用户名: 密码: 验证码:
卷积网络编码及其应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息传输的可靠性和高效性是网络传输系统的核心指标。网络编码技术是近年来提出的一种可达到网络容量上界的新技术,其核心思想是允许中间节点对输入信息做线性或非线性的编码处理后转发。相比传统路由技术,网络编码技术已经被广泛证明在提高吞吐量、数据安全、鲁棒性、普适性、负载均衡及降低计算复杂度等方面具有很大优势。特别是随机网络编码实现简单,为网络编码走向实用化提供了可能的途径。目前,网络编码已成为通信领域的研究热点。
     在实际网络中,由于时延或圈的存在,不同时刻传输的消息叠加在一起,会自然产生卷积网络编码。已有的研究都是针对整个编码系统进行分析研究,在接收端译码需要知道全局编码核的全部信息,而这些信息是随着数据包一起传送到接收端的,这样译码时延比较大。对于有圈情况,全局编码核的信息是无限长的,译码不可能实现。为解决这一问题,本论文提出新颖的矩阵幂级数表示方法,从时间序列角度对卷积网络编码重新研究,给出分布式的卷积网络编码的编译码方法。其次,针对编码域大小估计困难和网络拓扑变化情况,提出一种自适应的随机卷积网络编码方法。
     本论文的主要贡献包括以下几个方面。
     1.保证网络编码构造成功,要求传输矩阵的行列式不为零。当网络较大时,编码域要求非常大,行列式不为零的判断是非常困难的问题。提出新颖的矩阵幂级数表示方法,利用该工具重新研究有圈网络成功构造卷积网络编码的条件,推导出卷积网络编码构造成功与否仅与本地编码核在0时刻的分量有关,这极大地简化了编码构造的复杂度。
     2.已有的译码方案都是需要知道全部的全局编码核信息,这对于有圈网络上的随机网络编码是不可行的。在有限序列电路可译原理的基础上,利用矩阵幂级数工具对译码进行重新审视,给出卷积网络编码序列可译的定义,推导出编码以时延L可译的充分必要条件及推论。并提出一种分布式译码方案,可从部分全局编码核求出译码矩阵,然后逐字符译出信源消息。该方法契合了信息传输的性质,降低了译码时延及复杂度。
     3.对于有圈网络,多项式的本地编码核可能会产生带分母的全局编码核,这样Erez等提出的无圈网络上的序列译码方法不再适用。我们推广了这一序列译码方法,并给出最小译码时延,其等于去掉分母后的全局编码核矩阵的行列式的最小次数与其伴随式的最大公因子的最高次数的差。
     4.针对网络编码构造存在编码域大小估计困难及网络拓扑变化的问题,提出一种自适应随机卷积网络编码方法,局部地增加编码核长度直到相关的接收节点能够正确译码,解决了编码域尺寸估计困难的问题,并且随机的编码方式能够适应网络变化,提高了编码的鲁棒性,降低了译码时延。进一步分析了此算法在Combination网络和Umbrella网络以及一般网络上的增益,理论证明和仿真结果都表明该随机卷积网络编码算法很大程度降低了译码时延,且在存储需求方面有很大节省。
     5.无线网络是通信领域研究的热点,如何应用网络编码技术提高无线网络的性能是一个值得研究的问题。相比有线网络,无线网络具有多播特性、噪声引起的高丢包率、信道干扰和半双工通信等特点。我们用超图建立无线网络模型,从代数角度研究无线网络编码,推导无线网络编码代数结构,给出了编码成功的代数等价条件,这为无线网络编译码算法的设计提供了强有力的理论依据。
Reliability and efficiency are two keys in modern communication systems.Network Coding is a new capacity achieving technique, where intermediate nodes areallowed to do linear or nonlinear process of the incoming information and forward. Ithas been proved to have incomparable advantages in throughput, data security,robustness, universality, load equalization and low computational complexity and so on.Meanwhile, random linear network coding (RLNC) operates simply and adapts tounknown or changing topology, which leads to possible realization. So far, networkcoding has been one of the hottest topics in Telecommunications.
