n \n \n \n Combinatorial algorithms for wireless information flow.\n \n \n \n\n\n \n\n\n\n ACM Transactions on Algorithms. 2011.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ebrahimi_combinatorial_2011,\n abstract = {A long-standing open question in information theory is to characterize the unicast capacity of a wireless relay network. The difficulty arises due to the complex signal interactions induced in the network, since the wireless channel inherently broadcasts the signals and there is interference among transmissions. Recently, Avestimehr, Diggavi and Tse proposed a linear deterministic model that takes into account the shared nature of wireless channels, focusing on the signal interactions rather than the background noise. They generalized the min-cut max-flow theorem for graphs to networks of deterministic channels and proved that the capacity can be achieved using information theoretical tools. They showed that the value of the minimum cut is in this case the minimum rank of all the adjacency matrices describing source-destination cuts. In this paper, we develop a polynomial time algorithm that discovers the relay encoding strategy to achieve the min-cut value in linear deterministic (wireless) networks, for the case of a unicast connection. Our algorithm crucially uses a notion of linear independence between channels to calculate the capacity in polynomial time. Moreover, we can achieve the capacity by using very simple one-symbol processing at the intermediate nodes, thereby constructively yielding finite length strategies that achieve the unicast capacity of the linear deterministic (wireless) relay network.},\n type={2},\n author = {Ebrahimi, Javad and Fragouli, C.},\n journal = {ACM Transactions on Algorithms},\n tags = {network_coding,wireless},\n title = {Combinatorial algorithms for wireless information flow},\n year = {2011}\n}\n\n
\n
\n\n\n
\n A long-standing open question in information theory is to characterize the unicast capacity of a wireless relay network. The difficulty arises due to the complex signal interactions induced in the network, since the wireless channel inherently broadcasts the signals and there is interference among transmissions. Recently, Avestimehr, Diggavi and Tse proposed a linear deterministic model that takes into account the shared nature of wireless channels, focusing on the signal interactions rather than the background noise. They generalized the min-cut max-flow theorem for graphs to networks of deterministic channels and proved that the capacity can be achieved using information theoretical tools. They showed that the value of the minimum cut is in this case the minimum rank of all the adjacency matrices describing source-destination cuts. In this paper, we develop a polynomial time algorithm that discovers the relay encoding strategy to achieve the min-cut value in linear deterministic (wireless) networks, for the case of a unicast connection. Our algorithm crucially uses a notion of linear independence between channels to calculate the capacity in polynomial time. Moreover, we can achieve the capacity by using very simple one-symbol processing at the intermediate nodes, thereby constructively yielding finite length strategies that achieve the unicast capacity of the linear deterministic (wireless) relay network.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli.\n\n\n \n \n \n \n Network coding: beyond throughput benefits.\n \n \n \n\n\n \n\n\n\n Special Issue on Network Coding at the Proceedings of the IEEE. 2011.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_network_2011,\n type={2},\n author = {Fragouli, C.},\n journal = {Special Issue on Network Coding at the Proceedings of the IEEE},\n tags = {network_coding},\n title = {Network coding: beyond throughput benefits},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Mahdi Jafari Siavoshani; Soheil Mohajer; C. Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n On the capacity of non-coherent network coding.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory (Special Issue on Facets of Coding Theory: from Algorithms to Networks), 57(2): 1046–1066. February 2011.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{jafari_siavoshani_capacity_2011,\n abstract = {We consider the problem of multicasting information from a source to a set of receivers over a network where intermediate network nodes perform randomized network coding operations on the source packets. We propose a channel model for the non-coherent network coding introduced by Koetter and Kschischang in [6], that captures the essence of such a network operation, and calculate the capacity as a function of network parameters. We prove that use of subspace coding is optimal, and show that, in some cases, the capacity-achieving distribution uses subspaces of several dimensions, where the employed dimensions depend on the packet length. This model and the results also allow us to give guidelines on when subspace coding is beneficial for the proposed model and by how much, in comparison to a coding vector approach, from a capacity viewpoint. We extend our results to the case of multiple source multicast that creates a virtual multiple access channel.},\n type={2},\n author = {Jafari Siavoshani, Mahdi and Mohajer, Soheil and Fragouli, C. and Diggavi, Suhas N.},\n journal = {IEEE Transactions on Information Theory (Special Issue on Facets of Coding Theory: from Algorithms to Networks)},\n month = {February},\n number = {2},\n pages = {1046--1066},\n tags = {network_coding},\n title = {On the capacity of non-coherent network coding},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We consider the problem of multicasting information from a source to a set of receivers over a network where intermediate network nodes perform randomized network coding operations on the source packets. We propose a channel model for the non-coherent network coding introduced by Koetter and Kschischang in [6], that captures the essence of such a network operation, and calculate the capacity as a function of network parameters. We prove that use of subspace coding is optimal, and show that, in some cases, the capacity-achieving distribution uses subspaces of several dimensions, where the employed dimensions depend on the packet length. This model and the results also allow us to give guidelines on when subspace coding is beneficial for the proposed model and by how much, in comparison to a coding vector approach, from a capacity viewpoint. We extend our results to the case of multiple source multicast that creates a virtual multiple access channel.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; Suhas N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Approximate capacity of a class of relay-interference networks.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 57(5): 2837–2864. May 2011.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{mohajer_approximate_2011,\n type={2},\n author = {Mohajer, S. and Diggavi, Suhas N. and Fragouli, C. and Tse, D.},\n journal = {IEEE Transactions on Information Theory},\n month = {May},\n number = {5},\n pages = {2837--2864},\n tags = {wireless},\n title = {Approximate capacity of a class of relay-interference networks},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (16)\n \n \n
\n
\n \n \n
\n \n\n \n \n L. Keller; A. Karaagac; C. Fragouli; and K. Argyraki.\n\n\n \n \n \n \n A network coding approach to the sniper detection problem.\n \n \n \n\n\n \n\n\n\n In IEEE Wireless Measurements Workshop (WinMee), May 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{keller_network_2011,\n abstract = {This paper experimentally studies the reliability and delay of flooding based multicast protocols for a sniper detection application. In particular using an emulator it studies under which conditions protocols based on network coding deliver performance improvements compared to classic flooding. It then presents an implementation of such protocols on mobile phones.},\n type={4},\n author = {Keller, L. and Karaagac, A. and Fragouli, C. and Argyraki, K.},\n booktitle = {{IEEE} {Wireless} {Measurements} {Workshop} ({WinMee})},\n month = {May},\n tags = {wireless, network_coding},\n title = {A network coding approach to the sniper detection problem},\n year = {2011}\n}\n\n
\n
\n\n\n
\n This paper experimentally studies the reliability and delay of flooding based multicast protocols for a sniper detection application. In particular using an emulator it studies under which conditions protocols based on network coding deliver performance improvements compared to classic flooding. It then presents an implementation of such protocols on mobile phones.\n
\n\n\n
\n\n\n
\n \n\n \n \n Shirin Saeedi; and C. Fragouli.\n\n\n \n \n \n \n Degraded two-message multicast over graphs.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), August 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{saeedi_degraded_2011,\n type={4},\n author = {Saeedi, Shirin and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n month = {August},\n tags = {channel_coding,network_coding},\n title = {Degraded two-message multicast over graphs},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n H. Seferoglu; L. Keller; Athina Markopoulou; and C. Fragouli.\n\n\n \n \n \n \n SmartCast: Cooperative video streaming on smartphones.\n \n \n \n\n\n \n\n\n\n In IEEE Allerton Conference on Communications, Control and Computing, 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{seferoglu_smartcast_2011,\n abstract = {Video applications are increasingly popular over smartphones. However, in current cellular systems, the downlink data rate fluctuates and the loss rate can be quite high. We are interested in the scenario where a group of smartphone users, within proximity of each other, are interested in viewing the same video at the same time and are also willing to cooperate with each other. We propose a system that maximizes the video quality by appropriately using all available resources, namely the cellular connections to the phones as well as the device-to-device links that can be established via Bluetooth or WiFi. Key ingredients of our design are: (i) the cooperation among users, (ii) network coding, and (iii) exploiting broadcast in the mobile-to-mobile links. Our approach is grounded on a network utility maximization formulation of the problem. We present numerical results that demonstrate the benefit of our approach, and we implement a prototype on android phones.},\n type={4},\n author = {Seferoglu, H. and Keller, L. and Markopoulou, Athina and Fragouli, C.},\n booktitle = {{IEEE} {Allerton} {Conference} on {Communications}, {Control} and {Computing}},\n tags = {wireless,network_coding},\n title = {{SmartCast}: {Cooperative} video streaming on smartphones},\n year = {2011}\n}\n\n\n
\n
\n\n\n
\n Video applications are increasingly popular over smartphones. However, in current cellular systems, the downlink data rate fluctuates and the loss rate can be quite high. We are interested in the scenario where a group of smartphone users, within proximity of each other, are interested in viewing the same video at the same time and are also willing to cooperate with each other. We propose a system that maximizes the video quality by appropriately using all available resources, namely the cellular connections to the phones as well as the device-to-device links that can be established via Bluetooth or WiFi. Key ingredients of our design are: (i) the cooperation among users, (ii) network coding, and (iii) exploiting broadcast in the mobile-to-mobile links. Our approach is grounded on a network utility maximization formulation of the problem. We present numerical results that demonstrate the benefit of our approach, and we implement a prototype on android phones.\n
\n\n\n
\n\n\n
\n \n\n \n \n Vinodh Venkatesan; Ilias Iliadis; C. Fragouli; and R. Urbanke.\n\n\n \n \n \n \n Reliability of clustered vs. declustered replica placement in data storage systems.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), August 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{venkatesan_reliability_2011,\n type={4},\n author = {Venkatesan, Vinodh and Iliadis, Ilias and Fragouli, C. and Urbanke, R.},\n booktitle = {{IEEE} {International} {Symposium} on {Modeling}, {Analysis} and {Simulation} of {Computer} and {Telecommunication} {Systems} ({MASCOTS})},\n month = {August},\n tags = {storage},\n title = {Reliability of clustered vs. declustered replica placement in data storage systems},\n year = {2011}\n}\n\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V. M. Prabhakaran; C. Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n Secret message capacity of erasure broadcast channels with feedback.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{czap_secret_2011,\n type={4},\n author = {Czap, L. and Prabhakaran, V. M. and Fragouli, C. and Diggavi, Suhas N.},\n booktitle = {{IEEE} {Information} {Theory} {Workshop} ({ITW})},\n tags = {security},\n title = {Secret message capacity of erasure broadcast channels with feedback},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; and C. Fragouli.\n\n\n \n \n \n \n On secure key exchange in wireless networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Network Coding (NetCod), July 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{czap_secure_2011,\n type={4},\n author = {Czap, L. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Network} {Coding} ({NetCod})},\n month = {July},\n tags = {security},\n title = {On secure key exchange in wireless networks},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Georghiu; Shirin Saeedi; C. Fragouli; and A. Toledo.\n\n\n \n \n \n \n Degraded multicasting with network coding over the combination network.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Network Coding (NetCod), 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{georghiu_degraded_2011,\n type={4},\n author = {Georghiu, S. and Saeedi, Shirin and Fragouli, C. and Toledo, A.},\n booktitle = {{IEEE} {International} {Symposium} on {Network} {Coding} ({NetCod})},\n tags = {network_coding},\n title = {Degraded multicasting with network coding over the combination network},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Mahdi Jafari Siavoshani; Shaunak Mishra; Suhas N. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Group secret key agreement over state-dependent wireless broadcast channels.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), August 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{jafari_siavoshani_group_2011,\n type={4},\n author = {Jafari Siavoshani, Mahdi and Mishra, Shaunak and Diggavi, Suhas N. and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n month = {August},\n tags = {security},\n title = {Group secret key agreement over state-dependent wireless broadcast channels},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L. Keller; A. Karaagac; C. Fragouli; and K. Argyraki.\n\n\n \n \n \n \n A network coding approach to the sniper detection problem.\n \n \n \n\n\n \n\n\n\n In IEEE Wireless Measurements Workshop (WinMee), May 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{keller_network_2011,\n abstract = {This paper experimentally studies the reliability and delay of flooding based multicast protocols for a sniper detection application. In particular using an emulator it studies under which conditions protocols based on network coding deliver performance improvements compared to classic flooding. It then presents an implementation of such protocols on mobile phones.},\n type={4},\n author = {Keller, L. and Karaagac, A. and Fragouli, C. and Argyraki, K.},\n booktitle = {{IEEE} {Wireless} {Measurements} {Workshop} ({WinMee})},\n month = {May},\n tags = {network_coding,wireless},\n title = {A network coding approach to the sniper detection problem},\n year = {2011}\n}\n\n
\n
\n\n\n
\n This paper experimentally studies the reliability and delay of flooding based multicast protocols for a sniper detection application. In particular using an emulator it studies under which conditions protocols based on network coding deliver performance improvements compared to classic flooding. It then presents an implementation of such protocols on mobile phones.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Nazaroglu; A. Ozgur; Javad Ebrahimi; and C. Fragouli.\n\n\n \n \n \n \n Network simplification: the Gaussian diamond network with Multiple Antennas.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), August 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{nazaroglu_network_2011,\n type={4},\n author = {Nazaroglu, C. and Ozgur, A. and Ebrahimi, Javad and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n month = {August},\n tags = {wireless},\n title = {Network simplification: the {Gaussian} diamond network with {Multiple} {Antennas}},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Neuberg; P. Papadimitratos; C. Fragouli; and R. Urbanke.\n\n\n \n \n \n \n A mobile world of security.\n \n \n \n\n\n \n\n\n\n In CISS, March 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{neuberg_mobile_2011,\n type={4},\n author = {Neuberg, C. and Papadimitratos, P. and Fragouli, C. and Urbanke, R.},\n booktitle = {{CISS}},\n month = {March},\n tags = {security},\n title = {A mobile world of security},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Shirin Saeedi; and C. Fragouli.\n\n\n \n \n \n \n Degraded two-message multicast over graphs.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), August 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{saeedi_degraded_2011,\n type={4},\n author = {Saeedi, Shirin and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n month = {August},\n tags = {channel_coding,network_coding},\n title = {Degraded two-message multicast over graphs},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n P. Sattari; Athina Markopoulou; and C. Fragouli.\n\n\n \n \n \n \n Maximum likelihood estimation for multiple-source loss tomography with network coding.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Network Coding (NetCod), 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sattari_maximum_2011,\n type={4},\n author = {Sattari, P. and Markopoulou, Athina and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Network} {Coding} ({NetCod})},\n tags = {network_coding},\n title = {Maximum likelihood estimation for multiple-source loss tomography with network coding},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n H. Seferoglu; L. Keller; Athina Markopoulou; and C. Fragouli.\n\n\n \n \n \n \n SmartCast: Cooperative video streaming on smartphones.\n \n \n \n\n\n \n\n\n\n In IEEE Allerton Conference on Communications, Control and Computing, 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{seferoglu_smartcast_2011,\n abstract = {Video applications are increasingly popular over smartphones. However, in current cellular systems, the downlink data rate fluctuates and the loss rate can be quite high. We are interested in the scenario where a group of smartphone users, within proximity of each other, are interested in viewing the same video at the same time and are also willing to cooperate with each other. We propose a system that maximizes the video quality by appropriately using all available resources, namely the cellular connections to the phones as well as the device-to-device links that can be established via Bluetooth or WiFi. Key ingredients of our design are: (i) the cooperation among users, (ii) network coding, and (iii) exploiting broadcast in the mobile-to-mobile links. Our approach is grounded on a network utility maximization formulation of the problem. We present numerical results that demonstrate the benefit of our approach, and we implement a prototype on android phones.},\n type={4},\n author = {Seferoglu, H. and Keller, L. and Markopoulou, Athina and Fragouli, C.},\n booktitle = {{IEEE} {Allerton} {Conference} on {Communications}, {Control} and {Computing}},\n tags = {wireless,network_coding},\n title = {{SmartCast}: {Cooperative} video streaming on smartphones},\n year = {2011}\n}\n\n
\n
\n\n\n
\n Video applications are increasingly popular over smartphones. However, in current cellular systems, the downlink data rate fluctuates and the loss rate can be quite high. We are interested in the scenario where a group of smartphone users, within proximity of each other, are interested in viewing the same video at the same time and are also willing to cooperate with each other. We propose a system that maximizes the video quality by appropriately using all available resources, namely the cellular connections to the phones as well as the device-to-device links that can be established via Bluetooth or WiFi. Key ingredients of our design are: (i) the cooperation among users, (ii) network coding, and (iii) exploiting broadcast in the mobile-to-mobile links. Our approach is grounded on a network utility maximization formulation of the problem. We present numerical results that demonstrate the benefit of our approach, and we implement a prototype on android phones.\n
\n\n\n
\n\n\n
\n \n\n \n \n A. Sengupta; S. Brahma; A. Ozgur; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n Graph-based codes for Quantize-Map-and-Forward relaying.\n \n \n \n\n\n \n\n\n\n In Information Theory Workshop (ITW), 2011 IEEE, pages 140–144, 2011. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sengupta_graph-based_2011,\n type={4},\n author = {Sengupta, A. and Brahma, S. and Ozgur, A. and Fragouli, C. and Diggavi, S.},\n booktitle = {Information {Theory} {Workshop} ({ITW}), 2011 {IEEE}},\n pages = {140--144},\n publisher = {IEEE},\n tags = {wireless},\n title = {Graph-based codes for {Quantize}-{Map}-and-{Forward} relaying},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Vinodh Venkatesan; Ilias Iliadis; C. Fragouli; and R. Urbanke.\n\n\n \n \n \n \n Reliability of clustered vs. declustered replica placement in data storage systems.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), August 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{venkatesan_reliability_2011,\n type={4},\n author = {Venkatesan, Vinodh and Iliadis, Ilias and Fragouli, C. and Urbanke, R.},\n booktitle = {{IEEE} {International} {Symposium} on {Modeling}, {Analysis} and {Simulation} of {Computer} and {Telecommunication} {Systems} ({MASCOTS})},\n month = {August},\n tags = {storage},\n title = {Reliability of clustered vs. declustered replica placement in data storage systems},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n A. Dhulipala; C. Fragouli; and A. Orlitsky.\n\n\n \n \n \n \n Silence based communication.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 56. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{dhulipala_silence_2010,\n abstract = {Communication complexity—the minimum amount of communication required—of computing a function of data held by several parties is studied. A communication model where silence is used to convey information is introduced. For this model the worst-case and average-case complexities of symmetric functions are studied. For binary-input functions the average- and worst-case complexities are determined and the protocols achieving them are described. For functions of non-binary inputs one-round communication, where each party is restricted to communicate in consecutive stages, is considered and the extra amount of communication required by one- over multi-round communication is analyzed. For the special case of ternary-input functions close lower and upper bounds on the worst-case one-round complexity are provided and protocols achieving them are described. Protocols achieving the average-case one-round complexity for ternary-input functions are also described. These protocols can be generalized to inputs of arbitrary size.},\n type={2},\n author = {Dhulipala, A. and Fragouli, C. and Orlitsky, A.},\n journal = {IEEE Transactions on Information Theory},\n tags = {sensor_networks},\n title = {Silence based communication},\n volume = {56},\n year = {2010}\n}\n\n
\n
\n\n\n
\n Communication complexity—the minimum amount of communication required—of computing a function of data held by several parties is studied. A communication model where silence is used to convey information is introduced. For this model the worst-case and average-case complexities of symmetric functions are studied. For binary-input functions the average- and worst-case complexities are determined and the protocols achieving them are described. For functions of non-binary inputs one-round communication, where each party is restricted to communicate in consecutive stages, is considered and the extra amount of communication required by one- over multi-round communication is analyzed. For the special case of ternary-input functions close lower and upper bounds on the worst-case one-round complexity are provided and protocols achieving them are described. Protocols achieving the average-case one-round complexity for ternary-input functions are also described. These protocols can be generalized to inputs of arbitrary size.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n Nikhil Karamchandani; L. Keller; C. Fragouli; and Massimo Franceschetti.\n\n\n \n \n \n \n Function computation via subspace coding.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2010. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{karamchandani_function_2010,\n abstract = {This paper considers function computation in a network where intermediate nodes perform randomized network coding, through appropriate choice of the subspace codebooks at the source nodes. Unlike traditional network coding for computing functions, that requires intermediate nodes to be aware of the function to be computed, our designs are transparent to the intermediate node operations.},\n type={4},\n author = {Karamchandani, Nikhil and Keller, L. and Fragouli, C. and Franceschetti, Massimo},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n doi = {10.1109/isit.2010.5513755},\n tags = {wireless,network_coding},\n title = {Function computation via subspace coding},\n year = {2010}\n}\n\n
\n
\n\n\n
\n This paper considers function computation in a network where intermediate nodes perform randomized network coding, through appropriate choice of the subspace codebooks at the source nodes. Unlike traditional network coding for computing functions, that requires intermediate nodes to be aware of the function to be computed, our designs are transparent to the intermediate node operations.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Keller; Nikhil Karamchandani; and C. Fragouli.\n\n\n \n \n \n \n Function computation over linear channels.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Network Coding (NetCod), 2010. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{keller_function_2010,\n abstract = {This paper considers function computation in a network where intermediate nodes perform randomized network coding, through appropriate choice of the subspace codebooks at the source nodes. Unlike traditional network coding for computing functions, that requires intermediate nodes to be aware of the function to be computed, our designs are transparent to the intermediate node operations.},\n type={4},\n author = {Keller, L. and Karamchandani, Nikhil and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Network} {Coding} ({NetCod})},\n doi = {10.1109/NETCOD.2010.5487679},\n tags = {wireless,network_coding},\n title = {Function computation over linear channels},\n year = {2010}\n}\n\n
