Measurements and analysis of end-to-end Internet dynamics
Measurements and analysis of end-to-end Internet dynamics
On the satisfiability and maximum satisfiability of random 3-CNF formulas
SODA '93 Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms
Linear time erasure codes with nearly optimal recovery
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
IEEE Transactions on Information Theory - Part 1
Linear-time encodable and decodable error-correcting codes
IEEE Transactions on Information Theory - Part 1
A linear time erasure-resilient code with nearly optimal recovery
IEEE Transactions on Information Theory - Part 1
Priority encoding transmission
IEEE Transactions on Information Theory - Part 1
Analysis of low density codes and improved designs using irregular graphs
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Analyses of load stealing models based on differential equations
Proceedings of the tenth annual ACM symposium on Parallel algorithms and architectures
A digital fountain approach to reliable distribution of bulk data
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Analysis of random processes via And-Or tree evaluation
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
Improved classification via connectivity information
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
Matrix structure, polynomial arithmetic, and erasure-resilient encoding/decoding
ISSAC '00 Proceedings of the 2000 international symposium on Symbolic and algebraic computation
The Power of Two Choices in Randomized Load Balancing
IEEE Transactions on Parallel and Distributed Systems
Scalable secure storage when half the system is faulty
Information and Computation
Dynamic parallel access to replicated content in the internet
IEEE/ACM Transactions on Networking (TON)
RMDP: an FEC-based reliable multicast protocol for wireless environments
ACM SIGMOBILE Mobile Computing and Communications Review
Temporally enhanced erasure codes for reliable communication protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hordes: a multicast based protocol for anonymity
Journal of Computer Security
An introduction to low-density parity-check codes
Theoretical aspects of computer science
Evaluation of Video Communication over Packet Switching Networks
EDCC-3 Proceedings of the Third European Dependable Computing Conference on Dependable Computing
Scalable Secure Storage when Half the System Is Faulty
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
STACS '00 Proceedings of the 17th Annual Symposium on Theoretical Aspects of Computer Science
An Introduction to Low-Density Parity-Check Codes
Theoretical Aspects of Computer Science, Advanced Lectures [First Summer School on Theoretical Aspects of Computer Science, Tehran, Iran, July 2000]
New Sequences of Linear Time Erasure Codes Approaching the Channel Capacity
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Efficient multicast stream authentication using erasure codes
ACM Transactions on Information and System Security (TISSEC)
Software-Based Erasure Codes for Scalable Distributed Storage
MSS '03 Proceedings of the 20 th IEEE/11 th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS'03)
Light Weight Security for Parallel Access to Multiple Mirror Sites
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Computer algebra handbook
Bullet: high bandwidth data dissemination using an overlay mesh
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Almost all graphs with average degree 4 are 3-colorable
Journal of Computer and System Sciences - STOC 2002
Studying Balanced Allocations with Differential Equations
Combinatorics, Probability and Computing
Sparse Parity-Check Matrices over ${GF(q)}$
Combinatorics, Probability and Computing
G2-P2P: a fully decentralised fault-tolerant cycle-stealing framework
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
LH*RS---a highly-available scalable distributed data structure
ACM Transactions on Database Systems (TODS)
Proceedings of the twentieth ACM symposium on Operating systems principles
Parallel downloads for streaming applications: a resequencing analysis
Performance Evaluation
An efficient broadcast authentication scheme in wireless sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
On average throughput and alphabet size in network coding
IEEE/ACM Transactions on Networking (TON) - Special issue on networking and information theory
Exploring high performance distributed file storage using LDPC codes
Parallel Computing
Maintaining high bandwidth under dynamic network conditions
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
OverQos: an overlay based architecture for enhancing internet Qos
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Scalable web caching of frequently updated objects using reliable multicast
USITS'99 Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2
Dummynet and forward error correction
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
High-bandwidth data dissemination for large-scale distributed systems
ACM Transactions on Computer Systems (TOCS)
Enhancement of unequal error protection properties of LDPC codes
EURASIP Journal on Wireless Communications and Networking
Foundations and Trends® in Networking
Reducing communication costs in robust peer-to-peer networks