     In practice, due to the delay and cycles existing in networks, the messages fromdifferent times convolve together, which naturally causes convolutional network coding(CNC). The present studies on CNC are based on the whole system,and the sinks needto get all the global encoding kernels (GEKs) to decode the source messages. However,the GEKs are transmitted to sinks together mixed with messages. Therefore, it is notreasonable for a sink node waiting for receiving all the GEKs to recover the sourcemessages since large delays and high complexity are raised by the long length ofencoding kernels, infinite special for the case of cycles. To solve this problem, matrixpower series presentation is proposed to reanalyze CNC from the perspective of timesequence in this dissertation, which brings some valuable results on encoding anddecoding of CNC. Furthermore, an adaptive randomized CNC algorithm is proposed toreduce the delay and memory use.
     The main contributions are listed as follows.
     1. The determinant of transmission matrix should be non-zero to ensure the codesuccessful. However, it is always difficult to check as the encoding field size issufficiently large. Matrix power series representation is proposed to reformulate CNCand establish its theoretical fundamentals for practical implementations. Deduce that aCNC can be determined only by a nilpotent coefficient matrix of local encoding kernels(LEKs) at time0, which simplifies the CNC design.
     2. It is not reasonable for sinks to collect all GEKs to decode the source messagesover cyclic networks, especially for random coding approach. Inspired by the theory offinite inverse circuit, a time-variant decoding model of a CNC is proposed. Newnecessary and sufficient conditions are established for the decidability of CNC at a sinknode with certain delay. They only involve the first several terms in the power series expansion of the GEK matrix. This model only deals with partial information of GEKs,and hence potentially makes CNCs applicable in a decentralized manner. This approachreduces the decoding delay and lowers the complexity.
     3. For cyclic networks, polynomial fraction GEKs with non-zero denominator arepossible, and therefore the sequence decoder proposed by Erez et al. is no longerfeasible. We generalize this decoder and give the minimum decoding delay, whichequals to the difference between the minimum degree of the determinant of GEK matrixafter processing without denominators and the maximum degree of greatest commondivisor (GCD) of adjoint matrix of GEK matrix.
     4. An adaptive random convolutional network coding (ARCNC) is proposed toaddress the issue of field size in RLNC for multicast, and its decoding delayperformance through both analysis and numerical simulations. ARCNC operates as aconvolutional code, with the coefficients of LEKs chosen randomly over a small finitefield. The cardinality of LEKs increases with time until the GEKs matrices at relatedsink nodes have full rank. It adapts to unknown network topologies without priorknowledge, and has reductions in decoding delay and memory overheads. We showthrough theoretic analysis and simulations that this method performs as well as RLNCin terms of decodability, and can provide significant gains in terms of average decodingdelay or memory in Combination, Umbrella, Shuttle and random geometric networks.
     5. Wireless network is one hot topic in communication system, and it would beworth it to study the applications of network coding over wireless networks. Differentfrom wired networks, wireless networks have the features of broadcast, noise,interference and half-duplex and so on. To characterize the algebraic structure ofwireless network coding, a hypergragh is utilized to model wireless packet networksfrom the perspective of network layer. The algebraic description of random CNC overwireless packet networks is deduced, and the condition on coding success is alsopresented. It is shown through analysis and simulations that random CNC is capacityachieving with probability approaching1. This work provides the theoretic foundationfor wireless packet network coding.
引文
[1] R. Ahlswede, N. Cai, S.-Y. R. Li, et al. Network information flow. IEEETransaction on Information Theory.2000, vol.46, no.4, pp.1204-1216.
    [2] T. Ho, M. Medard, R. Koetter, et al. A random linear network coding approach tomulticast. IEEE Trans. on Inform. Theory.2006, vol.52, no.10, pp.4413–4430.
    [3] T. Ho, Karger D, M. Medard, et a1. The benefits of coding over routing in arandomized setting. IEEE International symposium on Information Theory.Yokohama, Japan. June,2003. pp.442.
    [4] R. Koetter, M. Effros, T. Ho, et al. Network codes as codes on graphs. In Proc. of2004Conf. Information Sciences and Systems(CISS2004). Princeton, NJ. Mar.2004.
    [5] S. Riis. Linear versus non-linear Boolean functions in network flow. in Proc. ofConf. Information Sciences and Systems(CISS2004). Princeton, NJ. Mar.2004.
    [6] M Medard, M Effros, D. Karger, et al. On coding for non-multicast networks. InProc. of the41th Allerton Conference.2003, vol.41, no.1. pp.21-29.