\n
\n\n\n
\n This paper considers function computation in a network where intermediate nodes perform randomized network coding, through appropriate choice of the subspace codebooks at the source nodes. Unlike traditional network coding for computing functions, that requires intermediate nodes to be aware of the function to be computed, our designs are transparent to the intermediate node operations.\n
\n\n\n
\n\n\n
\n \n\n \n \n Vinodh Venkatesan; Ilias Iliadis; Xiao-Yu Hu; Robert Haas; and C. Fragouli.\n\n\n \n \n \n \n Effect of Replica Placement on the Reliability of Large-Scale Data Storage Systems.\n \n \n \n\n\n \n\n\n\n Modeling, Analysis, and Simulation of Computer Systems, International Symposium on, 0: 79–88. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{venkatesan_effect_2010,\n type={4},\n author = {Venkatesan, Vinodh and Iliadis, Ilias and Hu, Xiao-Yu and Haas, Robert and Fragouli, C.},\n journal = {Modeling, Analysis, and Simulation of Computer Systems, International Symposium on},\n pages = {79--88},\n tags = {storage},\n title = {Effect of {Replica} {Placement} on the {Reliability} of {Large}-{Scale} {Data} {Storage} {Systems}},\n volume = {0},\n year = {2010}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n R. Appuswamy; Emre Atsan; C. Fragouli; and Massimo Franceschetti.\n\n\n \n \n \n \n On relay placement for deterministic line networks.\n \n \n \n\n\n \n\n\n\n In IEEE Wireless Network Coding Workshop (WiNC), 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{appuswamy_relay_2010,\n abstract = {We consider a unicast communication problem where a source transmits information to a destination through a wireless network with the help of k relays positioned on a line. We adopt the linear deterministic model to capture the wireless signal interactions and study the optimal placement of the relays so that the capacity from the source to the destination in the deterministic network is maximized. Analytical results are provided for a number of special cases, and the insights gained are used to provide a heuristic framework for designing large relay networks.},\n type={4},\n author = {Appuswamy, R. and Atsan, Emre and Fragouli, C. and Franceschetti, Massimo},\n booktitle = {{IEEE} {Wireless} {Network} {Coding} {Workshop} ({WiNC})},\n tags = {wireless},\n title = {On relay placement for deterministic line networks},\n year = {2010}\n}\n\n
\n
\n\n\n
\n We consider a unicast communication problem where a source transmits information to a destination through a wireless network with the help of k relays positioned on a line. We adopt the linear deterministic model to capture the wireless signal interactions and study the optimal placement of the relays so that the capacity from the source to the destination in the deterministic network is maximized. Analytical results are provided for a number of special cases, and the insights gained are used to provide a heuristic framework for designing large relay networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n Javad Ebrahimi; and C. Fragouli.\n\n\n \n \n \n \n Algebraic techniques for deterministic networks.\n \n \n \n\n\n \n\n\n\n In International conference on Signal Processing and Communications (SPCOM), 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ebrahimi_algebraic_2010,\n type={4},\n author = {Ebrahimi, Javad and Fragouli, C.},\n booktitle = {International conference on {Signal} {Processing} and {Communications} ({SPCOM})},\n tags = {wireless},\n title = {Algebraic techniques for deterministic networks},\n year = {2010}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Javad Ebrahimi; and C. Fragouli.\n\n\n \n \n \n \n On the benefits of vector network coding.\n \n \n \n\n\n \n\n\n\n In 48th Annual Allerton Conference on Communication, Control, and Computing, 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ebrahimi_benefits_2010,\n abstract = {In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding coefficients in scalar coding. Vector network coding generalizes scalar coding, and thus offers a wider range of solutions over which to optimize. This paper starts exploring the new possibilities vector network coding can offer along two directions. First, we propose a new randomized algorithm for vector network coding. We compare the performance of our proposed algorithm with the existing randomized algorithms in the literature over a specific class of networks. Second, we explore the use of structured coding matrices for vector network coding. We present deterministic designs that allow to operate using rotation coding matrices and thus result in reduced encoding complexity.},\n type={4},\n author = {Ebrahimi, Javad and Fragouli, C.},\n booktitle = {48th {Annual} {Allerton} {Conference} on {Communication}, {Control}, and {Computing}},\n tags = {network_coding},\n title = {On the benefits of vector network coding},\n year = {2010}\n}\n\n
\n
\n\n\n
\n In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding coefficients in scalar coding. Vector network coding generalizes scalar coding, and thus offers a wider range of solutions over which to optimize. This paper starts exploring the new possibilities vector network coding can offer along two directions. First, we propose a new randomized algorithm for vector network coding. We compare the performance of our proposed algorithm with the existing randomized algorithms in the literature over a specific class of networks. Second, we explore the use of structured coding matrices for vector network coding. We present deterministic designs that allow to operate using rotation coding matrices and thus result in reduced encoding complexity.\n
\n\n\n
\n\n\n
\n \n\n \n \n Javad Ebrahimi; and C. Fragouli.\n\n\n \n \n \n \n Multicasting algorithms for deterministic networks.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), January 2010. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ebrahimi_multicasting_2010,\n abstract = {We present a polynomial time algorithm for multicasting rate h to N receivers over deterministic networks. Our algorithm requires intermediate network nodes to perform coding operations over vectors of a finite length L, through multiplication with L \\#x00D7; L binary coding matrices that play the same role as coding coefficients over graphs. Our code design consists in selecting these matrices so that each receiver is able to recover the source information. As a special case, we provide an alternative construction for a unicast algorithm over deterministic networks.},\n type={4},\n author = {Ebrahimi, Javad and Fragouli, C.},\n booktitle = {{IEEE} {Information} {Theory} {Workshop} ({ITW})},\n doi = {10.1109/itwksps.2010.5503221},\n month = {January},\n tags = {wireless},\n title = {Multicasting algorithms for deterministic networks},\n year = {2010}\n}\n\n
\n
\n\n\n
\n We present a polynomial time algorithm for multicasting rate h to N receivers over deterministic networks. Our algorithm requires intermediate network nodes to perform coding operations over vectors of a finite length L, through multiplication with L #x00D7; L binary coding matrices that play the same role as coding coefficients over graphs. Our code design consists in selecting these matrices so that each receiver is able to recover the source information. As a special case, we provide an alternative construction for a unicast algorithm over deterministic networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n Javad Ebrahimi; and C. Fragouli.\n\n\n \n \n \n \n Vector network coding.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2010. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{ebrahimi_vector_2010,\n abstract = {We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algorithms optimize the length L while designing the coding matrices. These algorithms apply both for regular network graphs as well as linear deterministic networks.},\n type={4},\n author = {Ebrahimi, Javad and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n doi = {10.1109/isit.2010.5513771},\n keywords = {algebraic algorithms, coding coefficients, coding matrices, intermediate node process, linear deterministic networks, matrix algebra, network coding, network graphs, network theory (graphs), scalar network coding, source multicast information, vector network coding algorithms},\n tags = {network_coding},\n title = {Vector network coding},\n year = {2010}\n}\n\n
\n
\n\n\n
\n We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algorithms optimize the length L while designing the coding matrices. These algorithms apply both for regular network graphs as well as linear deterministic networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n Nikhil Karamchandani; L. Keller; C. Fragouli; and Massimo Franceschetti.\n\n\n \n \n \n \n Function computation via subspace coding.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2010. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{karamchandani_function_2010,\n abstract = {This paper considers function computation in a network where intermediate nodes perform randomized network coding, through appropriate choice of the subspace codebooks at the source nodes. Unlike traditional network coding for computing functions, that requires intermediate nodes to be aware of the function to be computed, our designs are transparent to the intermediate node operations.},\n type={4},\n author = {Karamchandani, Nikhil and Keller, L. and Fragouli, C. and Franceschetti, Massimo},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n doi = {10.1109/isit.2010.5513755},\n tags = {wireless,network_coding},\n title = {Function computation via subspace coding},\n year = {2010}\n}\n\n
\n
\n\n\n
\n This paper considers function computation in a network where intermediate nodes perform randomized network coding, through appropriate choice of the subspace codebooks at the source nodes. Unlike traditional network coding for computing functions, that requires intermediate nodes to be aware of the function to be computed, our designs are transparent to the intermediate node operations.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Keller; Nikhil Karamchandani; and C. Fragouli.\n\n\n \n \n \n \n Function computation over linear channels.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Network Coding (NetCod), 2010. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{keller_function_2010,\n abstract = {This paper considers function computation in a network where intermediate nodes perform randomized network coding, through appropriate choice of the subspace codebooks at the source nodes. Unlike traditional network coding for computing functions, that requires intermediate nodes to be aware of the function to be computed, our designs are transparent to the intermediate node operations.},\n type={4},\n author = {Keller, L. and Karamchandani, Nikhil and Fragouli, C.},\n booktitle = {{IEEE} {International} {Symposium} on {Network} {Coding} ({NetCod})},\n doi = {10.1109/NETCOD.2010.5487679},\n tags = {wireless,network_coding},\n title = {Function computation over linear channels},\n year = {2010}\n}\n\n
\n
\n\n\n
\n This paper considers function computation in a network where intermediate nodes perform randomized network coding, through appropriate choice of the subspace codebooks at the source nodes. Unlike traditional network coding for computing functions, that requires intermediate nodes to be aware of the function to be computed, our designs are transparent to the intermediate node operations.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Keller; Mahdi Jafari Siavoshani; K. Argyraki; C. Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n Joint identity-message coding for sensor networks.\n \n \n \n\n\n \n\n\n\n IEEE JSAC on Wireless Sensor Networks. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{keller_joint_2010,\n abstract = {In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as small as a single bit—for instance, in many cases, sensors are used to detect whether and where a certain interesting condition occurred, or to track incremental environmental changes at fixed locations. In such scenarios, the traditional network-protocol paradigm of separately specifying the source identity and the message in distinct fields leads to inefficient communication. This work addresses the question of how communication should happen in such identity-aware sensor networks. We calculate theoretical performance bounds for this type of communication, where “performance” refers to the number of transmitted bits. We propose a communication protocol, where the identity and message of each source are specified jointly using subspace coding. We show through analysis and simulation that our protocol's performance is close to optimal and compare it to the performance of a traditional protocol, where identity and message are specified separately.},\n type={4},\n author = {Keller, L. and Jafari Siavoshani, Mahdi and Argyraki, K. and Fragouli, C. and Diggavi, Suhas N.},\n doi = {10.1109/JSAC.2010.100913},\n journal = {IEEE JSAC on Wireless Sensor Networks},\n tags = {sensor_networks},\n title = {Joint identity-message coding for sensor networks},\n year = {2010}\n}\n\n
\n
\n\n\n
\n In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as small as a single bit—for instance, in many cases, sensors are used to detect whether and where a certain interesting condition occurred, or to track incremental environmental changes at fixed locations. In such scenarios, the traditional network-protocol paradigm of separately specifying the source identity and the message in distinct fields leads to inefficient communication. This work addresses the question of how communication should happen in such identity-aware sensor networks. We calculate theoretical performance bounds for this type of communication, where “performance” refers to the number of transmitted bits. We propose a communication protocol, where the identity and message of each source are specified jointly using subspace coding. We show through analysis and simulation that our protocol's performance is close to optimal and compare it to the performance of a traditional protocol, where identity and message are specified separately.\n
\n\n\n
\n\n\n
\n \n\n \n \n P. Sattari; Athina Markopoulou; and C. Fragouli.\n\n\n \n \n \n \n Inferring Logical Topologies using Network Coding.\n \n \n \n\n\n \n\n\n\n N/A. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{sattari_inferring_2010,\n abstract = {The network coding paradigm is based on the idea that independent information flows can be linearly combined throughout the network to give benefits in terms of throughput, complexity, etc. In this paper, we explore the application of the network coding paradigm to topology inference. Our goal is to infer the topology of a network by sending probes between a given set of multiple sources and multiple receivers and by having intermediate nodes perform network coding operations. Our main idea behind using network coding is to introduce topologydependent correlation, which can be exploited at the receivers to infer the topology. We explored this idea in [33] for trees. We also combined network coding and tomographic techniques to infer the topology of a Directed Acyclic Graph (DAG), under specific routing assumptions, in [34]. The supporting idea in [34] was to decompose a traditional (i.e., without network coding) multiple source, multiple receiver tomography problem into multiple two source, two receiver subproblems, as shown in [12]. In this paper, we unify and extend our two previous pieces of work. Our main contribution is that when intermediate nodes perform network coding, topological information contained in network coded packets allows to uniquely identify a tree topology, or to accurately distinguish among all different 2-by-2 subnetwork components in a general DAG; this knowledge can then be used to merge the subnetworks and reconstruct the general topology. Our approach is applicable to any general Internet-like topology, and is robust to the presence of delay variability and packet loss.},\n type={4},\n author = {Sattari, P. and Markopoulou, Athina and Fragouli, C.},\n journal = {N/A},\n tags = {network_coding},\n title = {Inferring {Logical} {Topologies} using {Network} {Coding}},\n year = {2010}\n}\n\n
\n
\n\n\n
\n The network coding paradigm is based on the idea that independent information flows can be linearly combined throughout the network to give benefits in terms of throughput, complexity, etc. In this paper, we explore the application of the network coding paradigm to topology inference. Our goal is to infer the topology of a network by sending probes between a given set of multiple sources and multiple receivers and by having intermediate nodes perform network coding operations. Our main idea behind using network coding is to introduce topologydependent correlation, which can be exploited at the receivers to infer the topology. We explored this idea in [33] for trees. We also combined network coding and tomographic techniques to infer the topology of a Directed Acyclic Graph (DAG), under specific routing assumptions, in [34]. The supporting idea in [34] was to decompose a traditional (i.e., without network coding) multiple source, multiple receiver tomography problem into multiple two source, two receiver subproblems, as shown in [12]. In this paper, we unify and extend our two previous pieces of work. Our main contribution is that when intermediate nodes perform network coding, topological information contained in network coded packets allows to uniquely identify a tree topology, or to accurately distinguish among all different 2-by-2 subnetwork components in a general DAG; this knowledge can then be used to merge the subnetworks and reconstruct the general topology. Our approach is applicable to any general Internet-like topology, and is robust to the presence of delay variability and packet loss.\n
\n\n\n
\n\n\n
\n \n\n \n \n Vinodh Venkatesan; Ilias Iliadis; Xiao-Yu Hu; Robert Haas; and C. Fragouli.\n\n\n \n \n \n \n Effect of Replica Placement on the Reliability of Large-Scale Data Storage Systems.\n \n \n \n\n\n \n\n\n\n Modeling, Analysis, and Simulation of Computer Systems, International Symposium on, 0: 79–88. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{venkatesan_effect_2010,\n abstract = {Replication is a widely used method to protect largescale data storage systems from data loss when storage nodes fail. It is well known that the placement of replicas of the different data blocks across the nodes affects the time to rebuild. Several systems described in the literature are designed based on the premise that minimizing the rebuild times maximizes the system reliability. Our results however indicate that the reliability is essentially unaffected by the replica placement scheme. We show that, for a replication factor of two, all possible placement schemes have mean times to data loss (MTTDLs) within a factor of two for practical values of the failure rate, storage capacity, and rebuild bandwidth of a storage node. The theoretical results are confirmed by means of event-driven simulation. For higher replication factors, an analytical derivation of MTTDL becomes intractable for a general placement scheme. We therefore use one of the alternate measures of reliability that have been proposed in the literature, namely, the probability of data loss during rebuild in the critical mode of the system. Whereas for a replication factor of two this measure can be directly translated into MTTDL, it is only speculative of the MTTDL behavior for higher replication factors. This measure of reliability is shown to lie within a factor of two for all possible placement schemes and any replication factor. We also show that for any replication factor, the clustered placement scheme has the lowest probability of data loss during rebuild in critical mode among all possible placement schemes, whereas the declustered placement scheme has the highest probability. Simulation results reveal however that these properties do not hold for the corresponding MTTDLs for a replication factor greater than two. This indicates that some alternate measures of reliability may not be appropriate for comparing the MTTDL of different placement schemes.},\n type={4},\n author = {Venkatesan, Vinodh and Iliadis, Ilias and Hu, Xiao-Yu and Haas, Robert and Fragouli, C.},\n journal = {Modeling, Analysis, and Simulation of Computer Systems, International Symposium on},\n pages = {79--88},\n tags = {storage},\n title = {Effect of {Replica} {Placement} on the {Reliability} of {Large}-{Scale} {Data} {Storage} {Systems}},\n volume = {0},\n year = {2010}\n}\n\n
\n
\n\n\n
\n Replication is a widely used method to protect largescale data storage systems from data loss when storage nodes fail. It is well known that the placement of replicas of the different data blocks across the nodes affects the time to rebuild. Several systems described in the literature are designed based on the premise that minimizing the rebuild times maximizes the system reliability. Our results however indicate that the reliability is essentially unaffected by the replica placement scheme. We show that, for a replication factor of two, all possible placement schemes have mean times to data loss (MTTDLs) within a factor of two for practical values of the failure rate, storage capacity, and rebuild bandwidth of a storage node. The theoretical results are confirmed by means of event-driven simulation. For higher replication factors, an analytical derivation of MTTDL becomes intractable for a general placement scheme. We therefore use one of the alternate measures of reliability that have been proposed in the literature, namely, the probability of data loss during rebuild in the critical mode of the system. Whereas for a replication factor of two this measure can be directly translated into MTTDL, it is only speculative of the MTTDL behavior for higher replication factors. This measure of reliability is shown to lie within a factor of two for all possible placement schemes and any replication factor. We also show that for any replication factor, the clustered placement scheme has the lowest probability of data loss during rebuild in critical mode among all possible placement schemes, whereas the declustered placement scheme has the highest probability. Simulation results reveal however that these properties do not hold for the corresponding MTTDLs for a replication factor greater than two. This indicates that some alternate measures of reliability may not be appropriate for comparing the MTTDL of different placement schemes.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; Athina Markopoulou; and M. Gjoka.\n\n\n \n \n \n \n A network coding approach to network tomography.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. January 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_network_2009,\n type={2},\n author = {Fragouli, C. and Markopoulou, Athina and Gjoka, M.},\n journal = {IEEE Transactions on Information Theory},\n month = {January},\n tags = {wireless},\n title = {A network coding approach to network tomography},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; Suhas N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Approximate capacity of a class of gaussian interference-relay networks.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{mohajer_approximate_2009,\n type={2},\n author = {Mohajer, S. and Diggavi, Suhas N. and Fragouli, C. and Tse, D.},\n journal = {IEEE Transactions on Information Theory},\n tags = {network_coding},\n title = {Approximate capacity of a class of gaussian interference-relay networks},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (14)\n \n \n
\n
\n \n \n
\n \n\n \n \n A. Amaudruz; and C. Fragouli.\n\n\n \n \n \n \n Combinatorial algorithms for wireless information flow.\n \n \n \n\n\n \n\n\n\n ACM-SIAM Symposium on Discrete Algorithms (SODA). 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{amaudruz_combinatorial_2009,\n abstract = {A long-standing open question in information theory is to characterize the unicast capacity of a wireless relay network. The difficulty arises due to the complex signal interactions induced in the network, since the wireless channel inherently broadcasts the signals and there is interference among transmissions. Recently, Avestimehr, Diggavi and Tse proposed a linear binary deterministic model that takes into account the shared nature of wireless channels, focusing on the signal interactions rather than the background noise. They generalized the min-cut max-flow theorem for graphs to networks of deterministic channels and proved that the capacity can be achieved using information theoretical tools. They showed that the value of the minimum cut is in this case the minimum rank of all the binary adjacency matrices describing source-destination cuts. However, since there exists an exponential number of cuts, identifying the capacity through exhaustive search becomes infeasible. In this work, we develop a polynomial time algorithm that discovers the relay encoding strategy to achieve the min-cut value in binary linear deterministic (wireless) networks, for the case of a unicast connection. Our algorithm crucially uses a notion of linear independence between edges to calculate the capacity in polynomial time. Moreover, we can achieve the capacity by using very simple one-bit processing at the intermediate nodes, thereby constructively yielding finite length strategies that achieve the unicast capacity of the linear deterministic (wireless) relay network.},\n type={4},\n author = {Amaudruz, A. and Fragouli, C.},\n journal = {ACM-SIAM Symposium on Discrete Algorithms (SODA)},\n tags = {wireless},\n title = {Combinatorial algorithms for wireless information flow},\n year = {2009}\n}\n\n
\n
\n\n\n
\n A long-standing open question in information theory is to characterize the unicast capacity of a wireless relay network. The difficulty arises due to the complex signal interactions induced in the network, since the wireless channel inherently broadcasts the signals and there is interference among transmissions. Recently, Avestimehr, Diggavi and Tse proposed a linear binary deterministic model that takes into account the shared nature of wireless channels, focusing on the signal interactions rather than the background noise. They generalized the min-cut max-flow theorem for graphs to networks of deterministic channels and proved that the capacity can be achieved using information theoretical tools. They showed that the value of the minimum cut is in this case the minimum rank of all the binary adjacency matrices describing source-destination cuts. However, since there exists an exponential number of cuts, identifying the capacity through exhaustive search becomes infeasible. In this work, we develop a polynomial time algorithm that discovers the relay encoding strategy to achieve the min-cut value in binary linear deterministic (wireless) networks, for the case of a unicast connection. Our algorithm crucially uses a notion of linear independence between edges to calculate the capacity in polynomial time. Moreover, we can achieve the capacity by using very simple one-bit processing at the intermediate nodes, thereby constructively yielding finite length strategies that achieve the unicast capacity of the linear deterministic (wireless) relay network.\n