Information Processing Letters
RT oblivious erasure correcting
IEEE/ACM Transactions on Networking (TON)
Counter braids: a novel counter architecture for per-flow measurement
SIGMETRICS '08 Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
BAD: bandwidth adaptive dissemination or (the case for BAD trees)
Proceedings of the 2007 ACM/IFIP/USENIX international conference on Middleware companion
Proceedings of the 4th ACM international workshop on Storage security and survivability
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Generating random graphs with large girth
SODA '09 Proceedings of the twentieth Annual ACM-SIAM Symposium on Discrete Algorithms
Detailed Evolution of Degree Distributions in Residual Graphs with Joint Degree Distributions
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient uncoordinated FHSS anti-jamming communication
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Geometrically-structured maximum-girth LDPC block and convolutional codes
IEEE Journal on Selected Areas in Communications - Special issue on capaciyy approaching codes
Design and analysis of E2RC codes
IEEE Journal on Selected Areas in Communications - Special issue on capaciyy approaching codes
Capacity-achieving codes for finite-state channels with maximum-likelihood decoding
IEEE Journal on Selected Areas in Communications - Special issue on capaciyy approaching codes
Architecture-aware LDPC code design for multiprocessor software defined radio systems
IEEE Transactions on Signal Processing
Proofs of retrievability: theory and implementation
Proceedings of the 2009 ACM workshop on Cloud computing security
Finite-length scaling for iteratively decoded LDPC ensembles
IEEE Transactions on Information Theory
Low Density Parity Check Code for the Single Carrier Frequency Division Multiple Access
FGIT '09 Proceedings of the 1st International Conference on Future Generation Information Technology
Finite-length analysis of irregular expurgated LDPC codes under finite number of iterations
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Analytical solution of covariance evolution for regular LDPC codes
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
On unequal error protection of finite-length LDPC codes over BECs: a scaling approach
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Exact erasure channel density evolution for protograph-based generalized LDPC codes
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Capacity-achieving codes for channels with memory with maximum-likelihood decoding
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Joint nonlinear channel equalization and soft LDPC decoding with Gaussian processes
IEEE Transactions on Signal Processing
Outburst: efficient overlay content distribution with rateless codes
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Maintaining data reliability without availability in P2P storage systems
Proceedings of the 2010 ACM Symposium on Applied Computing
Optimized mapping schemes for LDPC coded higher order modulated QAM transmission
EUROCAST'07 Proceedings of the 11th international conference on Computer aided systems theory
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
RACS: a case for cloud storage diversity
Proceedings of the 1st ACM symposium on Cloud computing
FlightPath: obedience vs. choice in cooperative services
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
Iterative decoding threshold analysis for LDPC convolutional codes
IEEE Transactions on Information Theory
Implementing fault-tolerant services using state machines: beyond replication
DISC'10 Proceedings of the 24th international conference on Distributed computing
Capacity-achieving codes with bounded graphical complexity and maximum likelihood decoding
IEEE Transactions on Information Theory
New sequences of capacity achieving LDPC code ensembles over the binary erasure channel
IEEE Transactions on Information Theory
On the iterative decoding of sparse quantum codes
Quantum Information & Computation
Towards reliable storage systems
Towards reliable storage systems
Challenging the feasibility of authentication mechanisms for P2P live streaming
Proceedings of the 6th Latin America Networking Conference
Making chord robust to byzantine attacks
ESA'05 Proceedings of the 13th annual European conference on Algorithms
Resource requirement analysis for a predictive-hashing based multicast authentication protocol
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Multi-Source stream authentication framework in case of composite MPEG-4 stream
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Unconditionally secure information authentication in presence of erasures
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Rethinking erasure codes for cloud file systems: minimizing I/O for recovery and degraded reads
FAST'12 Proceedings of the 10th USENIX conference on File and Storage Technologies
The Cyclone Server Architecture: streamlining delivery of popular content
Computer Communications
QoS-sensitive transport of real-time MPEG video using adaptive redundancy control
Computer Communications
Foundations and Trends in Communications and Information Theory
A new rateless code with unequal error protection property
Computers and Electrical Engineering
Hi-index | 0.25 |