    [7] Ho T, M.Medard. Koetter R. An information-theoretic view of networkmanagement. IEEE Trans. On Information Theory. April,2005,51(4):1295-1312.
    [8] Ho T, Leong B, Yu-Han Chang, et al. Network monitoring in multicast networksusing network coding. IEEE International Symposium on Information Theory(ISIT).2005, pp.1977-1981.
    [9]孙岳,杨远,王新梅.基于网络编码的多播网络故障恢复.西安电子科技大学学报.2008,34(1):122-125.
    [10] Wu Y, Chou P A, Zhang Q, et al. Network planning in wireless ad hoc networks:a cross-layer approach. IEEE J. selected. Areas Communications.2005,23(1).pp.136-150.
    [11] Yunnan Wu, Sun-yuan Kung. Reduced-complexity network coding formulticasting over ad hoc networks. IEEE International Conference on Acoustics,Speech, and Signal Processing. March2005, vol.3, pp.18-23.
    [12] N. Cai. Yeung R W. Network coding and error correction. In Proc. ITW2002.2002, pp.119-122.
    [13] Gkantsidis C, Rodriguez P R. Network coding for large scale content distribution.Microsoft Research.2004.
    [14] R. W. Yeung, S.-Y. R. Li, N. Cai, et al. Network coding theory. Foundation andTrends in Communications and Information Technology.2006, vol.2, ISSN:1567–2190.
    [15] T. Ho, Desmond S. Lun. Network coding: An Introduction. Boston, USA:Cambridge University Press,2008.
    [16] F. graouloli. Network coding fundments. Foundation and Trends inCommunications and Information Technology, vol.2, ISSN:1567–2190.
    [17] F.Fragouli. Network coding applications. Foundation and Trends inCommunications and Information Technology.2008.
    [18]黄佳庆, Zongpeng Li.网络编码原理.国防工业出版社,2012.
    [19] Yeung Raymond W. Information theory and network coding. Springer Publishers.2008.
    [20] Muriel Medard, Alex Sprintson. Network Coding: Fundamentals andApplications.1edition. Academic Press, November11,2011.352pages.
    [21] S.-Y. R. Li, R. W. Yeung, and N. Cai. Linear network coding. IEEE Trans. onInformation Theory. Feb.,2003, vol.49, no.2. pp.371–381.
    [22] Bhattad K, Ratakar N, Koetter R, et al. Minimal network coding for multicast.IEEE International Symposium on Information Theory(ISIT),2005,1730-1734.
    [23] Deb S, Effros M, Ho T, et al. Network coding for wireless applications: a brieftutorial. In Proc. of IWWAN. London, UK. May2005.
    [24] Al Hamra A, Barakat C, Turletti T. Network coding for wireless mesh networks:a case study. In Proc. of IEEE International Symposium on a World of Wireless,Mobile and Multimedia Networks (WoWMoM). Niagara-Falls, Buffalo-NY,USA. June26-29,2006.
    [25] R. W. Yeung and N. Cai. Network error correction, part I: Basic concepts andupper bounds. Communication Infor. Syst.2006, vol.6, no.1. pp.19-36.
    [26] N. Cai and R. W. Yeung. Network error correction, part II: Lower bounds.Commun. Inf. Syst.2006, vol.6, no.1. pp.1992-1996.
    [27] T. Ho, R. Koetter, M. Medard, et al. The benefits of coding over routing in arandomized setting. in Proc.2003IEEE Int. Symp. Information Theory(ISIT2003). Yokohama, Japan. June/July2003. p.442.
    [28] S. Jaggi and M. Langberg. Resilient network coding in the presence ofeavesdropping Byzantine adversaries. in Proc.2007IEEE Int. Symp. InformationTheory (ISIT2007). Nice, France. June2007.
    [29] S. Jaggi, M. Langberg, S. Katti, et al. Resilient network coding in the presence ofByzantine adversaries. in Proc. IEEE INFOCOM2007. Anchorage, AK. May2007.
    [30] R. Koetter and F. R. Kschischang. Coding for errors and erasures in randomnetwork coding. IEEE Trans. Inform. Theory. Aug.2008, vol.54, no.8.pp.3579-3591.
    [31] D. Charles, K. Jain, and K. Lauter. Signatures for network coding. in Proc. of2006Conf. Information Sciences and Systems (CISS2006). Princeton, NJ. Mar.2006. Invited paper.