\n\n\n
\n\n\n
\n \n\n \n \n Eleni Drinea; C. Fragouli; and L. Keller.\n\n\n \n \n \n \n Delay with network coding and feedback.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2009. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{drinea_delay_2009,\n type={4},\n author = {Drinea, Eleni and Fragouli, C. and Keller, L.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n doi = {10.1109/isit.2009.5205612},\n keywords = {network coding, channel coding, erasure channel, feedback, feedback information, multiple description coding, NP-hard, offline algorithm, offline minimization problem, online algorithm, online heuristics},\n tags = {network_coding,wireless},\n title = {Delay with network coding and feedback},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; K. Argyraki; and L. Keller.\n\n\n \n \n \n \n Multipath Diversity and Robustness for Sensor Networks.\n \n \n \n\n\n \n\n\n\n In Sensor Networks, pages 75–99. Springer, 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{fragouli_multipath_2009,\n abstract = {Balancing energy efficiency and reliability is a common underlying goal for most information collection protocols in sensor networks. Multipath diversity has emerged as one of the promising techniques to achieve such a balance. In this chapter, we provide a unified framework for the multipath techniques in the literature and discuss their basic benefits and drawbacks. We also discuss emerging techniques from the area of network coding.},\n type={4},\n author = {Fragouli, C. and Argyraki, K. and Keller, L.},\n booktitle = {Sensor {Networks}},\n pages = {75--99},\n publisher = {Springer},\n tags = {sensor_networks},\n title = {Multipath {Diversity} and {Robustness} for {Sensor} {Networks}},\n year = {2009}\n}\n\n
\n
\n\n\n
\n Balancing energy efficiency and reliability is a common underlying goal for most information collection protocols in sensor networks. Multipath diversity has emerged as one of the promising techniques to achieve such a balance. In this chapter, we provide a unified framework for the multipath techniques in the literature and discuss their basic benefits and drawbacks. We also discuss emerging techniques from the area of network coding.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli.\n\n\n \n \n \n \n An overview of network coding for dynamically changing networks.\n \n \n \n\n\n \n\n\n\n Int. J. Auton. Adapt. Commun. Syst., 2(1): 1–23. 2009.\n Place: Inderscience Publishers, Geneva, SWITZERLAND Publisher: Inderscience Publishers\n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_overview_2009,\n type={4},\n author = {Fragouli, C.},\n doi = {10.1504/ijaacs.2009.024280},\n issn = {1754-8632},\n journal = {Int. J. Auton. Adapt. Commun. Syst.},\n note = {Place: Inderscience Publishers, Geneva, SWITZERLAND\nPublisher: Inderscience Publishers},\n number = {1},\n pages = {1--23},\n tags = {network_coding,wireless},\n title = {An overview of network coding for dynamically changing networks},\n volume = {2},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n J. Goseling; C. Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n Network coding for undirected information exchange.\n \n \n \n\n\n \n\n\n\n Communications Letters, IEEE, 13(1): 25–27. January 2009.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{goseling_network_2009,\n abstract = {We consider the information exchange problem where each in a set of terminals transmits information to all other terminals in the set, over an undirected network. We show that the design of only a single network code for multicasting is sufficient to achieve an arbitrary point in the achievable rate region. We also provide an alternative proof for the set of achievable rate tuples.},\n type={4},\n author = {Goseling, J. and Fragouli, C. and Diggavi, Suhas N.},\n doi = {10.1109/lcomm.2009.081288},\n journal = {Communications Letters, IEEE},\n keywords = {network coding, encodingmulticasting network code, undirected information exchange},\n month = {January},\n number = {1},\n pages = {25--27},\n tags = {network_coding},\n title = {Network coding for undirected information exchange},\n volume = {13},\n year = {2009}\n}\n\n\n
\n
\n\n\n
\n We consider the information exchange problem where each in a set of terminals transmits information to all other terminals in the set, over an undirected network. We show that the design of only a single network code for multicasting is sufficient to achieve an arbitrary point in the achievable rate region. We also provide an alternative proof for the set of achievable rate tuples.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mahdi Jafari Siavoshani; S. Mohajer; C. Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n On the capacity of non-coherent network coding.\n \n \n \n\n\n \n\n\n\n In Information Theory, 2009. ISIT 2009. IEEE International Symposium on, pages 273–277, July 2009. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{jafari_siavoshani_capacity_2009,\n abstract = {The min-cut value towards a single receiver in a network with unit capacity edges can be achieved by routing a single bit. The multicast theorem in network coding shows that, the common min-cut value towards N ges 1 receivers can also be achieved using packets of length logN bits, if the operations the intermediate nodes perform are deterministically known at the receivers. We here calculate the capacity in the case where these operations are unknown, and characterize how the capacity depends on the min-cut value and the packet length.},\n type={4},\n author = {Jafari Siavoshani, Mahdi and Mohajer, S. and Fragouli, C. and Diggavi, Suhas N.},\n booktitle = {Information {Theory}, 2009. {ISIT} 2009. {IEEE} {International} {Symposium} on},\n doi = {10.1109/isit.2009.5205851},\n keywords = {multicast theorem, noncoherent network coding, packet length, single bit routing, source coding, telecommunication network routingmin-cut value towards},\n month = {July},\n pages = {273--277},\n tags = {network_coding,wireless},\n title = {On the capacity of non-coherent network coding},\n year = {2009}\n}\n\n
\n
\n\n\n
\n The min-cut value towards a single receiver in a network with unit capacity edges can be achieved by routing a single bit. The multicast theorem in network coding shows that, the common min-cut value towards N ges 1 receivers can also be achieved using packets of length logN bits, if the operations the intermediate nodes perform are deterministically known at the receivers. We here calculate the capacity in the case where these operations are unknown, and characterize how the capacity depends on the min-cut value and the packet length.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mahdi Jafari Siavoshani; L. Keller; K. Argyraki; and C. Fragouli.\n\n\n \n \n \n \n Compressed network coding vectors.\n \n \n \n\n\n \n\n\n\n In Information Theory, 2009. ISIT 2009. IEEE International Symposium on, pages 109–113, July 2009. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{jafari_siavoshani_compressed_2009,\n abstract = {In networks that employ network coding, two main approaches have been proposed in the literature to allow the receivers to recover the source information: (i) use of coding vectors, that keep track of the linear combinations the received packets contain, and (ii) subspace coding, that dispenses of the need to know the linear combinations, since information is conveyed from the choice of subspaces alone. Both these approaches impose the strong requirement that all source packets get potentially combined. We here present a third approach that relaxes this assumption, and is thus not a special case from either of the previous two. This relaxation allows to employ compressed coding vectors to efficiently convey the coding coefficients, without altering the operation of intermediate network nodes. We develop optimal designs for such vectors.},\n type={4},\n author = {Jafari Siavoshani, Mahdi and Keller, L. and Argyraki, K. and Fragouli, C.},\n booktitle = {Information {Theory}, 2009. {ISIT} 2009. {IEEE} {International} {Symposium} on},\n doi = {10.1109/isit.2009.5206041},\n keywords = {linear codes, data compression, intermediate network node, linear combination, subspace coding, vectorscompressed network coding vector},\n month = {July},\n pages = {109--113},\n tags = {network_coding,sensor_networks},\n title = {Compressed network coding vectors},\n year = {2009}\n}\n\n
\n
\n\n\n
\n In networks that employ network coding, two main approaches have been proposed in the literature to allow the receivers to recover the source information: (i) use of coding vectors, that keep track of the linear combinations the received packets contain, and (ii) subspace coding, that dispenses of the need to know the linear combinations, since information is conveyed from the choice of subspaces alone. Both these approaches impose the strong requirement that all source packets get potentially combined. We here present a third approach that relaxes this assumption, and is thus not a special case from either of the previous two. This relaxation allows to employ compressed coding vectors to efficiently convey the coding coefficients, without altering the operation of intermediate network nodes. We develop optimal designs for such vectors.\n
\n\n\n
\n\n\n
\n \n\n \n \n A. Jafarian; Sang Hyun Lee; S. Vishwanath; and C. Fragouli.\n\n\n \n \n \n \n Distributed Rate Allocation for Network-coded Systems.\n \n \n \n\n\n \n\n\n\n In Sensor, Mesh and Ad Hoc Communications and Networks Workshops, 2009. SECON Workshops '09. 6th Annual IEEE Communications Society Conference on, pages 1–6, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{jafarian_distributed_2009,\n abstract = {This paper addresses the problem of distributed rate allocation for a class of multicast networks employing linear network coding. The goal is to minimize the cost (for example, the sum rates allocated to each link in the network) while satisfying a multicast rate requirement for each destination in the network. In essence, this paper aims to achieve network capacity while ensuring that the cost of operation (equivalently, the rate allocated per link in the network) is minimal. This paper uses a belief propagation framework to obtain a distributed algorithm for the rate allocation problem. Simulation results are presented to demonstrate the convergence of this algorithm to the optimal rate allocation solution.},\n type={4},\n author = {Jafarian, A. and Lee, Sang Hyun and Vishwanath, S. and Fragouli, C.},\n booktitle = {Sensor, {Mesh} and {Ad} {Hoc} {Communications} and {Networks} {Workshops}, 2009. {SECON} {Workshops} '09. 6th {Annual} {IEEE} {Communications} {Society} {Conference} on},\n doi = {10.1109/sahcnw.2009.5172929},\n keywords = {cost minimization, distributed algorithm, distributed algorithms, distributed rate allocation, linear codes, linear network coding, minimisationbelief propagation framework, multicast network, network capacity, network-coded system},\n month = {June},\n pages = {1--6},\n tags = {wireless},\n title = {Distributed {Rate} {Allocation} for {Network}-coded {Systems}},\n year = {2009}\n}\n\n
\n
\n\n\n
\n This paper addresses the problem of distributed rate allocation for a class of multicast networks employing linear network coding. The goal is to minimize the cost (for example, the sum rates allocated to each link in the network) while satisfying a multicast rate requirement for each destination in the network. In essence, this paper aims to achieve network capacity while ensuring that the cost of operation (equivalently, the rate allocated per link in the network) is minimal. This paper uses a belief propagation framework to obtain a distributed algorithm for the rate allocation problem. Simulation results are presented to demonstrate the convergence of this algorithm to the optimal rate allocation solution.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Keller; Mahdi Jafari Siavoshani; C. Fragouli; K. Argyraki; and Suhas N. Diggavi.\n\n\n \n \n \n \n Identity aware sensor networks.\n \n \n \n\n\n \n\n\n\n In INFOCOM 2009, IEEE, pages 2177–2185, April 2009. \n ISSN: 0743-166X\n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{keller_identity_2009,\n abstract = {In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as small as a single bit - for instance, in many cases, sensors are used to detect whether and where a certain interesting condition occured, or to track incremental environmental changes at fixed locations. In such scenarios, the traditional network-protocol paradigm of separately specifying the source identity and the message in distinct fields leads to inefficient communication. This work addresses the question of how should communication happen in such identity-aware sensor networks. We reexamine the traditional source-identity/message separation and propose a scheme for jointly encoding the two. We use this to develop a communication method for identity-aware sensor networks and show it to be energy efficient, simple to implement, and gracefully adaptable to scenarios frequently encountered in sensor networks - for instance, node failures, or large numbers of nodes where only few are active during each reporting round.},\n type={4},\n author = {Keller, L. and Jafari Siavoshani, Mahdi and Fragouli, C. and Argyraki, K. and Diggavi, Suhas N.},\n booktitle = {{INFOCOM} 2009, {IEEE}},\n doi = {10.1109/infcom.2009.5062142},\n keywords = {identity aware sensor networks, source-identity-message separation, wireless sensor networks, wireless sensor networksenergy efficient},\n month = {April},\n note = {ISSN: 0743-166X},\n pages = {2177--2185},\n tags = {sensor_networks},\n title = {Identity aware sensor networks},\n year = {2009}\n}\n\n
\n
\n\n\n
\n In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as small as a single bit - for instance, in many cases, sensors are used to detect whether and where a certain interesting condition occured, or to track incremental environmental changes at fixed locations. In such scenarios, the traditional network-protocol paradigm of separately specifying the source identity and the message in distinct fields leads to inefficient communication. This work addresses the question of how should communication happen in such identity-aware sensor networks. We reexamine the traditional source-identity/message separation and propose a scheme for jointly encoding the two. We use this to develop a communication method for identity-aware sensor networks and show it to be energy efficient, simple to implement, and gracefully adaptable to scenarios frequently encountered in sensor networks - for instance, node failures, or large numbers of nodes where only few are active during each reporting round.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Keller; Emre Atsan; K. Argyraki; and C. Fragouli.\n\n\n \n \n \n \n SenseCode: Network coding for reliable sensor networks.\n \n \n \n\n\n \n\n\n\n EPFL Technical Report, in submission. 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{keller_sensecode_2009,\n abstract = {Designing a communication protocol for sensor networks often involves obtaining the “right” trade-off between energy efficiency and reliability. In this paper, we show that network coding provides a means to elegantly balance these two goals. We present the design and implementation of SenseCode, a collection protocol for sensor networks—and, to the best of our knowledge, the first such protocol to employ network coding. SenseCode provides a way to gracefully introduce a configurable amount of redundant information in the network, thereby increasing reliability in the face of packet loss. We compare SenseCode to the best (to our knowledge) existing alternative and show that it achieves higher reliability (typically 20\\%, in certain cases up to 30\\%), while consuming the same amount of network resources. We have implemented SenseCode as a TinyOs module, and evaluate it through TOSSIM simulations, as well as a testbed of 30 TinyNode sensors deployed in our department building},\n type={4},\n author = {Keller, L. and Atsan, Emre and Argyraki, K. and Fragouli, C.},\n journal = {EPFL Technical Report, in submission},\n tags = {network_coding,sensor_networks},\n title = {{SenseCode}: {Network} coding for reliable sensor networks},\n year = {2009}\n}\n\n
\n
\n\n\n
\n Designing a communication protocol for sensor networks often involves obtaining the “right” trade-off between energy efficiency and reliability. In this paper, we show that network coding provides a means to elegantly balance these two goals. We present the design and implementation of SenseCode, a collection protocol for sensor networks—and, to the best of our knowledge, the first such protocol to employ network coding. SenseCode provides a way to gracefully introduce a configurable amount of redundant information in the network, thereby increasing reliability in the face of packet loss. We compare SenseCode to the best (to our knowledge) existing alternative and show that it achieves higher reliability (typically 20%, in certain cases up to 30%), while consuming the same amount of network resources. We have implemented SenseCode as a TinyOs module, and evaluate it through TOSSIM simulations, as well as a testbed of 30 TinyNode sensors deployed in our department building\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; Suhas N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Capacity of deterministic Z-chain relay-interference network.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{mohajer_capacity_2009,\n abstract = {The wireless multiple-unicast problem is considered over a layered network, where the rates of transmission are limited by the relaying and interference effect. The deterministic model introduced is used to capture the broadcasting and multiple access effects. The capacity region of the Z-chain relay-interference network is fully characterized. In order to solve the problem, we introduce a new achievability scheme based on ldquointerference neutralizationrdquo and a new analysis technique to bound the number of non-interfering (pure) signals},\n type={4},\n author = {Mohajer, S. and Diggavi, Suhas N. and Fragouli, C. and Tse, D.},\n booktitle = {{IEEE} {Information} {Theory} {Workshop} ({ITW})},\n tags = {network_coding,wireless},\n title = {Capacity of deterministic {Z}-chain relay-interference network},\n year = {2009}\n}\n\n
\n
\n\n\n
\n The wireless multiple-unicast problem is considered over a layered network, where the rates of transmission are limited by the relaying and interference effect. The deterministic model introduced is used to capture the broadcasting and multiple access effects. The capacity region of the Z-chain relay-interference network is fully characterized. In order to solve the problem, we introduce a new achievability scheme based on ldquointerference neutralizationrdquo and a new analysis technique to bound the number of non-interfering (pure) signals\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; Mahdi Jafari Siavoshani; Suhas N. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n On the capacity of multisource non-coherent network coding.\n \n \n \n\n\n \n\n\n\n In Networking and Information Theory, 2009. ITW 2009. IEEE Information Theory Workshop on, pages 130–134, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{mohajer_capacity_2009-1,\n abstract = {We consider multisource non-coherent network coding, where multiple sources send information to one or multiple receivers. We prove that this is equivalent to a ldquosubspacerdquo channel, that takes subspaces as inputs and outputs. We then show that the rate of each individual receiver is upper bounded as deltai(T - delta1 - delta2), where deltai is what we define to be the ldquodominatingrdquo dimension in the subspace codebook of source i, and T is the ldquocoherencerdquo time of the network.},\n type={4},\n author = {Mohajer, S. and Jafari Siavoshani, Mahdi and Diggavi, Suhas N. and Fragouli, C.},\n booktitle = {Networking and {Information} {Theory}, 2009. {ITW} 2009. {IEEE} {Information} {Theory} {Workshop} on},\n doi = {10.1109/itwnit.2009.5158556},\n keywords = {channel capacity, channel codingchannel capacity, multisource noncoherent network coding, subspace codebook},\n month = {June},\n pages = {130--134},\n tags = {network_coding,wireless},\n title = {On the capacity of multisource non-coherent network coding},\n year = {2009}\n}\n\n
\n
\n\n\n
\n We consider multisource non-coherent network coding, where multiple sources send information to one or multiple receivers. We prove that this is equivalent to a ldquosubspacerdquo channel, that takes subspaces as inputs and outputs. We then show that the rate of each individual receiver is upper bounded as deltai(T - delta1 - delta2), where deltai is what we define to be the ldquodominatingrdquo dimension in the subspace codebook of source i, and T is the ldquocoherencerdquo time of the network.\n
\n\n\n
\n\n\n
\n \n\n \n \n Shirin Saeedi; Suhas N. Diggavi; C. Fragouli; and V. M. Prabhakaran.\n\n\n \n \n \n \n On Degraded Two Message Set Broadcast.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{saeedi_degraded_2009,\n abstract = {We consider the two message set problem, where a source broadcasts a common message W1 to an arbitrary set of receivers U and a private message W2 to a subset of the receivers P x U. Transmissions occur over linear deterministic channels. For the case where at most two receivers do not require the private message, we give an exact characterization of the capacity region, where achievability is through linear coding.},\n type={4},\n author = {Saeedi, Shirin and Diggavi, Suhas N. and Fragouli, C. and Prabhakaran, V. M.},\n booktitle = {{IEEE} {Information} {Theory} {Workshop} ({ITW})},\n tags = {network_coding,wireless},\n title = {On {Degraded} {Two} {Message} {Set} {Broadcast}},\n year = {2009}\n}\n\n
\n
\n\n\n
\n We consider the two message set problem, where a source broadcasts a common message W1 to an arbitrary set of receivers U and a private message W2 to a subset of the receivers P x U. Transmissions occur over linear deterministic channels. For the case where at most two receivers do not require the private message, we give an exact characterization of the capacity region, where achievability is through linear coding.\n
\n\n\n
\n\n\n
\n \n\n \n \n P. Sattari; Athina Markopoulou; and C. Fragouli.\n\n\n \n \n \n \n Multiple source multiple destination topology inference using network coding.\n \n \n \n\n\n \n\n\n\n In Network Coding, Theory, and Applications, 2009. NetCod '09. Workshop on, pages 36–41, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{sattari_multiple_2009,\n abstract = {In this paper, we combine network coding and tomographic techniques for topology inference. Our goal is to infer the topology of a network by sending probes between a given set of multiple sources and multiple receivers and by having intermediate nodes perform network coding operations. We combine and extend two ideas that have been developed independently. On one hand, network coding introduces topology-dependent correlation, which can then be exploited at the receivers to infer the topology. On the other hand, it has been shown that a traditional (i.e., without network coding) multiple source, multiple receiver tomography problem can be decomposed into multiple two source, two receiver subproblems. Our first contribution is to show that, when intermediate nodes perform network coding, topological information contained in network coded packets allows to accurately distinguish among all different 2-by-2 subnetwork components, which was not possible with traditional tomographic techniques. Our second contribution is to use this knowledge to merge the subnetworks and accurately reconstruct the general topology. Our approach is applicable to any general Internet-like topology, and is robust to the presence of delay variability and packet loss.},\n type={4},\n author = {Sattari, P. and Markopoulou, Athina and Fragouli, C.},\n booktitle = {Network {Coding}, {Theory}, and {Applications}, 2009. {NetCod} '09. {Workshop} on},\n doi = {10.1109/netcod.2009.5191391},\n keywords = {network coding, encoding, multiple source multiple destination topology inference, network coded packets, network topology, receivers, routing protocols, telecommunication network topologycorrelation, tomographic techniques},\n month = {June},\n pages = {36--41},\n tags = {network_coding},\n title = {Multiple source multiple destination topology inference using network coding},\n year = {2009}\n}\n\n
\n
\n\n\n
\n In this paper, we combine network coding and tomographic techniques for topology inference. Our goal is to infer the topology of a network by sending probes between a given set of multiple sources and multiple receivers and by having intermediate nodes perform network coding operations. We combine and extend two ideas that have been developed independently. On one hand, network coding introduces topology-dependent correlation, which can then be exploited at the receivers to infer the topology. On the other hand, it has been shown that a traditional (i.e., without network coding) multiple source, multiple receiver tomography problem can be decomposed into multiple two source, two receiver subproblems. Our first contribution is to show that, when intermediate nodes perform network coding, topological information contained in network coded packets allows to accurately distinguish among all different 2-by-2 subnetwork components, which was not possible with traditional tomographic techniques. Our second contribution is to use this knowledge to merge the subnetworks and accurately reconstruct the general topology. Our approach is applicable to any general Internet-like topology, and is robust to the presence of delay variability and packet loss.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; J. Widmer; and J.-Y. Le Boudec.\n\n\n \n \n \n \n Efficient broadcasting using network coding.\n \n \n \n\n\n \n\n\n\n IEEE/ACM Transactions on Networking, 16: 450–463. 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_efficient_2008,\n abstract = {We consider the problem of broadcasting in an ad hoc wireless network, where all nodes of the network are sources that want to transmit information to all other nodes. Our figure of merit is energy efficiency, a critical design parameter for wireless networks since it directly affects battery life and thus network lifetime. We prove that applying ideas from network coding allows to realize significant benefits in terms of energy efficiency for the problem of broadcasting, and propose very simple algorithms that allow to realize these benefits in practice. In particular, our theoretical analysis shows that network coding improves performance by a constant factor in fixed networks. We calculate this factor exactly for some canonical configurations. We then show that in networks where the topology dynamically changes, for example due to mobility, and where operations are restricted to simple distributed algorithms, network coding can offer improvements of a factor of , where is the number of nodes in the network. We use the insights gained from the theoretical analysis to propose low-complexity distributed algorithms for realistic wireless ad hoc scenarios, discuss a number of practical considerations, and evaluate our algorithms through packet level simulation.},\n type={2},\n author = {Fragouli, C. and Widmer, J. and Le Boudec, J.-Y.},\n journal = {IEEE/ACM Transactions on Networking},\n pages = {450--463},\n tags = {network_coding,wireless},\n title = {Efficient broadcasting using network coding},\n volume = {16},\n year = {2008}\n}\n\n
\n
\n\n\n
\n We consider the problem of broadcasting in an ad hoc wireless network, where all nodes of the network are sources that want to transmit information to all other nodes. Our figure of merit is energy efficiency, a critical design parameter for wireless networks since it directly affects battery life and thus network lifetime. We prove that applying ideas from network coding allows to realize significant benefits in terms of energy efficiency for the problem of broadcasting, and propose very simple algorithms that allow to realize these benefits in practice. In particular, our theoretical analysis shows that network coding improves performance by a constant factor in fixed networks. We calculate this factor exactly for some canonical configurations. We then show that in networks where the topology dynamically changes, for example due to mobility, and where operations are restricted to simple distributed algorithms, network coding can offer improvements of a factor of , where is the number of nodes in the network. We use the insights gained from the theoretical analysis to propose low-complexity distributed algorithms for realistic wireless ad hoc scenarios, discuss a number of practical considerations, and evaluate our algorithms through packet level simulation.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mahdi Jafari Siavoshani; C. Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n Subspace properties of network coding and their applications.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory. 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{jafari_siavoshani_subspace_2008,\n type={2},\n author = {Jafari Siavoshani, Mahdi and Fragouli, C. and Diggavi, Suhas N.},\n journal = {IEEE Transactions on Information Theory},\n tags = {network_coding},\n title = {Subspace properties of network coding and their applications},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli.\n\n\n \n \n \n \n Network coding for dynamically changing networks.\n \n \n \n\n\n \n\n\n\n IEEE International Wireless Communications and Mobile Computing Conference. 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_network_2008,\n abstract = {We here advocate the case for network coding as a guiding paradigm for the operation of networks that vary in a small time frame, due to node mobility, channel variations, and varying traffic conditions. Three ideas that appeared succesively in time brought in place an elegant operation for network coding in such environments. These are, use of randomized network coding for intermediate node operation, use of generations to avoid synchronization, and use of subspace coding to allow for small packet sizes. Information theoretical performance limits support these results.},\n type={4},\n author = {Fragouli, C.},\n journal = {IEEE International Wireless Communications and Mobile Computing Conference},\n tags = {network_coding,wireless},\n title = {Network coding for dynamically changing networks},\n year = {2008}\n}\n\n
\n
\n\n\n
\n We here advocate the case for network coding as a guiding paradigm for the operation of networks that vary in a small time frame, due to node mobility, channel variations, and varying traffic conditions. Three ideas that appeared succesively in time brought in place an elegant operation for network coding in such environments. These are, use of randomized network coding for intermediate node operation, use of generations to avoid synchronization, and use of subspace coding to allow for small packet sizes. Information theoretical performance limits support these results.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mahdi Jafari Siavoshani; C. Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n On Locating Byzantine Attackers.\n \n \n \n\n\n \n\n\n\n Network Coding Workshop: Theory and Applications. 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{jafari_siavoshani_locating_2008,\n abstract = {We examine networks that employ network coding, and are subject to Byzantine attacks. We consider systems where an appropriate network error correcting scheme is employed that is able to correct (up to a certain number of) Byzantine errors. Given this setup, we formulate the problem of locating these malicious nodes that insert errors. We utilize the subspace properties of (randomized) network coding to develop algorithms to locate the Byzantine attackers.},\n type={4},\n author = {Jafari Siavoshani, Mahdi and Fragouli, C. and Diggavi, Suhas N.},\n journal = {Network Coding Workshop: Theory and Applications},\n tags = {network_coding},\n title = {On {Locating} {Byzantine} {Attackers}},\n year = {2008}\n}\n\n
\n
\n\n\n
\n We examine networks that employ network coding, and are subject to Byzantine attacks. We consider systems where an appropriate network error correcting scheme is employed that is able to correct (up to a certain number of) Byzantine errors. Given this setup, we formulate the problem of locating these malicious nodes that insert errors. We utilize the subspace properties of (randomized) network coding to develop algorithms to locate the Byzantine attackers.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mahdi Jafari Siavoshani; C. Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n Noncoherent multi-source network coding.\n \n \n \n\n\n \n\n\n\n IEEE International Symposium on Information Theory (ISIT). 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{jafari_siavoshani_noncoherent_2008,\n abstract = {We examine the problem of multiple sources transmitting information to one or more receivers that require the information from all the sources, over a network where the network nodes perform randomized network coding. We consider the noncoherent case, where neither the sources nor the receivers have any knowledge of the intermediate nodes operations. We formulate a model for this problem, inspired from block- fading noncoherent MIMO communications. We prove, using information theoretic tools, that coding over subspaces is sufficient to achieve the capacity, and give bounds for the capacity. We then examine the associated combinatorial problem of code design. We extend the work by Koetter and Kschischang [3] to code constructions for the multisource case. Our constructions can also be viewed as coding for the noncoherent multiple-access finite-field channel.},\n type={4},\n author = {Jafari Siavoshani, Mahdi and Fragouli, C. and Diggavi, Suhas N.},\n journal = {IEEE International Symposium on Information Theory (ISIT)},\n tags = {network_coding,wireless},\n title = {Noncoherent multi-source network coding},\n year = {2008}\n}\n\n
\n
\n\n\n
\n We examine the problem of multiple sources transmitting information to one or more receivers that require the information from all the sources, over a network where the network nodes perform randomized network coding. We consider the noncoherent case, where neither the sources nor the receivers have any knowledge of the intermediate nodes operations. We formulate a model for this problem, inspired from block- fading noncoherent MIMO communications. We prove, using information theoretic tools, that coding over subspaces is sufficient to achieve the capacity, and give bounds for the capacity. We then examine the associated combinatorial problem of code design. We extend the work by Koetter and Kschischang [3] to code constructions for the multisource case. Our constructions can also be viewed as coding for the noncoherent multiple-access finite-field channel.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Keller; Eleni Drinea; and C. Fragouli.\n\n\n \n \n \n \n Online Broadcasting with Network Coding.\n \n \n \n\n\n \n\n\n\n In Network Coding, Theory and Applications, 2008. NetCod 2008. Fourth Workshop on, pages 1 – 6, January 2008. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{keller_online_2008,\n abstract = {Consider a source broadcasting M packets to N receivers over independent erasure channels, where perfect feedback is available from the receivers to the source, and the source is allowed to use coding. We investigate offline and online algorithms that optimize delay, both through theoretical analysis as well as simulation results.},\n type={4},\n author = {Keller, L. and Drinea, Eleni and Fragouli, C.},\n booktitle = {Network {Coding}, {Theory} and {Applications}, 2008. {NetCod} 2008. {Fourth} {Workshop} on},\n doi = {10.1109/netcod.2008.4476183},\n keywords = {network coding, feedback, broadcasting, encoding, online broadcasting},\n month = {January},\n pages = {1 -- 6},\n tags = {network_coding,wireless},\n title = {Online {Broadcasting} with {Network} {Coding}},\n year = {2008}\n}\n\n
\n
\n\n\n
\n Consider a source broadcasting M packets to N receivers over independent erasure channels, where perfect feedback is available from the receivers to the source, and the source is allowed to use coding. We investigate offline and online algorithms that optimize delay, both through theoretical analysis as well as simulation results.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Loyola; T. De Souza; J. Widmer; and C. Fragouli.\n\n\n \n \n \n \n Network-coded broadcast: from canonical networks to random topologies.\n \n \n \n\n\n \n\n\n\n Network Coding Workshop: Theory and Applications. 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{loyola_network-coded_2008,\n abstract = {We consider the problem of finding the minimum number of transmissions in an ad-hoc network for all-to-all broadcasting using network coding. This work generalizes previous results for canonical topologies such as the circle and the wrap around grid to the finite-sized line, and non-wrap-around grid. The latter topologies better reflect network coding in random topologies, since the dissemination of information is "directional", in a sense that information usually arrives via the neighbors on the path to its originator instead of from all possible directions. We find that while the line topology requires a higher number of transmissions compared to the circle, this is interestingly not the case for the grid. We further present simulation results on a heuristic that estimates the required minimum number of transmissions in random wireless topologies and compare it to the optimum solution, as well as previously proposed heuristics.},\n type={4},\n author = {Loyola, L. and Souza, T. De and Widmer, J. and Fragouli, C.},\n journal = {Network Coding Workshop: Theory and Applications},\n tags = {network_coding,wireless},\n title = {Network-coded broadcast: from canonical networks to random topologies},\n year = {2008}\n}\n\n
\n
\n\n\n
\n We consider the problem of finding the minimum number of transmissions in an ad-hoc network for all-to-all broadcasting using network coding. This work generalizes previous results for canonical topologies such as the circle and the wrap around grid to the finite-sized line, and non-wrap-around grid. The latter topologies better reflect network coding in random topologies, since the dissemination of information is \"directional\", in a sense that information usually arrives via the neighbors on the path to its originator instead of from all possible directions. We find that while the line topology requires a higher number of transmissions compared to the circle, this is interestingly not the case for the grid. We further present simulation results on a heuristic that estimates the required minimum number of transmissions in random wireless topologies and compare it to the optimum solution, as well as previously proposed heuristics.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; Suhas N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Transmission techniques for relay-interference networks.\n \n \n \n\n\n \n\n\n\n IEEE Allerton. 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{mohajer_transmission_2008,\n abstract = {In this paper we study the relay-interference wireless network, in which relay (helper) nodes are to facilitate competing information flows over a wireless network. We examine this in the context of a deterministic wireless interaction model, which eliminates the channel noise and focuses on the signal interactions. Using this model, we show that almost all the known schemes such as interference suppression, interference alignment and interference separation are necessary for relay-interference networks. In addition, we discover a new interference management technique, which we call interference neutralization, which allows for over-the-air interference removal, without the transmitters having complete access the interfering signals. We show that interference separation, suppression, and neutralization arise in a fundamental manner, since we show complete characterizations for special configurations of the relay-interference network.},\n type={4},\n author = {Mohajer, S. and Diggavi, Suhas N. and Fragouli, C. and Tse, D.},\n journal = {IEEE Allerton},\n tags = {network_coding,wireless},\n title = {Transmission techniques for relay-interference networks},\n year = {2008}\n}\n\n
\n
\n\n\n
\n In this paper we study the relay-interference wireless network, in which relay (helper) nodes are to facilitate competing information flows over a wireless network. We examine this in the context of a deterministic wireless interaction model, which eliminates the channel noise and focuses on the signal interactions. Using this model, we show that almost all the known schemes such as interference suppression, interference alignment and interference separation are necessary for relay-interference networks. In addition, we discover a new interference management technique, which we call interference neutralization, which allows for over-the-air interference removal, without the transmitters having complete access the interfering signals. We show that interference separation, suppression, and neutralization arise in a fundamental manner, since we show complete characterizations for special configurations of the relay-interference network.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n U. Niesen; C. Fragouli; and D. Tuninetti.\n\n\n \n \n \n \n On the capacity of line networks.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 53: 4039–4058. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{niesen_capacity_2007,\n abstract = {We consider communication through a cascade of discrete memoryless channels (DMCs). The source and destination node of this cascade are allowed to use coding schemes of arbitrary complexity, but the intermediate relay nodes are restricted to process only blocks of a fixed length. We investigate how the processing at the relays must be chosen in order to maximize the capacity of the cascade, that is, the maximum achievable end-to-end rate between the source and the destination. For infinite cascades with fixed intermediate processing length at the relays, we prove that this intermediate processing can be chosen to be identical without loss of optimality, and that the capacity of the cascade coincides with the rate of the best zero-error code of length equal to the block length of the intermediate processing. We further show that for fixed and identical intermediate processing at all relays, convergence of capacity as the length of the cascade goes to infinity is exponentially fast. Finally, we characterize how the block length of the intermediate processing must scale with the length of the cascade to guarantee a constant end-to-end rate. We prove that it is sufficient that the block length scales logarithmically with the network length in order to achieve any rate above the zero-error capacity. We show that in many cases of interest logarithmic growth is also necessary},\n type={2},\n author = {Niesen, U. and Fragouli, C. and Tuninetti, D.},\n journal = {IEEE Transactions on Information Theory},\n pages = {4039--4058},\n tags = {network_coding},\n title = {On the capacity of line networks},\n volume = {53},\n year = {2007}\n}\n\n
\n
\n\n\n
\n We consider communication through a cascade of discrete memoryless channels (DMCs). The source and destination node of this cascade are allowed to use coding schemes of arbitrary complexity, but the intermediate relay nodes are restricted to process only blocks of a fixed length. We investigate how the processing at the relays must be chosen in order to maximize the capacity of the cascade, that is, the maximum achievable end-to-end rate between the source and the destination. For infinite cascades with fixed intermediate processing length at the relays, we prove that this intermediate processing can be chosen to be identical without loss of optimality, and that the capacity of the cascade coincides with the rate of the best zero-error code of length equal to the block length of the intermediate processing. We further show that for fixed and identical intermediate processing at all relays, convergence of capacity as the length of the cascade goes to infinity is exponentially fast. Finally, we characterize how the block length of the intermediate processing must scale with the length of the cascade to guarantee a constant end-to-end rate. We prove that it is sufficient that the block length scales logarithmically with the network length in order to achieve any rate above the zero-error capacity. We show that in many cases of interest logarithmic growth is also necessary\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n Anand K. Dhulipala; C. Fragouli; and Alon Orlitsky.\n\n\n \n \n \n \n Single versus multiple rounds for distributed function computation.\n \n \n \n\n\n \n\n\n\n In Information Theory, 2007. ISIT 2007. IEEE International Symposium on, pages 636 –640, June 2007. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{dhulipala_single_2007,\n abstract = {Communication complexity of computing functions using unrestricted communication and one-round communication are compared. In the standard unrestricted communication each party could potentially communicate several times while in one-round communication each party is restricted to communicate at most once. Results on the ratio of these two complexities are provided for symmetric and asymmetric functions under different scenarios. These results are suitably illustrated with examples.},\n type={4},\n author = {Dhulipala, Anand K. and Fragouli, C. and Orlitsky, Alon},\n booktitle = {Information {Theory}, 2007. {ISIT} 2007. {IEEE} {International} {Symposium} on},\n doi = {10.1109/isit.2007.4557296},\n month = {June},\n pages = {636 --640},\n tags = {CC},\n title = {Single versus multiple rounds for distributed function computation},\n year = {2007}\n}\n\n
\n
\n\n\n
\n Communication complexity of computing functions using unrestricted communication and one-round communication are compared. In the standard unrestricted communication each party could potentially communicate several times while in one-round communication each party is restricted to communicate at most once. Results on the ratio of these two complexities are provided for symmetric and asymmetric functions under different scenarios. These results are suitably illustrated with examples.\n
\n\n\n
\n\n\n
\n \n\n \n \n Anand K. Dhulipala; C. Fragouli; and Alon Orlitsky.\n\n\n \n \n \n \n Single versus multiple rounds for distributed function computation.\n \n \n \n\n\n \n\n\n\n In Information Theory, 2007. ISIT 2007. IEEE International Symposium on, pages 636 –640, June 2007. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{dhulipala_single_2007,\n abstract = {Communication complexity of computing functions using unrestricted communication and one-round communication are compared. In the standard unrestricted communication each party could potentially communicate several times while in one-round communication each party is restricted to communicate at most once. Results on the ratio of these two complexities are provided for symmetric and asymmetric functions under different scenarios. These results are suitably illustrated with examples.},\n type={4},\n author = {Dhulipala, Anand K. and Fragouli, C. and Orlitsky, Alon},\n booktitle = {Information {Theory}, 2007. {ISIT} 2007. {IEEE} {International} {Symposium} on},\n doi = {10.1109/isit.2007.4557296},\n month = {June},\n pages = {636 --640},\n tags = {CC},\n title = {Single versus multiple rounds for distributed function computation},\n year = {2007}\n}\n\n
\n
\n\n\n
\n Communication complexity of computing functions using unrestricted communication and one-round communication are compared. In the standard unrestricted communication each party could potentially communicate several times while in one-round communication each party is restricted to communicate at most once. Results on the ratio of these two complexities are provided for symmetric and asymmetric functions under different scenarios. These results are suitably illustrated with examples.\n
\n\n\n
\n\n\n
\n \n\n \n \n M. Durvy; C. Fragouli; and P. Thiran.\n\n\n \n \n \n \n On feedback for network coding.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2007. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{durvy_feedback_2007,\n type={4},\n author = {Durvy, M. and Fragouli, C. and Thiran, P.},\n booktitle = {{IEEE} {International} {Symposium} on {Information} {Theory} ({ISIT})},\n publisher = {IEEE},\n tags = {network_coding},\n title = {On feedback for network coding},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Durvy; C. Fragouli; and P. Thiran.\n\n\n \n \n \n \n Towards reliable broadcasting using ACKs.\n \n \n \n\n\n \n\n\n\n ISIT. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{durvy_towards_2007,\n abstract = {We propose a mechanism for reliable broadcasting in wireless networks, that consists of two components: a method for bandwidth efficient acknowledgment collection, and a coding scheme that uses acknowledgments. Our approach combines ideas from network coding and distributed space time coding.},\n type={4},\n author = {Durvy, M. and Fragouli, C. and Thiran, P.},\n journal = {ISIT},\n tags = {network_coding,wireless},\n title = {Towards reliable broadcasting using {ACKs}},\n year = {2007}\n}\n\n
\n
\n\n\n
\n We propose a mechanism for reliable broadcasting in wireless networks, that consists of two components: a method for bandwidth efficient acknowledgment collection, and a coding scheme that uses acknowledgments. Our approach combines ideas from network coding and distributed space time coding.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; Desmond Lun; Muriel Médard; and Payam Pakzad.\n\n\n \n \n \n \n On feedback for network coding.\n \n \n \n\n\n \n\n\n\n In in Proc. of 2007 Conference on Information Sciences and Systems (CISS), 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{fragouli_feedback_2007,\n type={4},\n author = {Fragouli, C. and Lun, Desmond and Médard, Muriel and Pakzad, Payam},\n booktitle = {in {Proc}. of 2007 {Conference} on {Information} {Sciences} and {Systems} ({CISS})},\n tags = {network_coding},\n title = {On feedback for network coding},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; Athina Markopoulou; R. Srinivasan; and Suhas N. Diggavi.\n\n\n \n \n \n \n Network monitoring: it depends on your points of view.\n \n \n \n\n\n \n\n\n\n ITA. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_network_2007,\n abstract = {End-to-end active network monitoring infers network characteristics by sending and collecting probe packets from the network edge, while probes traverse the network through multicast trees or a mesh of unicast paths. Most reported methods consider given source and receiver locations and study the path selection and the associated estimation algorithms. In this paper, we show that appropriately choosing the number of sources and receivers, as well as their location, may have a significant effect on the accuracy of the estimation; we also give guidelines on how to choose the best “points of view” of a network for link loss monitoring purposes. Though this observation applies across all monitoring methods, we consider, in particular, networks where nodes are equipped with network coding capabilities; our framework includes as special cases the scenarios of pure multicast and network coding. We show that, in network-coding enabled networks, multiple source active monitoring can exploit these capabilities to estimate link loss rates more efficiently than purely tomographic methods. To address the complexity of the estimation problem for large networks, we also propose efficient algorithms, including the decomposition into smaller multicast inference problems, belief-propagation, and a MINC-like algorithm.},\n type={4},\n author = {Fragouli, C. and Markopoulou, Athina and Srinivasan, R. and Diggavi, Suhas N.},\n journal = {ITA},\n tags = {network_coding},\n title = {Network monitoring: it depends on your points of view},\n year = {2007}\n}\n\n
\n
\n\n\n
\n End-to-end active network monitoring infers network characteristics by sending and collecting probe packets from the network edge, while probes traverse the network through multicast trees or a mesh of unicast paths. Most reported methods consider given source and receiver locations and study the path selection and the associated estimation algorithms. In this paper, we show that appropriately choosing the number of sources and receivers, as well as their location, may have a significant effect on the accuracy of the estimation; we also give guidelines on how to choose the best “points of view” of a network for link loss monitoring purposes. Though this observation applies across all monitoring methods, we consider, in particular, networks where nodes are equipped with network coding capabilities; our framework includes as special cases the scenarios of pure multicast and network coding. We show that, in network-coding enabled networks, multiple source active monitoring can exploit these capabilities to estimate link loss rates more efficiently than purely tomographic methods. To address the complexity of the estimation problem for large networks, we also propose efficient algorithms, including the decomposition into smaller multicast inference problems, belief-propagation, and a MINC-like algorithm.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; D. Katabi; Athina Markopoulou; M. Medard; and H. Rahul.\n\n\n \n \n \n \n Wireless network coding: opportunities and challenges.\n \n \n \n\n\n \n\n\n\n IEEE MILCOM. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_wireless_2007,\n abstract = {Wireless networks suffer from a variety of unique problems such as low throughput, dead spots, and inadequate support for mobility. However, their characteristics such as the broadcast nature of the medium, spatial diversity, and significant data redundancy, provide opportunities for new design principles to address these problems. There has been recent interest in employing network coding in wireless networks. This paper explores the case for network coding as a unifying design paradigm for wireless networks, by describing how it addresses issues of throughput, reliability, mobility, and management. We also discuss the practical challenges facing the integration of such a design into the network stack.},\n type={4},\n author = {Fragouli, C. and Katabi, D. and Markopoulou, Athina and Medard, M. and Rahul, H.},\n journal = {IEEE MILCOM},\n tags = {network_coding,wireless},\n title = {Wireless network coding: opportunities and challenges},\n year = {2007}\n}\n\n