    [32] F. Zhao, T. Kalker, M. Medard, et al. Signatures for content distribution withnetwork coding. in Proc.2007IEEE Int. Symp. Information Theory (ISIT2007).Nice, France. June2007.
    [33] K. Bhattad and K. R. Nayayanan. Weakly secure network coding. in Proc.WINMEE, RAWNET AND NETCOD2005Workshops. Riva del Garda, Italy.Apr.2005.
    [34] J. Feldman, T. Malkin, C. Stein, et al. On the capacity of secure network coding.in Proc.42nd Annu. Allerton Conf. Communication, Control, and Computing.Monticello, IL. Sep./Oct.2004.
    [35] J. Tan and M. Medard. Secure network coding with a cost criterion. in Proc.4thInt. Symp. Modeling and Optimization in Mobile, Ad Hoc and WirelessNetworks (WiOpt '06). Boston, MA. Apr.2006.
    [36] Taku Noguchi, Takahiro Matsuda, Miki Yamamoto. Performance Evaluation ofNew Multicast Architecture with Network Coding. IEICE Trans. Comm. June,2003.
    [37] Mea Wang, Baochun Li. How practical is network coding.14thIEEEInternational Worshop on Quality of Service. June19-21. pp.274-278.
    [38] Tomislav Nad. Problems with network coding in overlay networks. TechinicalReport, Yale University.2004.
    [39] P. Sanders, S. Egner, and L. Tolhuizen. Polynomial time algorithms for networkinformation flow. in Proc. of the15th ACM Symp. on Parallelism in algorithmsand architectures. Jun.2003. pp.286-294.
    [40] S. Jaggi, P. Sanders, P. A. Chou, et al. Polynomial time algorithms for multicastnetwork code construction. IEEE Trans. Inf. Theory. Jun.2005, vol.51, no.6,pp.1973-1982.
    [41] R. Koetter and M. Medard. An algebraic approach to network coding.IEEE/ACM Transactions on networking. Oct.2003, vol.11, No.5. pp.782-795.
    [42] S. Katti, S. Gollakota, and D. Katabi. Embracing wireless interference: Analognetwork coding. Massachusetts Institute of Technology. Cambridge, MA. Tech.Rep. MIT-CSAIL-TR-2007-012. Feb.,2007.
    [43] Duc. To, Jinho Choi. Convolutional codes in two-way relay networks withphysical-layer network coding. IEEE Trans. On Wireless Communications. Sep.2010, vol.9, no.9, pp.2724-2729.
    [44] W. Nam, S.-Y. Chung, Y. H. Lee. Capacity of the Gaussian two-way relaychannel to within1/2Bit. IEEE Trans. Inf. Theory. Nov.2010, vol.56, no.11, pp.5488-5494.
    [45] U. Erez and R. Zamir. Achieving1/2log(1+SNR) on the AWGN channel withlattice encoding and decoding. IEEE Trans. Inf. Theory. Oct.2004, vol.50, no.10, pp.2293–2314.
    [46] Y. Wu. Broadcasting when receivers know some messages a priori. in Proc. IEEEInt. Symp. Inf. Theory. Jun.2007, Nice, France, pp.1141-1145.
    [47] T. Cover and J. Thomas. Elements of Information Theory. New York: Wiley,1991.
    [48] R. Zhang, Y. C. Liang, C. C. Chai, et al. Optimal beamforming for two-waymulti-antenna relay channel with analog network coding. IEEE J. Sel. AreasCommunication. Jun.2009, vol.27, no.5, pp.699-712.
    [49] Z. Chen, B. Zheng, X. Ji, et al. A new joint design of physical layer networkcoding and channel coding for wireless networks. Signal Processing. May2011,vol.27, no.5, pp.658-663.
    [50] H. J. Yang, J. Chun, A. Paulraj. Asymptotic capacity of the separated MIMOtwo-way relay channel. IEEE Trans. Inf. Theory. Nov.,2011, vol.57, no.11, pp.7542-7554.
    [51] R. Vaze, and R. W. Heath Jr. Optimal amplify and forward strategy for two-wayrelay channel with multiple relays. ITW2009, Volos, Greece, June10-12,2009.
    [52] Y. Jing, H. Jafarkhani. Network beamforming using relays with perfect channelinformation. IEEE Trans. Inf. Theory. Jun.2009, vol.55, no.6, pp.2499-2517.