\n
\n\n\n
\n Wireless networks suffer from a variety of unique problems such as low throughput, dead spots, and inadequate support for mobility. However, their characteristics such as the broadcast nature of the medium, spatial diversity, and significant data redundancy, provide opportunities for new design principles to address these problems. There has been recent interest in employing network coding in wireless networks. This paper explores the case for network coding as a unifying design paradigm for wireless networks, by describing how it addresses issues of throughput, reliability, mobility, and management. We also discuss the practical challenges facing the integration of such a design into the network stack.\n
\n\n\n
\n\n\n
\n \n\n \n \n M. Gjoka; C. Fragouli; P. Sattari; and Athina Markopoulou.\n\n\n \n \n \n \n Loss Tomography in General Topologies with Network Coding.\n \n \n \n\n\n \n\n\n\n IEEE GLOBECOM. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{gjoka_loss_2007,\n abstract = {Network tomography infers internal network characteristics by sending and collecting probe packets from the network edge. Traditional tomographic techniques for general topologies typically use a mesh of multicast trees and/or unicast paths to cover the entire graph, which is suboptimal from the point of view of bandwidth efficiency and estimation accuracy. In this paper, we investigate an active probing method for link loss inference in a general topology, where multiple sources and receivers are used and intermediate nodes are equipped with network coding, in addition to unicast and multicast, capabilities. With our approach, each link is traversed by exactly one packet, which is in general a linear combination of the original probes. The receivers infer the loss rate on all links by observing not only the number but also the contents of the received probes. In this paper: (i) we propose an orientation algorithm that creates an acyclic graph with the maximum number of identifiable edges (ii) we define probe combining coding schemes and discuss some of their properties and (iii) we present simulation results over realistic topologies using Belief-Propagation (BP) algorithms.},\n type={4},\n author = {Gjoka, M. and Fragouli, C. and Sattari, P. and Markopoulou, Athina},\n journal = {IEEE GLOBECOM},\n tags = {network_coding},\n title = {Loss {Tomography} in {General} {Topologies} with {Network} {Coding}},\n year = {2007}\n}\n\n
\n
\n\n\n
\n Network tomography infers internal network characteristics by sending and collecting probe packets from the network edge. Traditional tomographic techniques for general topologies typically use a mesh of multicast trees and/or unicast paths to cover the entire graph, which is suboptimal from the point of view of bandwidth efficiency and estimation accuracy. In this paper, we investigate an active probing method for link loss inference in a general topology, where multiple sources and receivers are used and intermediate nodes are equipped with network coding, in addition to unicast and multicast, capabilities. With our approach, each link is traversed by exactly one packet, which is in general a linear combination of the original probes. The receivers infer the loss rate on all links by observing not only the number but also the contents of the received probes. In this paper: (i) we propose an orientation algorithm that creates an acyclic graph with the maximum number of identifiable edges (ii) we define probe combining coding schemes and discuss some of their properties and (iii) we present simulation results over realistic topologies using Belief-Propagation (BP) algorithms.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mahdi Jafari Siavoshani; C. Fragouli; Suhas N. Diggavi; and C. Gkantsidis.\n\n\n \n \n \n \n Bottleneck discovery and overlay management in network coded Peer-to-Peer systems.\n \n \n \n\n\n \n\n\n\n SIGCOMM INM. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{jafari_siavoshani_bottleneck_2007,\n abstract = {The performance of peer-to-peer (P2P) networks depends critically on the good connectivity of the overlay topology. In this paper we study P2P networks for content distribution (such as Avalanche) that use randomized network coding techniques. The basic idea of such systems is that peers randomly combine and exchange linear combinations of the source packets. A header appended to each packet specifies the linear combination that the packet carries. In this paper we show that the linear combinations a node receives from its neighbors reveal structural information about the network. We propose algorithms to utilize this observation for topology management to avoid bottlenecks and clustering in network-coded P2P systems. Our approach is decentralized, inherently adapts to the network topology, and reduces substantially the number of topology rewirings that are necessary to maintain a well connected overlay. Moreover, this is done passively during the normal content distribution. This work demonstrates another value of using network coding and complements previous work that showed network coding achieves high utilization of the network resources.},\n type={4},\n author = {Jafari Siavoshani, Mahdi and Fragouli, C. and Diggavi, Suhas N. and Gkantsidis, C.},\n journal = {SIGCOMM INM},\n tags = {network_coding},\n title = {Bottleneck discovery and overlay management in network coded {Peer}-to-{Peer} systems},\n year = {2007}\n}\n\n
\n
\n\n\n
\n The performance of peer-to-peer (P2P) networks depends critically on the good connectivity of the overlay topology. In this paper we study P2P networks for content distribution (such as Avalanche) that use randomized network coding techniques. The basic idea of such systems is that peers randomly combine and exchange linear combinations of the source packets. A header appended to each packet specifies the linear combination that the packet carries. In this paper we show that the linear combinations a node receives from its neighbors reveal structural information about the network. We propose algorithms to utilize this observation for topology management to avoid bottlenecks and clustering in network-coded P2P systems. Our approach is decentralized, inherently adapts to the network topology, and reduces substantially the number of topology rewirings that are necessary to maintain a well connected overlay. Moreover, this is done passively during the normal content distribution. This work demonstrates another value of using network coding and complements previous work that showed network coding achieves high utilization of the network resources.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mahdi Jafari Siavoshani; C. Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n Subspace properties of randomized network coding.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{jafari_siavoshani_subspace_2007,\n abstract = {Randomized network coding has network nodes randomly combine and exchange linear combinations of the source packets. A header appended to the packet, called coding vector, specifies the exact linear combination that each packet carries. The main contribution of this work is to investigate properties of the subspacesspanned by the collected coding vectors in each network node. We use these properties to exhibit the relationship between the network topology and the subspaces collected at the nodes. This allows us to passively infer the network topology for a general class of graphs.},\n type={4},\n author = {Jafari Siavoshani, Mahdi and Fragouli, C. and Diggavi, Suhas N.},\n booktitle = {{IEEE} {Information} {Theory} {Workshop} ({ITW})},\n tags = {network_coding},\n title = {Subspace properties of randomized network coding},\n year = {2007}\n}\n\n
\n
\n\n\n
\n Randomized network coding has network nodes randomly combine and exchange linear combinations of the source packets. A header appended to the packet, called coding vector, specifies the exact linear combination that each packet carries. The main contribution of this work is to investigate properties of the subspacesspanned by the collected coding vectors in each network node. We use these properties to exhibit the relationship between the network topology and the subspaces collected at the nodes. This allows us to passively infer the network topology for a general class of graphs.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 5\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; and E. Soljanin.\n\n\n \n \n \n \n Network coding: Fundamentals and Applications.\n \n \n \n\n\n \n\n\n\n Volume 1 of Foundations and Trends in NetworkingNow Publisher, 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@book{fragouli_network_2007-1,\n type={5},\n author = {Fragouli, C. and Soljanin, E.},\n publisher = {Now Publisher},\n series = {Foundations and {Trends} in {Networking}},\n tags = {network_coding},\n title = {Network coding: {Fundamentals} and {Applications}},\n volume = {1},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2006\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Chekuri; C. Fragouli; and E. Soljanin.\n\n\n \n \n \n \n On achievable information rates in single-source non-uniform demand networks.\n \n \n \n\n\n \n\n\n\n ISIT. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{chekuri_achievable_2006,\n abstract = {A non-uniform demand network consists of a source and a set of receivers that have different min-cut values from the source. We look at the case where the receivers would like to receive from the source a rate that is (approximately) equal to their min-cut value. We formulate this problem and its relaxations and present preliminary results.},\n type={4},\n author = {Chekuri, C. and Fragouli, C. and Soljanin, E.},\n journal = {ISIT},\n tags = {network_coding},\n title = {On achievable information rates in single-source non-uniform demand networks},\n year = {2006}\n}\n\n
\n
\n\n\n
\n A non-uniform demand network consists of a source and a set of receivers that have different min-cut values from the source. We look at the case where the receivers would like to receive from the source a rate that is (approximately) equal to their min-cut value. We formulate this problem and its relaxations and present preliminary results.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Chekuri; C. Fragouli; and E. Soljanin.\n\n\n \n \n \n \n On Average Throughput Benefits and Alphabet Size in Network Coding.\n \n \n \n\n\n \n\n\n\n IEEE Trans. Inform. Theory. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{chekuri_average_2006,\n abstract = {We examine the throughput benefits that network coding offers with respect to the average throughput achievable by routing, where the average throughput refers to the average of the rates that the individual receivers experience. We relate these benefits to the integrality gap of a standard LP formulation for the directed Steiner tree problem. We describe families of configurations over which network coding at most doubles the average throughput, and analyze a class of directed graph configurations with \\$N\\$ receivers where network coding offers benefits proportional to \\${\\textbackslash}sqrtN\\$. We also discuss other throughput measures in networks, and show how in certain classes of networks, the average throughput can be achieved uniformly by all receivers by employing vector routing and channel coding. Finally, we show configurations where use of randomized coding may require an alphabet size exponentially larger than the minimum alphabet size required.},\n type={4},\n author = {Chekuri, C. and Fragouli, C. and Soljanin, E.},\n journal = {IEEE Trans. Inform. Theory},\n tags = {network_coding},\n title = {On {Average} {Throughput} {Benefits} and {Alphabet} {Size} in {Network} {Coding}},\n year = {2006}\n}\n\n
\n
\n\n\n
\n We examine the throughput benefits that network coding offers with respect to the average throughput achievable by routing, where the average throughput refers to the average of the rates that the individual receivers experience. We relate these benefits to the integrality gap of a standard LP formulation for the directed Steiner tree problem. We describe families of configurations over which network coding at most doubles the average throughput, and analyze a class of directed graph configurations with $N$ receivers where network coding offers benefits proportional to ${\\}sqrtN$. We also discuss other throughput measures in networks, and show how in certain classes of networks, the average throughput can be achieved uniformly by all receivers by employing vector routing and channel coding. Finally, we show configurations where use of randomized coding may require an alphabet size exponentially larger than the minimum alphabet size required.\n
\n\n\n
\n\n\n
\n \n\n \n \n A. Dhulipala; C. Fragouli; and A. Orlitsky.\n\n\n \n \n \n \n Silence based communication for sensor networks.\n \n \n \n\n\n \n\n\n\n ISIT. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{dhulipala_silence_2006,\n abstract = {We consider a power-efficient communication model for wireless sensor networks where silence is used to convey information. We study the average-case and worst-case complexities of symmetric functions under this model and describe protocols that achieve them. For binary-input functions, we determine the average complexity. For ternary-input functions, we consider a special type of protocols and provide close lower and upper bounds for their worst-case complexity. We also describe the protocol that achieves the average complexity.},\n type={4},\n author = {Dhulipala, A. and Fragouli, C. and Orlitsky, A.},\n journal = {ISIT},\n tags = {sensor_networks},\n title = {Silence based communication for sensor networks},\n year = {2006}\n}\n\n
\n
\n\n\n
\n We consider a power-efficient communication model for wireless sensor networks where silence is used to convey information. We study the average-case and worst-case complexities of symmetric functions under this model and describe protocols that achieve them. For binary-input functions, we determine the average complexity. For ternary-input functions, we consider a special type of protocols and provide close lower and upper bounds for their worst-case complexity. We also describe the protocol that achieves the average complexity.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; J. Widmer; and J.-Y. Le Boudec.\n\n\n \n \n \n \n On the benefits of network coding for wireless applications.\n \n \n \n\n\n \n\n\n\n 2nd Network Coding Workshop. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_benefits_2006,\n abstract = {We argue that the main benefits of network coding in a wireless environment might manifest in situations where the topology dynamically changes, and operation is restricted to distributed algorithms that do not employ knowledge about the network environment. We consider several problem instances in this set-up, that include broadcasting information to all nodes of the network and collecting sensor measurements. We show that in many such cases, under some simplifying assumptions, the problem is theoretically equivalent to simple variations of the coupon collector problem. Thus network coding can offer benefits of a factor of \\${\\textbackslash}log n\\$, where \\$n\\$ is the number of nodes and the benefits are in terms of energy efficiency, as was proven in the literature. We present simulation results under more realistic conditions that support this claim.},\n type={4},\n author = {Fragouli, C. and Widmer, J. and Le Boudec, J.-Y.},\n journal = {2nd Network Coding Workshop},\n tags = {network_coding,wireless},\n title = {On the benefits of network coding for wireless applications},\n year = {2006}\n}\n\n
\n
\n\n\n
\n We argue that the main benefits of network coding in a wireless environment might manifest in situations where the topology dynamically changes, and operation is restricted to distributed algorithms that do not employ knowledge about the network environment. We consider several problem instances in this set-up, that include broadcasting information to all nodes of the network and collecting sensor measurements. We show that in many such cases, under some simplifying assumptions, the problem is theoretically equivalent to simple variations of the coupon collector problem. Thus network coding can offer benefits of a factor of ${\\}log n$, where $n$ is the number of nodes and the benefits are in terms of energy efficiency, as was proven in the literature. We present simulation results under more realistic conditions that support this claim.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and E. Soljanin.\n\n\n \n \n \n \n Information Flow Decomposition for Network Coding.\n \n \n \n\n\n \n\n\n\n IEEE Trans. Inform. Theory. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_information_2006,\n abstract = {The famous min-cut, max-flow theorem states that a source node can send a commodity through a network to a sink node at the rate determined by the flow of the min-cut separating the source and the sink. Recently it has been shown that by linear re-encoding at nodes in communications networks, the min-cut rate can be also achieved in multicasting to several sinks. Constructing such coding schemes efficiently is the subject of current research. The main idea in this paper is the identification of structural properties of multicast configurations, by decompositing the information flows into a minimal number of subtrees. This decomposition allows us to show that very different networks are equivalent from the coding point of view, and offers a method to identify such equivalence classes. It also allows us to divide the network coding problem into two almost independent problems: one of graph theory and the other of classical channel coding theory. This approach to network coding enables us to derive tight bounds on the network code alphabet size and calculate the throughput improvement network coding can offer for different configurations. But perhaps the most significant strength of our approach concerns future network coding practice. Namely, we propose algorithms to specify the coding operations at network nodes without the knowledge of the overall network topology. Such decentralized designs facilitate the construction of codes which can easily accommodate future changes in the network, e.g., addition of receivers and loss of links.},\n type={4},\n author = {Fragouli, C. and Soljanin, E.},\n journal = {IEEE Trans. Inform. Theory},\n tags = {network_coding},\n title = {Information {Flow} {Decomposition} for {Network} {Coding}},\n year = {2006}\n}\n\n
\n
\n\n\n
\n The famous min-cut, max-flow theorem states that a source node can send a commodity through a network to a sink node at the rate determined by the flow of the min-cut separating the source and the sink. Recently it has been shown that by linear re-encoding at nodes in communications networks, the min-cut rate can be also achieved in multicasting to several sinks. Constructing such coding schemes efficiently is the subject of current research. The main idea in this paper is the identification of structural properties of multicast configurations, by decompositing the information flows into a minimal number of subtrees. This decomposition allows us to show that very different networks are equivalent from the coding point of view, and offers a method to identify such equivalence classes. It also allows us to divide the network coding problem into two almost independent problems: one of graph theory and the other of classical channel coding theory. This approach to network coding enables us to derive tight bounds on the network code alphabet size and calculate the throughput improvement network coding can offer for different configurations. But perhaps the most significant strength of our approach concerns future network coding practice. Namely, we propose algorithms to specify the coding operations at network nodes without the knowledge of the overall network topology. Such decentralized designs facilitate the construction of codes which can easily accommodate future changes in the network, e.g., addition of receivers and loss of links.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; J. Widmer; and J.-Y. Le Boudec.\n\n\n \n \n \n \n A Network Coding Approach to Energy Efficient Broadcasting: from Theory to Practice.\n \n \n \n\n\n \n\n\n\n Infocom. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_network_2006,\n abstract = {We show that network coding allows to realize significant energy savings in a wireless ad-hoc network, when each node of the network is a source that wants to transmit information to all other nodes. Energy efficiency directly affects battery life and thus is a critical design parameter for wireless ad-hoc networks. We propose an implementable method for performing network coding in such a setting. We analyze theoretical cases in detail, and use the insights gained to propose a practical, fully distributed method for realistic wireless ad-hoc scenarios. We address practical issues such as setting the forwarding factor, managing generations, and impact of transmission range. We use theoretical analysis and packet level simulation.},\n type={4},\n author = {Fragouli, C. and Widmer, J. and Le Boudec, J.-Y.},\n journal = {Infocom},\n tags = {network_coding,wireless},\n title = {A {Network} {Coding} {Approach} to {Energy} {Efficient} {Broadcasting}: from {Theory} to {Practice}},\n year = {2006}\n}\n\n
\n
\n\n\n
\n We show that network coding allows to realize significant energy savings in a wireless ad-hoc network, when each node of the network is a source that wants to transmit information to all other nodes. Energy efficiency directly affects battery life and thus is a critical design parameter for wireless ad-hoc networks. We propose an implementable method for performing network coding in such a setting. We analyze theoretical cases in detail, and use the insights gained to propose a practical, fully distributed method for realistic wireless ad-hoc scenarios. We address practical issues such as setting the forwarding factor, managing generations, and impact of transmission range. We use theoretical analysis and packet level simulation.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; Athina Markopoulou; and Suhas N. Diggavi.\n\n\n \n \n \n \n Topology inference using network coding.\n \n \n \n\n\n \n\n\n\n Allerton. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_topology_2006,\n abstract = {The network coding paradigm is based on the idea that independent information flows can be linearly combined throughout the network to give benefits in terms of throughput, complexity etc. In this paper, we explore the application of the network coding paradigm to topology inference. Our goal is to infer the topology of a network using multiple sources and observations at the edges of the network. In particular, we consider networks where multiple sources send probes and intermediate nodes locally combine probe packets (perform XOR-operations in incoming links). In previous works (e.g., Ratnasamy \\&amp; McCanne '99; Duffield et al '02), the correlation between the observed packet loss patterns is used to infer the underlying topology. In contrast, our main idea behind using network coding is to introduce correlations among multiple probe packets in a topology dependent manner and also develop algorithms that take advantage of these correlations to infer the network topology from end-host observations. Preliminary numerical results illustrate the performance benefits of this approach. In particular, in the absence of packet loss, we can deterministically infer the topology, with very few probes; in the presence of packet loss, we can rapidly infer topology, even at very small loss rates (which was not the case in previous tomography techniques).},\n type={4},\n author = {Fragouli, C. and Markopoulou, Athina and Diggavi, Suhas N.},\n journal = {Allerton},\n tags = {network_coding},\n title = {Topology inference using network coding},\n year = {2006}\n}\n\n
\n
\n\n\n
\n The network coding paradigm is based on the idea that independent information flows can be linearly combined throughout the network to give benefits in terms of throughput, complexity etc. In this paper, we explore the application of the network coding paradigm to topology inference. Our goal is to infer the topology of a network using multiple sources and observations at the edges of the network. In particular, we consider networks where multiple sources send probes and intermediate nodes locally combine probe packets (perform XOR-operations in incoming links). In previous works (e.g., Ratnasamy & McCanne '99; Duffield et al '02), the correlation between the observed packet loss patterns is used to infer the underlying topology. In contrast, our main idea behind using network coding is to introduce correlations among multiple probe packets in a topology dependent manner and also develop algorithms that take advantage of these correlations to infer the network topology from end-host observations. Preliminary numerical results illustrate the performance benefits of this approach. In particular, in the absence of packet loss, we can deterministically infer the topology, with very few probes; in the presence of packet loss, we can rapidly infer topology, even at very small loss rates (which was not the case in previous tomography techniques).\n
\n\n\n
\n\n\n
\n \n\n \n \n D. Lun; P. Pakzad; C. Fragouli; M. Medard; and R. Koetter.\n\n\n \n \n \n \n An Analysis of Finite-Memory Random Linear Coding on Packet Streams.\n \n \n \n\n\n \n\n\n\n 2nd Network Coding Workshop. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{lun_analysis_2006,\n abstract = {We consider the following packet coding scheme: The coding node has a fixed, finite memory in which it stores packets formed from an incoming packet stream, and it sends packets formed from random linear combinations of its memory contents. We analyze the scheme in two settings: as a self-contained component in a network providing reliability on a single link, and as a component employed at intermediate nodes in a block-coded end-to-end connection. We believe that the scheme is a good alternative to automatic repeat request when feedback is too slow, too unreliable, or too difficult to implement.},\n type={4},\n author = {Lun, D. and Pakzad, P. and Fragouli, C. and Medard, M. and Koetter, R.},\n journal = {2nd Network Coding Workshop},\n tags = {network_coding},\n title = {An {Analysis} of {Finite}-{Memory} {Random} {Linear} {Coding} on {Packet} {Streams}},\n year = {2006}\n}\n\n
\n
\n\n\n
\n We consider the following packet coding scheme: The coding node has a fixed, finite memory in which it stores packets formed from an incoming packet stream, and it sends packets formed from random linear combinations of its memory contents. We analyze the scheme in two settings: as a self-contained component in a network providing reliability on a single link, and as a component employed at intermediate nodes in a block-coded end-to-end connection. We believe that the scheme is a good alternative to automatic repeat request when feedback is too slow, too unreliable, or too difficult to implement.\n
\n\n\n
\n\n\n
\n \n\n \n \n U. Niesen; C. Fragouli; and D. Tuninetti.\n\n\n \n \n \n \n Scaling laws for line networks: from zero-error to min-cut capacity.\n \n \n \n\n\n \n\n\n\n ISIT. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{niesen_scaling_2006,\n abstract = {We consider communication through a cascade of \\$L\\$ identical Discrete Memory less Channels (DMCs).The source and destination node are allowed to use coding schemes of arbitrary complexity, but the intermediate relay nodes are restricted to process only blocks of \\$N\\$ symbols.It is well known that for any \\$L\\$ and \\$N{\\textbackslash}toınfty\\$ the relays can use a capacity achieving code and communicate reliably as long as the rate of this code is below the capacity of the underlying DMC. The capacity of the cascade is hence equal to the network {\\textbackslash}em min-cut capacity.For finite \\$N\\$ and \\$L{\\textbackslash}toınfty\\$, we showed in previous work that the optimal intermediate processing is the highest rate zero-error code of length \\$N\\$ for the underlying DMC.The capacity of the cascade coincides with the rate of this zero-error code, and is always below the {\\textbackslash}em zero-error capacity.In this work, we characterize how \\$N\\$ must scale with \\$L\\$ in order to achieve rates in between the zero-error and the min-cut capacity.In particular, we have observed that \\$N = {\\textbackslash}Theta({\\textbackslash}log L)\\$ is {\\textbackslash}em sufficient to achieve any rate below the min-cut capacity. Here, we develop a novel upper bound on the capacity of cascades with optimal intermediate processing that applies for any \\$(N,L)\\$ pairs and use it to show that \\$N = {\\textbackslash}Theta({\\textbackslash}log L)\\$ is {\\textbackslash}em necessary to achieve certain rates above the zero-error capacity. Furthermore, we propose a method to evaluate our upper bound by establishing a connection with the Set-Cover Problem in algorithms.},\n type={4},\n author = {Niesen, U. and Fragouli, C. and Tuninetti, D.},\n journal = {ISIT},\n tags = {network_coding},\n title = {Scaling laws for line networks: from zero-error to min-cut capacity},\n year = {2006}\n}\n\n
\n
\n\n\n
\n We consider communication through a cascade of $L$ identical Discrete Memory less Channels (DMCs).The source and destination node are allowed to use coding schemes of arbitrary complexity, but the intermediate relay nodes are restricted to process only blocks of $N$ symbols.It is well known that for any $L$ and $N{\\}toınfty$ the relays can use a capacity achieving code and communicate reliably as long as the rate of this code is below the capacity of the underlying DMC. The capacity of the cascade is hence equal to the network \\em min-cut capacity.For finite $N$ and $L{\\}toınfty$, we showed in previous work that the optimal intermediate processing is the highest rate zero-error code of length $N$ for the underlying DMC.The capacity of the cascade coincides with the rate of this zero-error code, and is always below the \\em zero-error capacity.In this work, we characterize how $N$ must scale with $L$ in order to achieve rates in between the zero-error and the min-cut capacity.In particular, we have observed that $N = {\\}Theta({\\}log L)$ is \\em sufficient to achieve any rate below the min-cut capacity. Here, we develop a novel upper bound on the capacity of cascades with optimal intermediate processing that applies for any $(N,L)$ pairs and use it to show that $N = {\\}Theta({\\}log L)$ is \\em necessary to achieve certain rates above the zero-error capacity. Furthermore, we propose a method to evaluate our upper bound by establishing a connection with the Set-Cover Problem in algorithms.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 5\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; J. Widmer; and J.-Y. Le Boudec.\n\n\n \n \n \n \n Network coding: an instant primer.\n \n \n \n\n\n \n\n\n\n ACM SIGCOM Computer Communication Review. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_network_2006-1,\n abstract = {Network coding is a new research area that may have interesting applications in practical networking systems. With network coding, intermediate nodes may send out packets that are linear combinations of previously received information. There are two main benefits of this approach: potential throughput improvements and a high degree of robustness. Robustness translates into loss resilience and facilitates the design of simple distributed algorithms that perform well, even if decisions are based only on partial information. This paper is an instant primer on network coding: we explain what network coding does and how it does it. We also discuss the implications of theoretical results on network coding for realistic settings and show how network coding can be used in practice.},\n type={5},\n author = {Fragouli, C. and Widmer, J. and Le Boudec, J.-Y.},\n journal = {ACM SIGCOM Computer Communication Review},\n tags = {network_coding},\n title = {Network coding: an instant primer},\n year = {2006}\n}\n\n
\n
\n\n\n
\n Network coding is a new research area that may have interesting applications in practical networking systems. With network coding, intermediate nodes may send out packets that are linear combinations of previously received information. There are two main benefits of this approach: potential throughput improvements and a high degree of robustness. Robustness translates into loss resilience and facilitates the design of simple distributed algorithms that perform well, even if decisions are based only on partial information. This paper is an instant primer on network coding: we explain what network coding does and how it does it. We also discuss the implications of theoretical results on network coding for realistic settings and show how network coding can be used in practice.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2005\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; and T. Tabet.\n\n\n \n \n \n \n Conditions for constant throughput in wireless networks.\n \n \n \n\n\n \n\n\n\n ACM Transactions on Sensor Networks, 2: 359–379. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_conditions_2005,\n abstract = {In this paper we propose a set of necessary and sufficient conditions under which the throughput in an ad-hoc network can remain constant as the number of nodes \\$n\\$ increases. Throughput refers to the minimum achievable rate between a source-destination pair for a given routing mechanism and physical model, when the network is shared by \\${\\textbackslash}Theta(n)\\$ randomly chosen source-destination pairs. The main idea is to use a {\\textbackslash}em connectivity graph, that does not represent the actual physical network, but rather the available communication resources. This graph also allows to translate the problem of maximizing t he throughput in ad-hoc networks to the multicommodity flow problem and directly apply related results.},\n type={2},\n author = {Fragouli, C. and Tabet, T.},\n journal = {ACM Transactions on Sensor Networks},\n pages = {359--379},\n tags = {sensor_networks},\n title = {Conditions for constant throughput in wireless networks},\n volume = {2},\n year = {2005}\n}\n\n
\n
\n\n\n
\n In this paper we propose a set of necessary and sufficient conditions under which the throughput in an ad-hoc network can remain constant as the number of nodes $n$ increases. Throughput refers to the minimum achievable rate between a source-destination pair for a given routing mechanism and physical model, when the network is shared by ${\\}Theta(n)$ randomly chosen source-destination pairs. The main idea is to use a \\em connectivity graph, that does not represent the actual physical network, but rather the available communication resources. This graph also allows to translate the problem of maximizing t he throughput in ad-hoc networks to the multicommodity flow problem and directly apply related results.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Chekuri; C. Fragouli; and E. Soljanin.\n\n\n \n \n \n \n On average throughput benefits and alphabet size in network Coding.\n \n \n \n\n\n \n\n\n\n ISIT. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{chekuri_average_2005,\n abstract = {We analyze a special class of configurations with \\$h\\$ sources and \\$N\\$ receivers to demonstrate the throughput benefits of network coding and deterministic code design. We show that the throughput benefits network coding offers can increase proportionally to \\${\\textbackslash}sqrtN\\$, with respect to the average as well as the minimum throughput. We also show that while for this class of configurations there exists a deterministic coding scheme that realizes these benefits using a binary alphabet, randomized coding may require an exponentially large alphabet size.},\n type={4},\n author = {Chekuri, C. and Fragouli, C. and Soljanin, E.},\n journal = {ISIT},\n tags = {network_coding},\n title = {On average throughput benefits and alphabet size in network {Coding}},\n year = {2005}\n}\n\n
\n
\n\n\n
\n We analyze a special class of configurations with $h$ sources and $N$ receivers to demonstrate the throughput benefits of network coding and deterministic code design. We show that the throughput benefits network coding offers can increase proportionally to ${\\}sqrtN$, with respect to the average as well as the minimum throughput. We also show that while for this class of configurations there exists a deterministic coding scheme that realizes these benefits using a binary alphabet, randomized coding may require an exponentially large alphabet size.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and Athina Markopoulou.\n\n\n \n \n \n \n A Network Coding Approach to Network Monitoring.\n \n \n \n\n\n \n\n\n\n Allerton. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_network_2005,\n abstract = {Network Monitoring is a challenging problem that has received a lot of attention in the Internet community, particularly in the context of overlay networks. Independently, recent advances in Network Coding have shown that it is possible to increase network capacity and better share the available resources by allowing intermediate nodes to perform processing operations, in addition to just forwarding packets. In this work, we propose the use of Network Coding techniques to improve Network Monitoring. As a specific application, we use our approach for the well-known problem of network tomography, and in particular for inferring link loss rates from end-to-end measurements. We demonstrate that our approach can decrease the bandwidth used by probes, improve the accuracy of estimation, and decrease the complexity of selecting paths or trees to send probes. Overall, we argue that the use of Network Coding techniques shows great promise for improving several aspects of monitoring in overlay networks.},\n type={4},\n author = {Fragouli, C. and Markopoulou, Athina},\n journal = {Allerton},\n tags = {network_coding},\n title = {A {Network} {Coding} {Approach} to {Network} {Monitoring}},\n year = {2005}\n}\n\n
\n
\n\n\n
\n Network Monitoring is a challenging problem that has received a lot of attention in the Internet community, particularly in the context of overlay networks. Independently, recent advances in Network Coding have shown that it is possible to increase network capacity and better share the available resources by allowing intermediate nodes to perform processing operations, in addition to just forwarding packets. In this work, we propose the use of Network Coding techniques to improve Network Monitoring. As a specific application, we use our approach for the well-known problem of network tomography, and in particular for inferring link loss rates from end-to-end measurements. We demonstrate that our approach can decrease the bandwidth used by probes, improve the accuracy of estimation, and decrease the complexity of selecting paths or trees to send probes. Overall, we argue that the use of Network Coding techniques shows great promise for improving several aspects of monitoring in overlay networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and A. Orlitsky.\n\n\n \n \n \n \n Silence is golden and time is money: power-aware communication for sensor networks.\n \n \n \n\n\n \n\n\n\n In 43rd Annual Allerton Conference on Communication, Control, and Computing, 2005. \n event-place: University of Illinois, Urbana-Champaign, USA\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{fragouli_silence_2005,\n type={4},\n author = {Fragouli, C. and Orlitsky, A.},\n booktitle = {43rd {Annual} {Allerton} {Conference} on {Communication}, {Control}, and {Computing}},\n note = {event-place: University of Illinois, Urbana-Champaign, USA},\n tags = {sensor_networks},\n title = {Silence is golden and time is money: power-aware communication for sensor networks},\n year = {2005}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n U. Niesen; C. Fragouli; and D. Tuninetti.\n\n\n \n \n \n \n On cascaded channels with finite complexity processing at intermediate nodes.\n \n \n \n\n\n \n\n\n\n Allerton. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{niesen_cascaded_2005,\n abstract = {We consider communication through an infinite cascade of identical discrete memoryless channels. We allow the source and destination nodes to use coding schemes of arbitrary complexity, but restrict the intermediate (relay) nodes to process blocks of a fixed blocklength. We calculate the optimal end-to-end rate, maximized over all possible processings at the relays, and show that it coincides with the end-to-end zero-error capacity. The optimal processing is shown to be identical at each relay and to correspond to a zero-error code. We also show that the rate of convergence to the asymptotic value is exponential in the length of the cascade.},\n type={4},\n author = {Niesen, U. and Fragouli, C. and Tuninetti, D.},\n journal = {Allerton},\n tags = {network_coding},\n title = {On cascaded channels with finite complexity processing at intermediate nodes},\n year = {2005}\n}\n\n
\n
\n\n\n
\n We consider communication through an infinite cascade of identical discrete memoryless channels. We allow the source and destination nodes to use coding schemes of arbitrary complexity, but restrict the intermediate (relay) nodes to process blocks of a fixed blocklength. We calculate the optimal end-to-end rate, maximized over all possible processings at the relays, and show that it coincides with the end-to-end zero-error capacity. The optimal processing is shown to be identical at each relay and to correspond to a zero-error code. We also show that the rate of convergence to the asymptotic value is exponential in the length of the cascade.\n
\n\n\n
\n\n\n
\n \n\n \n \n P. Pakzad; C. Fragouli; and A. Shokrollahi.\n\n\n \n \n \n \n Coding schemes for line networks.\n \n \n \n\n\n \n\n\n\n ISIT. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{pakzad_coding_2005,\n abstract = {We consider a simple network, where a source and destination node are connected with a line of erasure channels. It is well known that in order to achieve the min-cut capacity, the intermediate nodes are required to process the information. We propose coding schemes for this setting, and discuss each scheme in terms of complexity, delay, achievable rate, memory requirement, and adaptability to unknown channel parameters. We also briefly discuss how these schemes can be extended to more general networks.},\n type={4},\n author = {Pakzad, P. and Fragouli, C. and Shokrollahi, A.},\n journal = {ISIT},\n tags = {network_coding},\n title = {Coding schemes for line networks},\n year = {2005}\n}\n\n
\n
\n\n\n
\n We consider a simple network, where a source and destination node are connected with a line of erasure channels. It is well known that in order to achieve the min-cut capacity, the intermediate nodes are required to process the information. We propose coding schemes for this setting, and discuss each scheme in terms of complexity, delay, achievable rate, memory requirement, and adaptability to unknown channel parameters. We also briefly discuss how these schemes can be extended to more general networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n D. Tuninetti; and C. Fragouli.\n\n\n \n \n \n \n On the throughput improvement due to limited complexity processing at relay nodes.\n \n \n \n\n\n \n\n\n\n ISIT. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{tuninetti_throughput_2005,\n abstract = {We consider a source that transmits information to a receiver by routing it over a communication network represented by a graph and examine rate benefits that finite complexity processing at the intermediate nodes may offer. We show that there exist configurations where the optimal rate is achieved only when coding across independent information streams (channel coding and routing cannot be separated); that optimal processing is a function of the particular set of channel parameters and not only of the network topology; and that there exists a connection between linear codes and routing for a special class of graphs.},\n type={4},\n author = {Tuninetti, D. and Fragouli, C.},\n journal = {ISIT},\n tags = {network_coding},\n title = {On the throughput improvement due to limited complexity processing at relay nodes},\n year = {2005}\n}\n\n
\n
\n\n\n
\n We consider a source that transmits information to a receiver by routing it over a communication network represented by a graph and examine rate benefits that finite complexity processing at the intermediate nodes may offer. We show that there exist configurations where the optimal rate is achieved only when coding across independent information streams (channel coding and routing cannot be separated); that optimal processing is a function of the particular set of channel parameters and not only of the network topology; and that there exists a connection between linear codes and routing for a special class of graphs.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Widmer; C. Fragouli; and J.-Y. Le Boudec.\n\n\n \n \n \n \n Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding.\n \n \n \n\n\n \n\n\n\n 1st Network Coding Workshop. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{widmer_low-complexity_2005,\n abstract = {Energy efficiency, i.e., the amount of battery energy consumed to transmit bits across a wireless link, is a critical design parameter for wireless ad-hoc networks. This paper examines the problem of broadcasting information to all nodes in an ad-hoc network, when a large percentage of the nodes act as sources. For this application, we theoretically quantify the energy savings that network coding can offer in the cases of a line network and a rectangular grid network. We then propose low-complexity distributed algorithms, and demonstrate through simulation that in practice, for random networks, network coding can in fact offer significant benefits in terms of energy consumption.},\n type={4},\n author = {Widmer, J. and Fragouli, C. and Le Boudec, J.-Y.},\n journal = {1st Network Coding Workshop},\n tags = {network_coding,wireless},\n title = {Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding},\n year = {2005}\n}\n\n
\n
\n\n\n
\n Energy efficiency, i.e., the amount of battery energy consumed to transmit bits across a wireless link, is a critical design parameter for wireless ad-hoc networks. This paper examines the problem of broadcasting information to all nodes in an ad-hoc network, when a large percentage of the nodes act as sources. For this application, we theoretically quantify the energy savings that network coding can offer in the cases of a line network and a rectangular grid network. We then propose low-complexity distributed algorithms, and demonstrate through simulation that in practice, for random networks, network coding can in fact offer significant benefits in terms of energy consumption.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2004\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; and E. Soljanin.\n\n\n \n \n \n \n On Average Throughput Benefits for Network Coding.\n \n \n \n\n\n \n\n\n\n Allerton. 2004.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_average_2004,\n abstract = {We calculate the average throughput benefit that network coding can offer as compared to routing for different classes of multicast configurations over directed graphs. The averaging is over the throughput each individual receiver experiences. For the cases we examine, network coding at most doubles the average throughput.},\n type={4},\n author = {Fragouli, C. and Soljanin, E.},\n journal = {Allerton},\n tags = {network_coding},\n title = {On {Average} {Throughput} {Benefits} for {Network} {Coding}},\n year = {2004}\n}\n\n
\n
\n\n\n
\n We calculate the average throughput benefit that network coding can offer as compared to routing for different classes of multicast configurations over directed graphs. The averaging is over the throughput each individual receiver experiences. For the cases we examine, network coding at most doubles the average throughput.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and E. Soljanin.\n\n\n \n \n \n \n A Connection between Network Coding and Convolutional Codes.\n \n \n \n\n\n \n\n\n\n ICC. 2004.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_connection_2004,\n abstract = {The min-cut, max-flow theorem states that a source node can send a commodity through a network to a sink node at the rate determined by the flow of the min-cut separating the source and the sink. Recently it has been shown that by liner re-encoding at nodes in communications networks, the min-cut rate can be also achieved in multicasting to several sinks. In this paper we discuss connections between such coding schemes and convolutional codes. We propose a method to simplify the convolutionalencoder design that is based on a subtree decompositionof the network line graph, describe the structure of the associated matrices, investigate methods to reduce decoding complexity and discuss possible binary implementation.},\n type={4},\n author = {Fragouli, C. and Soljanin, E.},\n journal = {ICC},\n tags = {network_coding},\n title = {A {Connection} between {Network} {Coding} and {Convolutional} {Codes}},\n year = {2004}\n}\n\n
\n
\n\n\n
\n The min-cut, max-flow theorem states that a source node can send a commodity through a network to a sink node at the rate determined by the flow of the min-cut separating the source and the sink. Recently it has been shown that by liner re-encoding at nodes in communications networks, the min-cut rate can be also achieved in multicasting to several sinks. In this paper we discuss connections between such coding schemes and convolutional codes. We propose a method to simplify the convolutionalencoder design that is based on a subtree decompositionof the network line graph, describe the structure of the associated matrices, investigate methods to reduce decoding complexity and discuss possible binary implementation.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and E. Soljanin.\n\n\n \n \n \n \n Decentralized Network Coding.\n \n \n \n\n\n \n\n\n\n Information Theory Workshop. 2004.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_decentralized_2004,\n abstract = {This paper proposes deterministic algorithms for decentralized network coding. Decentralized coding allows to locally specify the coding operations at network nodes without knowledge of the overall network topology, and to accommodate future changes in the network such as addition of receivers. To the best of our knowledge, these are the first deterministic decentralized algorithms proposed for network coding.},\n type={4},\n author = {Fragouli, C. and Soljanin, E.},\n journal = {Information Theory Workshop},\n tags = {network_coding},\n title = {Decentralized {Network} {Coding}},\n year = {2004}\n}\n\n
\n
\n\n\n
\n This paper proposes deterministic algorithms for decentralized network coding. Decentralized coding allows to locally specify the coding operations at network nodes without knowledge of the overall network topology, and to accommodate future changes in the network such as addition of receivers. To the best of our knowledge, these are the first deterministic decentralized algorithms proposed for network coding.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; E. Soljanin; and A. Shokrollahi.\n\n\n \n \n \n \n Network Coding as a Coloring Problem.\n \n \n \n\n\n \n\n\n\n CISS. 2004.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_network_2004,\n abstract = {We consider a multicast configuration with two sources, and translate the network code design problem to vertex coloring of an appropriately defined graph. This observation enables to derive code design algorithms and alphabet size bounds, as well as establish a connection with a number of well-known results from discrete mathematics that increase our insight in the different trade-offs possible for network coding.},\n type={4},\n author = {Fragouli, C. and Soljanin, E. and Shokrollahi, A.},\n journal = {CISS},\n tags = {network_coding},\n title = {Network {Coding} as a {Coloring} {Problem}},\n year = {2004}\n}\n\n
\n
\n\n\n
\n We consider a multicast configuration with two sources, and translate the network code design problem to vertex coloring of an appropriately defined graph. This observation enables to derive code design algorithms and alphabet size bounds, as well as establish a connection with a number of well-known results from discrete mathematics that increase our insight in the different trade-offs possible for network coding.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and E. Soljanin.\n\n\n \n \n \n \n Subtree Decomposition for Network Coding.\n \n \n \n\n\n \n\n\n\n ISIT. 2004.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_subtree_2004,\n abstract = {We propose a subtree decomposition method for network coding. This approach enables derivation of tight bounds on the network code alpha- bet size, makes connections with convolutional codes transparent, allows specification of coding operations at network nodes without the knowledge of the overall network topology, and facilitates design of codes which can easily accommodate future changes in the network, such as addition of receivers and loss of links.},\n type={4},\n author = {Fragouli, C. and Soljanin, E.},\n journal = {ISIT},\n tags = {network_coding},\n title = {Subtree {Decomposition} for {Network} {Coding}},\n year = {2004}\n}\n\n
\n
\n\n\n
\n We propose a subtree decomposition method for network coding. This approach enables derivation of tight bounds on the network code alpha- bet size, makes connections with convolutional codes transparent, allows specification of coding operations at network nodes without the knowledge of the overall network topology, and facilitates design of codes which can easily accommodate future changes in the network, such as addition of receivers and loss of links.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; T. Tabet; and C. Derdiyok.\n\n\n \n \n \n \n On the Throughput of Ad-Hoc Networks using Connectivity Graphs.\n \n \n \n\n\n \n\n\n\n In 42nd Annual Allerton Conference on Communication, Control, and Computing, 2004. \n event-place: University of Illinois, Urbana-Champaign, USA\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{fragouli_throughput_2004,\n abstract = {In this paper we propose a set of necessary and sufficient conditions under which the throughput in an ad-hoc network can remain constant as the number of nodes n increases. Throughput refers to the minimum achievable rate between a source-destination pair for a given routing mechanism and physical model, when the network is shared by {\\textbackslash}Theta(n) randomly chosen source-destination pairs. The main idea is to use a connectivity graph, that does not represent the actual physical network, but rather the available communication resources.},\n type={4},\n author = {Fragouli, C. and Tabet, T. and Derdiyok, C.},\n booktitle = {42nd {Annual} {Allerton} {Conference} on {Communication}, {Control}, and {Computing}},\n note = {event-place: University of Illinois, Urbana-Champaign, USA},\n tags = {wireless},\n title = {On the {Throughput} of {Ad}-{Hoc} {Networks} using {Connectivity} {Graphs}},\n year = {2004}\n}\n\n
\n
\n\n\n
\n In this paper we propose a set of necessary and sufficient conditions under which the throughput in an ad-hoc network can remain constant as the number of nodes n increases. Throughput refers to the minimum achievable rate between a source-destination pair for a given routing mechanism and physical model, when the network is shared by \\Theta(n) randomly chosen source-destination pairs. The main idea is to use a connectivity graph, that does not represent the actual physical network, but rather the available communication resources.\n
\n\n\n
\n\n\n
\n \n\n \n \n D. Tuninetti; and C. Fragouli.\n\n\n \n \n \n \n Processing along the way: forwarding vs. coding.\n \n \n \n\n\n \n\n\n\n ISITA, Parma. 2004.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{tuninetti_processing_2004,\n abstract = {We consider a source that transmits to a receiver by routing the information packets over a communication network and examine rate benefits that finite complexity processing at the intermediate nodes may offer. We show that the processing capabilities of the intermediate nodes affect not only the end-to-end achievable rate, but also the optimal routing strategy. For example, there exist network configurations where the maximal throughput is achieved only by coding across independent information streams.},\n type={4},\n author = {Tuninetti, D. and Fragouli, C.},\n journal = {ISITA, Parma},\n tags = {network_coding},\n title = {Processing along the way: forwarding vs. coding},\n year = {2004}\n}\n\n
\n
\n\n\n
\n We consider a source that transmits to a receiver by routing the information packets over a communication network and examine rate benefits that finite complexity processing at the intermediate nodes may offer. We show that the processing capabilities of the intermediate nodes affect not only the end-to-end achievable rate, but also the optimal routing strategy. For example, there exist network configurations where the maximal throughput is achieved only by coding across independent information streams.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2003\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; N. Al-Dhahir; and W. Turin.\n\n\n \n \n \n \n Training-based channel estimation for multiple-antenna broadband transmissions.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Wireless Communications, vol. 2, no. 2: pages 384–391. 2003.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_training-based_2003,\n abstract = {This paper addresses the problem of training sequence design for multiple-antenna transmissions over quasi-static frequency-selective channels. To achieve the channel estimation minimum mean square error, the training sequences transmitted from the multiple antennas must have impulse-like auto correlation and zero cross correlation. We reduce the problem of designing multiple training sequences to the much easier and well-understood problem of designing a single training sequence with impulse-like auto correlation. To this end, we propose to encode the training symbols with a space-time code, that may be the same or different from the space-time code that encodes the information symbols.},\n type={2},\n author = {Fragouli, C. and Al-Dhahir, N. and Turin, W.},\n journal = {IEEE Transactions on Wireless Communications},\n pages = {pages 384--391},\n tags = {wireless,channel_coding},\n title = {Training-based channel estimation for multiple-antenna broadband transmissions},\n volume = {vol. 2, no. 2},\n year = {2003}\n}\n\n
\n
\n\n\n
\n This paper addresses the problem of training sequence design for multiple-antenna transmissions over quasi-static frequency-selective channels. To achieve the channel estimation minimum mean square error, the training sequences transmitted from the multiple antennas must have impulse-like auto correlation and zero cross correlation. We reduce the problem of designing multiple training sequences to the much easier and well-understood problem of designing a single training sequence with impulse-like auto correlation. To this end, we propose to encode the training symbols with a space-time code, that may be the same or different from the space-time code that encodes the information symbols.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2002\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; N. Al-Dhahir; Suhas N. Diggavi; and W. Turin.\n\n\n \n \n \n \n Prefiltered M-BCJR Equalizer for MIMO Frequency-Selective Channels.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Communications, vol. 50, no. 5: pages 742–753. 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_prefiltered_2002,\n abstract = {This paper addresses the problem of soft equalization for space-time-coded transmissions over frequency-selective fading channels. The structure of the space-time code is embedded in the channel impulse response for efficient joint equalization and decoding. The proposed equalization/decoding approach uses a prefilter to concentrate the effective channel power in a small number of taps followed by a reduced-complexity maximum a posteriori probability (MAP) equalizer/decoder to produce soft decisions. The prefilter introduces residual intersymbol interference which degrades the performance of MAP when applied to the trellis of the shortened channel. However, the shape of the overall shortened channel impulse response allows the M-algorithm to approximate the prefiltered MAP performance with a small number of states. Based on this general framework, we investigate several enhancements such as using different prefilters for the forward and backward recursions, concatenating two trellis steps during decoding, and temporal oversampling. The performance is evaluated through simulations over the EDGE typical urban channel.},\n type={2},\n author = {Fragouli, C. and Al-Dhahir, N. and Diggavi, Suhas N. and Turin, W.},\n journal = {IEEE Transactions on Communications},\n pages = {pages 742--753},\n tags = {wireless,channel_coding},\n title = {Prefiltered {M}-{BCJR} {Equalizer} for {MIMO} {Frequency}-{Selective} {Channels}},\n volume = {vol. 50, no. 5},\n year = {2002}\n}\n\n
\n
\n\n\n
\n This paper addresses the problem of soft equalization for space-time-coded transmissions over frequency-selective fading channels. The structure of the space-time code is embedded in the channel impulse response for efficient joint equalization and decoding. The proposed equalization/decoding approach uses a prefilter to concentrate the effective channel power in a small number of taps followed by a reduced-complexity maximum a posteriori probability (MAP) equalizer/decoder to produce soft decisions. The prefilter introduces residual intersymbol interference which degrades the performance of MAP when applied to the trellis of the shortened channel. However, the shape of the overall shortened channel impulse response allows the M-algorithm to approximate the prefiltered MAP performance with a small number of states. Based on this general framework, we investigate several enhancements such as using different prefilters for the forward and backward recursions, concatenating two trellis steps during decoding, and temporal oversampling. The performance is evaluated through simulations over the EDGE typical urban channel.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Komninakis; C. Fragouli; A. H. Sayed; and R. D. Wesel.\n\n\n \n \n \n \n Multi-Input Multi-Output Fading Channel Tracking and Equalization using Kalman Estimation.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Signal Processing, vol. 50: pages 1065–1076. 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{komninakis_multi-input_2002,\n abstract = {This paper addresses the problem of channel tracking and equalization for multi-input multi-output (MIMO) time-varying frequency-selective channels. These channels model the effects of inter-symbol interference (ISI), co-channel interference (CCI), and noise. A low-order autoregressive model approximates the MIMO channel variation and facilitates tracking via a Kalman filter. Hard decisions to aid Kalman tracking come from a MIMO finite-length minimum-mean-squared-error decision-feedback equalizer (MMSE-DFE), which performs the equalization task. Since the optimum DFE for a wide range of channels produces decisions with a delay \\&gt; 0, the Kalman filter tracks the channel with a delay. A channel prediction module bridges the time gap between the channel estimates produced by the Kalman filter and those needed for the DFE adaptation. The proposed algorithm offers good tracking behavior for multiuser fading ISI channels at the expense of higher complexity than conventional adaptive algorithms. Applications include synchronous multiuser detection of independent transmitters, as well as coordinated transmission through many transmitter/receiver antennas, for increased data rate.},\n type={2},\n author = {Komninakis, C. and Fragouli, C. and Sayed, A. H. and Wesel, R. D.},\n journal = {IEEE Transactions on Signal Processing},\n pages = {pages 1065--1076},\n tags = {wireless},\n title = {Multi-{Input} {Multi}-{Output} {Fading} {Channel} {Tracking} and {Equalization} using {Kalman} {Estimation}},\n volume = {vol. 50},\n year = {2002}\n}\n\n
\n
\n\n\n
\n This paper addresses the problem of channel tracking and equalization for multi-input multi-output (MIMO) time-varying frequency-selective channels. These channels model the effects of inter-symbol interference (ISI), co-channel interference (CCI), and noise. A low-order autoregressive model approximates the MIMO channel variation and facilitates tracking via a Kalman filter. Hard decisions to aid Kalman tracking come from a MIMO finite-length minimum-mean-squared-error decision-feedback equalizer (MMSE-DFE), which performs the equalization task. Since the optimum DFE for a wide range of channels produces decisions with a delay > 0, the Kalman filter tracks the channel with a delay. A channel prediction module bridges the time gap between the channel estimates produced by the Kalman filter and those needed for the DFE adaptation. The proposed algorithm offers good tracking behavior for multiuser fading ISI channels at the expense of higher complexity than conventional adaptive algorithms. Applications include synchronous multiuser detection of independent transmitters, as well as coordinated transmission through many transmitter/receiver antennas, for increased data rate.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n N. Al-Dhahir; and C. Fragouli.\n\n\n \n \n \n \n How to choose the number of taps in a DFE?.\n \n \n \n\n\n \n\n\n\n CISS 2002. 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{al-dhahir_how_2002,\n abstract = {In this paper, we address the following problem. Given a fixed total number of feedforward and feedback filter taps in a decision feedback equalizer, what is the optimum number of taps of each filter and what is the optimum delay setting? We propose a simple algorithm that reduces the solution search space from being two-dimensional to one-dimensional at a small performance loss. We demosntrate the application of our algorithm for indoor wireless channels.},\n type={4},\n author = {Al-Dhahir, N. and Fragouli, C.},\n journal = {CISS 2002},\n tags = {wireless},\n title = {How to choose the number of taps in a {DFE}?},\n year = {2002}\n}\n\n
\n
\n\n\n
\n In this paper, we address the following problem. Given a fixed total number of feedforward and feedback filter taps in a decision feedback equalizer, what is the optimum number of taps of each filter and what is the optimum delay setting? We propose a simple algorithm that reduces the solution search space from being two-dimensional to one-dimensional at a small performance loss. We demosntrate the application of our algorithm for indoor wireless channels.\n
\n\n\n
\n\n\n
\n \n\n \n \n N. Al-Dhahir; and C. Fragouli.\n\n\n \n \n \n \n How to choose the number of taps in a DFE?.\n \n \n \n\n\n \n\n\n\n CISS 2002. 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{al-dhahir_how_2002,\n abstract = {In this paper, we address the following problem. Given a fixed total number of feedforward and feedback filter taps in a decision feedback equalizer, what is the optimum number of taps of each filter and what is the optimum delay setting? We propose a simple algorithm that resudes the solution search space from being two-dimensional to one-dimensional at a small performance loss. We demosntrate the application of our algorithm for indoor wireless channels.},\n type={4},\n author = {Al-Dhahir, N. and Fragouli, C.},\n journal = {CISS 2002},\n tags = {wireless},\n title = {How to choose the number of taps in a {DFE}?},\n year = {2002}\n}\n\n
\n
\n\n\n
\n In this paper, we address the following problem. Given a fixed total number of feedforward and feedback filter taps in a decision feedback equalizer, what is the optimum number of taps of each filter and what is the optimum delay setting? We propose a simple algorithm that resudes the solution search space from being two-dimensional to one-dimensional at a small performance loss. We demosntrate the application of our algorithm for indoor wireless channels.\n
\n\n\n
\n\n\n
\n \n\n \n \n N. Al-Dhahir; C. Fragouli; A. Stamoulis; W. Younis; and A. R. Calderbank.\n\n\n \n \n \n \n Space-Time Coding for Broadband Wireless Transmission.\n \n \n \n\n\n \n\n\n\n IEEE Communications Magazine issue “Technologies for 3G and Beyond”, vol. 40, no. 9: pages 136–142. 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{al-dhahir_space-time_2002,\n abstract = {We present an overview of research activities on space-time coding for broadband wireless transmission performed at AT\\&amp;T Shannon Laboratory over the past two years. The emphasis is on physical layer modem algorithms such as channel estimation, equalization, and interference cancellation. However, we also discuss the impact of space-time coding gains at the physical layer on throughput at or above the networking layer. Furthermore, we describe a flexible graphical user interface attached to our physical layer simulation engine in order to explore the performance of space-time codes under a variety of practical transmission scenarios. Simulation results for the EDGE cellular system and the 802.11 wireless LAN environment are presented.},\n type={4},\n author = {Al-Dhahir, N. and Fragouli, C. and Stamoulis, A. and Younis, W. and Calderbank, A. R.},\n journal = {IEEE Communications Magazine issue “Technologies for 3G and Beyond”},\n pages = {pages 136--142},\n tags = {wireless,channel_coding},\n title = {Space-{Time} {Coding} for {Broadband} {Wireless} {Transmission}},\n volume = {vol. 40, no. 9},\n year = {2002}\n}\n\n
\n
\n\n\n
\n We present an overview of research activities on space-time coding for broadband wireless transmission performed at AT&T Shannon Laboratory over the past two years. The emphasis is on physical layer modem algorithms such as channel estimation, equalization, and interference cancellation. However, we also discuss the impact of space-time coding gains at the physical layer on throughput at or above the networking layer. Furthermore, we describe a flexible graphical user interface attached to our physical layer simulation engine in order to explore the performance of space-time codes under a variety of practical transmission scenarios. Simulation results for the EDGE cellular system and the 802.11 wireless LAN environment are presented.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; N. Al-Dhahir; and W. Turin.\n\n\n \n \n \n \n Effect of Spatio-Temporal Channel Correlation on the Performance of Space-Time Codes.\n \n \n \n\n\n \n\n\n\n ICC 2002, NY, vol. 2: pages 826–830. 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_effect_2002,\n abstract = {The determinant and rank criteria used for space-time code design apply at high SNR. Code design metrics developed for low SNR assume a channel autocorrelation matrix with equal eigenvalues, which does not hold in many practical scenarios. This paper shows that a space-time code designed to ensure full diversity at high SNR can suffer significant degradation when implemented at low-to-medium SNR because of the channel autocorrelation profile. We examine the effect of the channel autocorrelation matrix on a space-time code's performance and discuss how knowledge of this matrix can be used for code design, particularly from the aspect of space-time trellis code minimum memory requirements. Our discussion applies to both flat-fading and frequency-selective channels that are treated in a unified manner.},\n type={4},\n author = {Fragouli, C. and Al-Dhahir, N. and Turin, W.},\n journal = {ICC 2002, NY},\n pages = {pages 826--830},\n tags = {wireless,channel_coding},\n title = {Effect of {Spatio}-{Temporal} {Channel} {Correlation} on the {Performance} of {Space}-{Time} {Codes}},\n volume = {vol. 2},\n year = {2002}\n}\n\n
\n
\n\n\n
\n The determinant and rank criteria used for space-time code design apply at high SNR. Code design metrics developed for low SNR assume a channel autocorrelation matrix with equal eigenvalues, which does not hold in many practical scenarios. This paper shows that a space-time code designed to ensure full diversity at high SNR can suffer significant degradation when implemented at low-to-medium SNR because of the channel autocorrelation profile. We examine the effect of the channel autocorrelation matrix on a space-time code's performance and discuss how knowledge of this matrix can be used for code design, particularly from the aspect of space-time trellis code minimum memory requirements. Our discussion applies to both flat-fading and frequency-selective channels that are treated in a unified manner.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; N. Al-Dhahir; and W. Turin.\n\n\n \n \n \n \n Finite-Alphabet Constant-Amplitude Training Sequences for Multiple-Antennas.\n \n \n \n\n\n \n\n\n\n ICC 2002, NY, vol. 25, no. 1: pages 6–10. 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_finite-alphabet_2002,\n abstract = {We propose a method to identify training sequences for multiple-antenna transmissions over quasi-static frequency-selective channels. These sequences are constructed to belong to a standard constant-amplitude 2m-PSK constellation (such as BPSK, QPSK etc) to simplify the transmitter/receiver implementation. Many practical systems use training of predetermined length. Optimal sequences do not exist for all training sequence lengths and constellation alphabets. The proposed method allows us to identify training sequences that belong to a standard constellation for an arbitrary training sequence length and an arbitrary number of unknown channel taps. Performance bounds derived indicate that these sequences achieve near-optimum performance.},\n type={4},\n author = {Fragouli, C. and Al-Dhahir, N. and Turin, W.},\n journal = {ICC 2002, NY},\n pages = {pages 6--10},\n tags = {wireless,channel_coding},\n title = {Finite-{Alphabet} {Constant}-{Amplitude} {Training} {Sequences} for {Multiple}-{Antennas}},\n volume = {vol. 25, no. 1},\n year = {2002}\n}\n\n
\n
\n\n\n
\n We propose a method to identify training sequences for multiple-antenna transmissions over quasi-static frequency-selective channels. These sequences are constructed to belong to a standard constant-amplitude 2m-PSK constellation (such as BPSK, QPSK etc) to simplify the transmitter/receiver implementation. Many practical systems use training of predetermined length. Optimal sequences do not exist for all training sequence lengths and constellation alphabets. The proposed method allows us to identify training sequences that belong to a standard constellation for an arbitrary training sequence length and an arbitrary number of unknown channel taps. Performance bounds derived indicate that these sequences achieve near-optimum performance.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; N. Al-Dhahir; and W. Turin.\n\n\n \n \n \n \n Reduced-Complexity Training Schemes for Multiple-Antenna Broadband Transmissions.\n \n \n \n\n\n \n\n\n\n WCNC 2002, vol. 3: 78–83. 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_reduced-complexity_2002,\n abstract = {This paper addresses the problem of training sequence design for multiple-antenna transmissions over quasi-static frequency-selective channels. As performance metric for channel estimation, mean square error is adopted. To achieve the minimum mean square error, the training sequences transmitted from the multiple antennas must have impulse-like auto-correlation and zero cross-correlation. We reduce the problem of designing multiple training sequences to the much easier and well-understood problem of designing a single training sequence with impulse-like auto-correlation. To this end, we propose to encode the training sequences with a space-time code, that may be the same or different from the space-time code that encodes the information symbols. Designing one instead of multiple training sequences reduces the search space significantly and simplifies the construction of optimal or suboptimal training sequences.},\n type={4},\n author = {Fragouli, C. and Al-Dhahir, N. and Turin, W.},\n journal = {WCNC 2002},\n pages = {78--83},\n tags = {wireless,channel_coding},\n title = {Reduced-{Complexity} {Training} {Schemes} for {Multiple}-{Antenna} {Broadband} {Transmissions}},\n volume = {vol. 3},\n year = {2002}\n}\n\n
\n
\n\n\n
\n This paper addresses the problem of training sequence design for multiple-antenna transmissions over quasi-static frequency-selective channels. As performance metric for channel estimation, mean square error is adopted. To achieve the minimum mean square error, the training sequences transmitted from the multiple antennas must have impulse-like auto-correlation and zero cross-correlation. We reduce the problem of designing multiple training sequences to the much easier and well-understood problem of designing a single training sequence with impulse-like auto-correlation. To this end, we propose to encode the training sequences with a space-time code, that may be the same or different from the space-time code that encodes the information symbols. Designing one instead of multiple training sequences reduces the search space significantly and simplifies the construction of optimal or suboptimal training sequences.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and A. Polydoros.\n\n\n \n \n \n \n Serially concatenated coding for broadcasting S-UMTS applications.\n \n \n \n\n\n \n\n\n\n IEEE Seventh International Symposium on Spread Spectrum Techniques and Applications, vol. 3: pages 697–701. 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_serially_2002,\n abstract = {Satellite-UMTS supports broadcast applications that involve transmission of the same encoded data over channels that may vary significantly. The same code must allow a user with a good channel to recover the information with low complexity, while a user with a bad channel should still be able to achieve an acceptable BER at the cost of increased complexity and/or decoding delay. To this end, we propose serially concatenated multilevel code structures that employ PSK modulation. The receiver has the flexibility to achieve turbo-code, trellis-code or uncoded performance, depending on the decoding effort. Design considerations include the constituent encoder design and the use of a non-uniform constellation. Simulation results investigate the system's performance and highlight different parameters trade-offs.},\n type={4},\n author = {Fragouli, C. and Polydoros, A.},\n journal = {IEEE Seventh International Symposium on Spread Spectrum Techniques and Applications},\n pages = {pages 697--701},\n tags = {wireless,channel_coding},\n title = {Serially concatenated coding for broadcasting {S}-{UMTS} applications},\n volume = {vol. 3},\n year = {2002}\n}\n\n
\n
\n\n\n
\n Satellite-UMTS supports broadcast applications that involve transmission of the same encoded data over channels that may vary significantly. The same code must allow a user with a good channel to recover the information with low complexity, while a user with a bad channel should still be able to achieve an acceptable BER at the cost of increased complexity and/or decoding delay. To this end, we propose serially concatenated multilevel code structures that employ PSK modulation. The receiver has the flexibility to achieve turbo-code, trellis-code or uncoded performance, depending on the decoding effort. Design considerations include the constituent encoder design and the use of a non-uniform constellation. Simulation results investigate the system's performance and highlight different parameters trade-offs.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and A. Polydoros.\n\n\n \n \n \n \n Symbol-Interleaved Serially Concatenated Turbo Codes.\n \n \n \n\n\n \n\n\n\n CISS 2002. 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_symbol-interleaved_2002,\n type={4},\n author = {Fragouli, C. and Polydoros, A.},\n journal = {CISS 2002},\n tags = {channel_coding},\n title = {Symbol-{Interleaved} {Serially} {Concatenated} {Turbo} {Codes}},\n year = {2002}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2001\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; N. Seshadri; and W. Turin.\n\n\n \n \n \n \n Reduced-trellis equalization using a variation of the M-BCJR algorithm.\n \n \n \n\n\n \n\n\n\n Journal on Wireless Communications and Mobile Computing, vol. 1: pages 397–406. 2001.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_reduced-trellis_2001,\n type={2},\n author = {Fragouli, C. and Seshadri, N. and Turin, W.},\n journal = {Journal on Wireless Communications and Mobile Computing},\n pages = {pages 397--406},\n tags = {channel_coding},\n title = {Reduced-trellis equalization using a variation of the {M}-{BCJR} algorithm},\n volume = {vol. 1},\n year = {2001}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and R. D. Wesel.\n\n\n \n \n \n \n Turbo encoder design for symbol interleaved parallel concatenated trellis coded modulation.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Communications, no. 3, vol. 49: pages 425–435. 2001.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_turbo_2001,\n abstract = {This paper addresses turbo-encoder design for coding with high spectral efficiency using parallel concatenated trellis-coded modulation and symbol interleaving. The turbo-encoder design involves the constituent encoder design and the interleaver design. The constituent encoders are optimized for symbol-wise effective free distance, and each has an infinite symbol-wise impulse response. We identify the canonical structures for the constituent encoder search space. In many cases of practical interest, the optimal structure for these constituent encoders connects the memory elements in a single row. This single row generally applies to turbo code constituent encoders for parallel concatenation and is not restricted to symbol interleaving. To lower the error floor, a new semi-random interleaver design criteria and a construction method extends the spread-interleaver concept introduced by Divsalar and Pollara (1995). Simulation results show that the proposed system employing symbol interleaving can converge at a lower signal-to-noise ratio than previously reported systems. We report simulation results between 0.5 and 0.6 db from constrained capacity for rates of 2 and 4 bits/s/Hz.},\n type={2},\n author = {Fragouli, C. and Wesel, R. D.},\n journal = {IEEE Transactions on Communications, no. 3},\n pages = {pages 425--435},\n tags = {channel_coding},\n title = {Turbo encoder design for symbol interleaved parallel concatenated trellis coded modulation},\n volume = {vol. 49},\n year = {2001}\n}\n\n
\n
\n\n\n
\n This paper addresses turbo-encoder design for coding with high spectral efficiency using parallel concatenated trellis-coded modulation and symbol interleaving. The turbo-encoder design involves the constituent encoder design and the interleaver design. The constituent encoders are optimized for symbol-wise effective free distance, and each has an infinite symbol-wise impulse response. We identify the canonical structures for the constituent encoder search space. In many cases of practical interest, the optimal structure for these constituent encoders connects the memory elements in a single row. This single row generally applies to turbo code constituent encoders for parallel concatenation and is not restricted to symbol interleaving. To lower the error floor, a new semi-random interleaver design criteria and a construction method extends the spread-interleaver concept introduced by Divsalar and Pollara (1995). Simulation results show that the proposed system employing symbol interleaving can converge at a lower signal-to-noise ratio than previously reported systems. We report simulation results between 0.5 and 0.6 db from constrained capacity for rates of 2 and 4 bits/s/Hz.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; and R. D. Wesel.\n\n\n \n \n \n \n Bit vs. Symbol Interleaving for Parallel Concatenated Trellis Coded Modulation.\n \n \n \n\n\n \n\n\n\n GlobeCom, vol. 2: pages 931–935. 2001.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_bit_2001,\n abstract = {This paper compares bit versus symbol interleaving for parallel-concatenated trellis-coded turbo codes, employing the turbo encoder structure proposed in Benedetto et al., (1996). To compare systems optimized with the same techniques, the paper extends the turbo-encoder design procedure proposed in Fragouli et al. (2001), to bit-interleaved systems. We discuss a method to jointly design the multiple required interleavers for the bit-interleaved system, and a procedure to select constituent encoders that can take advantage of the interleaver structure to achieve a low error floor. Simulation results for the designed bit-interleaved system show better performance than bit-interleaved performance reported in the literature. The symbol-interleaved system though achieves an earlier convergence, especially with an increased number of decoder iterations, but at the cost of a slightly higher error floor.},\n type={4},\n author = {Fragouli, C. and Wesel, R. D.},\n journal = {GlobeCom},\n pages = {pages 931--935},\n tags = {channel_coding},\n title = {Bit vs. {Symbol} {Interleaving} for {Parallel} {Concatenated} {Trellis} {Coded} {Modulation}},\n volume = {vol. 2},\n year = {2001}\n}\n\n
\n
\n\n\n
\n This paper compares bit versus symbol interleaving for parallel-concatenated trellis-coded turbo codes, employing the turbo encoder structure proposed in Benedetto et al., (1996). To compare systems optimized with the same techniques, the paper extends the turbo-encoder design procedure proposed in Fragouli et al. (2001), to bit-interleaved systems. We discuss a method to jointly design the multiple required interleavers for the bit-interleaved system, and a procedure to select constituent encoders that can take advantage of the interleaver structure to achieve a low error floor. Simulation results for the designed bit-interleaved system show better performance than bit-interleaved performance reported in the literature. The symbol-interleaved system though achieves an earlier convergence, especially with an increased number of decoder iterations, but at the cost of a slightly higher error floor.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; C. Komninakis; and R. D. Wesel.\n\n\n \n \n \n \n Minimality for puncturing convolutional codes.\n \n \n \n\n\n \n\n\n\n ICC 2001, Helsinki, Finland, June, vol. 1: pages 300–304. 2001.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_minimality_2001,\n abstract = {This paper investigates encoders optimization for the Hamming weight after periodic puncturing, and discusses minimality issues that may affect the performance of the punctured encoders. Periodically puncturing a minimal encoder produces a higher rate encoder that may or may not be minimal. If it is not minimal, it may have a zero-output loop and it may be catastrophic. A code search can use a fast algorithm to determine whether an encoder's state diagram has a zero-output loop under periodic symbol puncturing, and a proposed method to assess the performance of codes with a zero-output loop that are not catastrophic. As an example, the paper optimizes rate-1/4 unpunctured codes for Hamming weight under both bit-wise and symbol-wise periodic puncturing. Code tables and simulation results are included.},\n type={4},\n author = {Fragouli, C. and Komninakis, C. and Wesel, R. D.},\n journal = {ICC 2001, Helsinki, Finland, June},\n pages = {pages 300--304},\n tags = {channel_coding},\n title = {Minimality for puncturing convolutional codes},\n volume = {vol. 1},\n year = {2001}\n}\n\n
\n
\n\n\n
\n This paper investigates encoders optimization for the Hamming weight after periodic puncturing, and discusses minimality issues that may affect the performance of the punctured encoders. Periodically puncturing a minimal encoder produces a higher rate encoder that may or may not be minimal. If it is not minimal, it may have a zero-output loop and it may be catastrophic. A code search can use a fast algorithm to determine whether an encoder's state diagram has a zero-output loop under periodic symbol puncturing, and a proposed method to assess the performance of codes with a zero-output loop that are not catastrophic. As an example, the paper optimizes rate-1/4 unpunctured codes for Hamming weight under both bit-wise and symbol-wise periodic puncturing. Code tables and simulation results are included.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; N. Al-Dhahir; Suhas N. Diggavi; and W. Turin.\n\n\n \n \n \n \n Prefiltered space-Time M-BCJR Equalizer for MIMO Frequency-Selective Channels.\n \n \n \n\n\n \n\n\n\n CISS. 2001.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_prefiltered_2001,\n abstract = {This paper addresses the problem of soft equalization for time-variant frequency-selective channels. Such a channel arises in EDGE (Enhanced Data for GSM Evolution), third generation TDMA proposal, which employs 8-PSK modulation with a linearized GMSK pulse shaping filter that introduces strong intersymbol interference. The proposed equalization approach uses a prefilter to concetrate the effective channel power in a small number of taps, followed by a reduced complexity MAP equalizer to produce soft decision outputs. The MAP equalizer is based on the implementation of the M-algorithm in the log domain. The prefilter introduces residual intersymbol interference which degrades the performance of MAP when applied to the trellis of the shortened channel. However, the shape of the overall shortened channel impulse response allows the M-algorithm to approximate the prefiltered MAP performance with a small number of states. Based on this general framework, we investigate several enhancements, such as using a different prefilter for the forward and backward recursion, concatenating two trellis steps during decoding, and temporal oversampling. The performance is evaluated through simulations over the typical urban (TU) EDGE channel.},\n type={4},\n author = {Fragouli, C. and Al-Dhahir, N. and Diggavi, Suhas N. and Turin, W.},\n journal = {CISS},\n tags = {channel_coding},\n title = {Prefiltered space-{Time} {M}-{BCJR} {Equalizer} for {MIMO} {Frequency}-{Selective} {Channels}},\n year = {2001}\n}\n\n
\n
\n\n\n
\n This paper addresses the problem of soft equalization for time-variant frequency-selective channels. Such a channel arises in EDGE (Enhanced Data for GSM Evolution), third generation TDMA proposal, which employs 8-PSK modulation with a linearized GMSK pulse shaping filter that introduces strong intersymbol interference. The proposed equalization approach uses a prefilter to concetrate the effective channel power in a small number of taps, followed by a reduced complexity MAP equalizer to produce soft decision outputs. The MAP equalizer is based on the implementation of the M-algorithm in the log domain. The prefilter introduces residual intersymbol interference which degrades the performance of MAP when applied to the trellis of the shortened channel. However, the shape of the overall shortened channel impulse response allows the M-algorithm to approximate the prefiltered MAP performance with a small number of states. Based on this general framework, we investigate several enhancements, such as using a different prefilter for the forward and backward recursion, concatenating two trellis steps during decoding, and temporal oversampling. The performance is evaluated through simulations over the typical urban (TU) EDGE channel.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; R. D. Wesel; D. Sommer; and G. P. Fettweis.\n\n\n \n \n \n \n Turbo Codes with Non-Uniform Constellation.\n \n \n \n\n\n \n\n\n\n ICC 2001, Helsinki, Finland, vol. 1: pages 70–73. 2001.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_turbo_2001-1,\n abstract = {This paper presents parallel concatenated turbo codes that employ a non-uniform constellation to achieve shaping gain. The output signal approximates the Gaussian distribution by using equally likely signals with unequal spacing (a non-uniform constellation). The small distance of points near the center of the constellation may lead to a small overall free distance and thus a high error floor for turbo codes. We avoid this situation by a two-step design procedure, that first creates an interleaver, and then identifies the constituent encoders that maximize the turbo code free distance. Simulation results for 4 bits/sec/Hz show that this use of shaping can offer an improvement of approximately 0.2 dB for turbo codes.},\n type={4},\n author = {Fragouli, C. and Wesel, R. D. and Sommer, D. and Fettweis, G. P.},\n journal = {ICC 2001, Helsinki, Finland},\n pages = {pages 70--73},\n tags = {channel_coding},\n title = {Turbo {Codes} with {Non}-{Uniform} {Constellation}},\n volume = {vol. 1},\n year = {2001}\n}\n\n
\n
\n\n\n
\n This paper presents parallel concatenated turbo codes that employ a non-uniform constellation to achieve shaping gain. The output signal approximates the Gaussian distribution by using equally likely signals with unequal spacing (a non-uniform constellation). The small distance of points near the center of the constellation may lead to a small overall free distance and thus a high error floor for turbo codes. We avoid this situation by a two-step design procedure, that first creates an interleaver, and then identifies the constituent encoders that maximize the turbo code free distance. Simulation results for 4 bits/sec/Hz show that this use of shaping can offer an improvement of approximately 0.2 dB for turbo codes.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2000\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; N. Seshadri; and W. Turin.\n\n\n \n \n \n \n On reduced trellis equalization using the M-BCJR Algorithm.\n \n \n \n\n\n \n\n\n\n In CISS, volume 2, pages 1159–1163, March 2000. \n event-place: Boston\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{fragouli_reduced_2000,\n abstract = {The complexity of channel equalization using the BCJR algorithn [1] grows exponentially with the channel memory. The M-BCJR algorithm [2], provides a method for reduced-trellis channel equalization. This paper examines the algorithm performance for different finite impulse response channels, identifies pathological cases, and introduces designer choices such as the decision delay, maximum and minimum phase transformation, and selection of states used by the algorithm. Simulation results demonstrate the effect of the different parameters in the algorithm's performance.},\n type={4},\n author = {Fragouli, C. and Seshadri, N. and Turin, W.},\n booktitle = {{CISS}},\n month = {March},\n note = {event-place: Boston},\n pages = {1159--1163},\n tags = {wireless,channel_coding},\n title = {On reduced trellis equalization using the {M}-{BCJR} {Algorithm}},\n volume = {2},\n year = {2000}\n}\n\n
\n
\n\n\n
\n The complexity of channel equalization using the BCJR algorithn [1] grows exponentially with the channel memory. The M-BCJR algorithm [2], provides a method for reduced-trellis channel equalization. This paper examines the algorithm performance for different finite impulse response channels, identifies pathological cases, and introduces designer choices such as the decision delay, maximum and minimum phase transformation, and selection of states used by the algorithm. Simulation results demonstrate the effect of the different parameters in the algorithm's performance.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Komninakis; C. Fragouli; A. H. Sayed; and R. D. Wesel.\n\n\n \n \n \n \n Adaptive Multi-Input Multi-Output Fading Channel Equalization using Kalman Estimation.\n \n \n \n\n\n \n\n\n\n ICC 2000, New Orleans, Louisiana, June 18-22, vol. 3: pages 1655–1659. 2000.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{komninakis_adaptive_2000,\n abstract = {This paper addresses the problem of adaptive channel tracking and equalization for multi-input multi-output (MIMO) time-variant frequency-selective channels. A finite-length minimum-mean-squared-error decision-feedback equalizer (MMSE-DFE) performs the equalization task, while a Kalman filter tracks the MIMO channel, which models the corrupting effects of inter-symbol interference (ISI), inter-user interference (IUI), and noise. The Kalman tracking is aided by previous hard decisions produced by the DFE, with a decision delay \\&gt;0, which causes the Kalman filter to track the channel with a delay. A channel prediction module bridges the time gap between the channel estimates produced by the Kalman filter and those needed for the DFE adaptation. The proposed algorithm offers good tracking behavior for multi-user fading ISI channels at the expense of higher complexity.},\n type={4},\n author = {Komninakis, C. and Fragouli, C. and Sayed, A. H. and Wesel, R. D.},\n journal = {ICC 2000, New Orleans, Louisiana, June 18-22},\n pages = {pages 1655--1659},\n tags = {wireless},\n title = {Adaptive {Multi}-{Input} {Multi}-{Output} {Fading} {Channel} {Equalization} using {Kalman} {Estimation}},\n volume = {vol. 3},\n year = {2000}\n}\n\n
\n
\n\n\n
\n This paper addresses the problem of adaptive channel tracking and equalization for multi-input multi-output (MIMO) time-variant frequency-selective channels. A finite-length minimum-mean-squared-error decision-feedback equalizer (MMSE-DFE) performs the equalization task, while a Kalman filter tracks the MIMO channel, which models the corrupting effects of inter-symbol interference (ISI), inter-user interference (IUI), and noise. The Kalman tracking is aided by previous hard decisions produced by the DFE, with a decision delay >0, which causes the Kalman filter to track the channel with a delay. A channel prediction module bridges the time gap between the channel estimates produced by the Kalman filter and those needed for the DFE adaptation. The proposed algorithm offers good tracking behavior for multi-user fading ISI channels at the expense of higher complexity.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 1999\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Fragouli; and R. D. Wesel.\n\n\n \n \n \n \n Convolutional codes and matrix control theory.\n \n \n \n\n\n \n\n\n\n Proceedings of the 7th International Conference on Advances in Communications and Control, June 28-July 2, Athens, Greece.. 1999.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_convolutional_1999,\n type={4},\n author = {Fragouli, C. and Wesel, R. D.},\n journal = {Proceedings of the 7th International Conference on Advances in Communications and Control, June 28-July 2, Athens, Greece.},\n tags = {channel_coding},\n title = {Convolutional codes and matrix control theory},\n year = {1999}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and R. D. Wesel.\n\n\n \n \n \n \n Semi-random interleaver design criteria.\n \n \n \n\n\n \n\n\n\n Communication Theory Symposium at Globecom 99, Rio de Janeiro, Brazil, December 5-9, 5: pages 2352–2356. 1999.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_semi-random_1999,\n abstract = {A spread interleaver of length N is a semi-random interleaver based on the random selection without replacement of N integers from 1 to N under a design constraint. This paper extends the spread-interleaver design method to multiple error events, based on the interleaver's role in overall turbo code error event distances. The extension helps to explain why the spread interleaver is specifically designed to be semi-random. Simulation results show the performance achieved for a symbol-interleaved parallel concatenated trellis coded modulation (PCTCM) scheme.},\n type={4},\n author = {Fragouli, C. and Wesel, R. D.},\n journal = {Communication Theory Symposium at Globecom 99, Rio de Janeiro, Brazil, December 5-9},\n pages = {pages 2352--2356},\n tags = {channel_coding},\n title = {Semi-random interleaver design criteria},\n volume = {5},\n year = {1999}\n}\n\n
\n
\n\n\n
\n A spread interleaver of length N is a semi-random interleaver based on the random selection without replacement of N integers from 1 to N under a design constraint. This paper extends the spread-interleaver design method to multiple error events, based on the interleaver's role in overall turbo code error event distances. The extension helps to explain why the spread interleaver is specifically designed to be semi-random. Simulation results show the performance achieved for a symbol-interleaved parallel concatenated trellis coded modulation (PCTCM) scheme.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; and R. D. Wesel.\n\n\n \n \n \n \n Symbol interleaved parallel concatenated trellis coded modulation.\n \n \n \n\n\n \n\n\n\n Communication Theory Miniconference in conjunction with ICC '99, June 6-10 1999,pages 42 – 46. 1999.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{fragouli_symbol_1999,\n abstract = {This paper presents a method for efficient coding at high spectral efficiency using parallel concatenated trellis coded modulation (PCTCM) with symbol interleaving. The constituent encoders are optimized for symbol-wise free distance, and each has an infinite symbol-wise impulse response. In many cases of practical interest, the optimal structure for these constituent encoders connects the memory elements in a single row. Simulation results show that the performance is as close as 0.5 dB to the constrained capacity.},\n type={4},\n author = {Fragouli, C. and Wesel, R. D.},\n journal = {Communication Theory Miniconference in conjunction with ICC '99, June 6-10 1999},\n pages = {pages 42 -- 46},\n tags = {channel_coding},\n title = {Symbol interleaved parallel concatenated trellis coded modulation},\n year = {1999}\n}\n\n
\n
\n\n\n
\n This paper presents a method for efficient coding at high spectral efficiency using parallel concatenated trellis coded modulation (PCTCM) with symbol interleaving. The constituent encoders are optimized for symbol-wise free distance, and each has an infinite symbol-wise impulse response. In many cases of practical interest, the optimal structure for these constituent encoders connects the memory elements in a single row. Simulation results show that the performance is as close as 0.5 dB to the constrained capacity.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Komninakis; C. Fragouli; R. D. Wesel; and A. H. Sayed.\n\n\n \n \n \n \n Channel estimation and equalization in fading.\n \n \n \n\n\n \n\n\n\n 33rd Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, October 24-27. 1999.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{komninakis_channel_1999,\n abstract = {This paper addresses the problem of training sequence design for multiple-antenna transmissions over quasi-static frequency-selective channels. To achieve the channel estimation minimum mean square error, the training sequences transmitted from the multiple antennas must have impulse-like auto correlation and zero cross correlation. We reduce the problem of designing multiple training sequences to the much easier and well-understood problem of designing a single training sequence with impulse-like auto correlation. To this end, we propose to encode the training symbols with a space-time code, that may be the same or different from the space-time code that encodes the information symbols. Optimal sequences do not exist for all training sequence lengths and constellation alphabets. We also propose a method to easily identify training sequences that belong to a standard 2m-PSK constellation for an arbitrary training sequence length and an arbitrary number of unknown channel taps. Performance bounds derived indicate that these sequences achieve near-optimum performance.},\n type={4},\n author = {Komninakis, C. and Fragouli, C. and Wesel, R. D. and Sayed, A. H.},\n journal = {33rd Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, October 24-27},\n tags = {wireless},\n title = {Channel estimation and equalization in fading},\n year = {1999}\n}\n\n
\n
\n\n\n
\n This paper addresses the problem of training sequence design for multiple-antenna transmissions over quasi-static frequency-selective channels. To achieve the channel estimation minimum mean square error, the training sequences transmitted from the multiple antennas must have impulse-like auto correlation and zero cross correlation. We reduce the problem of designing multiple training sequences to the much easier and well-understood problem of designing a single training sequence with impulse-like auto correlation. To this end, we propose to encode the training symbols with a space-time code, that may be the same or different from the space-time code that encodes the information symbols. Optimal sequences do not exist for all training sequence lengths and constellation alphabets. We also propose a method to easily identify training sequences that belong to a standard 2m-PSK constellation for an arbitrary training sequence length and an arbitrary number of unknown channel taps. Performance bounds derived indicate that these sequences achieve near-optimum performance.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 1998\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n V. Sivaraman; M. B. Srivastava; and C. Fragouli.\n\n\n \n \n \n \n Controlled multimedia wireless link sharing via enhanced class-based queuing with channel-state-dependent packet scheduling.\n \n \n \n\n\n \n\n\n\n Infocom, vol. 2: pages 572–580. 1998.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{sivaraman_controlled_1998,\n abstract = {A key problem in transporting multimedia traffic across wireless networks is a controlled sharing of the wireless link by different packet streams. So far this problem has been treated as that of providing support for quality of service in time division multiplexing based medium access control protocols (MAC). Adopting a different perspective to the problem, this paper describes an approach based on extending the class-based queueing (CBQ) based controlled hierarchical link sharing model proposed for the Internet. Our scheme enhances CBQ, which works well in wired links such as point-to-point wires of fixed bandwidth, to also work well with wireless links based on radio channels that are (i) inherently shared on-demand among multiple radios, and (ii) are subject to highly dynamic bandwidth variations due to spatially and temporally varying fading with accompanying burst errors. The proposed scheme is based on combining a modified version of CBQ with channel-state dependent packet scheduling.},\n type={4},\n author = {Sivaraman, V. and Srivastava, M. B. and Fragouli, C.},\n doi = {10.1109/INFCOM.1998.665077},\n journal = {Infocom},\n pages = {pages 572--580},\n tags = {wireless},\n title = {Controlled multimedia wireless link sharing via enhanced class-based queuing with channel-state-dependent packet scheduling},\n volume = {vol. 2},\n year = {1998}\n}\n\n
\n
\n\n\n
\n A key problem in transporting multimedia traffic across wireless networks is a controlled sharing of the wireless link by different packet streams. So far this problem has been treated as that of providing support for quality of service in time division multiplexing based medium access control protocols (MAC). Adopting a different perspective to the problem, this paper describes an approach based on extending the class-based queueing (CBQ) based controlled hierarchical link sharing model proposed for the Internet. Our scheme enhances CBQ, which works well in wired links such as point-to-point wires of fixed bandwidth, to also work well with wireless links based on radio channels that are (i) inherently shared on-demand among multiple radios, and (ii) are subject to highly dynamic bandwidth variations due to spatially and temporally varying fading with accompanying burst errors. The proposed scheme is based on combining a modified version of CBQ with channel-state dependent packet scheduling.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 1997\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (1)\n \n \n
\n
\n \n \n \n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);