    [53] S. Agnihotri, S. Jaggi, M. Chen. Analog network coding in general SNR regime:Performance of a greedy scheme. in Proc.2012Int. Symp. NetCod. Cambridge,MA, Jun.2012, pp.137-142.
    [54] B. Liu, N. Cai. Optimal analog network coding scheme with multiple relaysunder individual power constraint. under preparation.
    [55] I. Maric, A. Goldsmith, M. Medard. Multihop analog network coding viaamplify-and-forward: the high SNR regime. IEEE Trans. Inf. Theory. Feb.2012,vol.58, no.2, pp.793-803.
    [56] B. Liu, N. Cai. Multi-hop Analog Network Coding: An Amplify-and-forwardApproach. IEEE Trans. Inf. Theory.2012. Available [Online] athttp://arxiv.org/abs/1203.4867.
    [57] N. Cai and R.W. Yeung. Secure network coding. IEEE ISIT’02, Lausanne,Switzerland, July2002, p.323.
    [58] Cai N, Yeung R. W. Secure Network Coding on a Wiretap Network. IEEE Trans.on Inform. Theory.2011,57(1):424-435.
    [59] C. E. Shannon. Communication theory of secrecy systems. Bell Sys. Tech. J.,vol.28, pp.656–715,1949.
    [60] L. H. Ozarow and A. D. Wyner. Wire-tap channel II. AT&T Bell Labs. Tech. J.,vol.63, pp.2135–2157,1984.
    [61] G. R. Blakley. Safeguarding cryptographic keys. in Proc. Nat. Comput. Conf.,1979, vol.48, pp.313–317.
    [62] A. Shamir. How to share a secret. Commun. ACM, vol.22, pp.612–613,1979.
    [63] S. Y. El Rouayheb and E. Soljanin. On wiretap networks II. in Proc.IEEE Int.Symp. Inf. Theory. Nice, France, Jun.24–29,2007, pp.551–555.
    [64] S. El Rouayheb, E. Soljanin, A. Sprintson. Secure network coding for wiretapnetworks of type II. IEEE Trans. Inf.Theory,2012,58(3):1361-1371.
    [65] C.-K. Ngai, R. W. Yeung, Z. Zhang. Network generalized hamming weight. inProc. Workshop Netw. CodingTheory Appl., Lausanne, Switzerland,2009, pp.48–53.
    [66] V. K. Wei. Generalized hamming weight for linear codes. IEEE Trans. Inf.Theory, vol.37, no.5, pp.1412–1418, Sep.1991.
    [67] K. Harada and H. Yamamoto. Strongly secure linear network coding. IEICETrans. Fund. Oct.2008, vol. E91-A, no.10, pp.2720–2728.
    [68] N. Cai. Valuable messages and random outputs of channels in linear networkcoding. in Proc. IEEE Int. Symp. Inf. Theory. Seoul, Korea, Jun.28–Jul.3,2009,pp.413–417.
    [69] N. Cai and R. W. Yeung. A security condition for multi-source linear networkcoding. inProc. IEEE Int. Symp. Inf. Theory. Nice, France, Jun.24–29,2007, pp.561–565.
    [70] Z. Zhang and R. W. Yeung. A general security condition for multi-source linearnetwork coding. in Proc. IEEE Int. Symp. Inf. Theory. Seoul, Korea, Jun.28–Jul.3,2009, pp.1155–1158.
    [71] T. Chan and A. Grant. Capacity bounds for secure network coding. in Proc.Australian Commun. Theory Workshop, Christchurch, NZ, Jan.30–Feb.1,2008,pp.95–100.
    [72] T. Chan and A. Grant. Linear programming bounds for network coding. IEEETrans. Inf. Theory, to be published.
    [73] K. Jain. Security based on network topology against the wiretapping attack. IEEEWireless Communication. Feb.2004vol.11, no.1,pp.68–71.
    [74] L. Lima, M. Medard, J. Barros. Random linear network coding:A free cipher? inProc. IEEE Int.Symp. Inf. Theory, Nice, France, Jun.24–29,2007, pp.546–550.
    [75] C.-K. Ngai, R. W. Yeung. Secureerror-correcting (SEC) network codes. inProc.Workshop Netw. Coding Theory Appl.. Lausanne, Switzerland,2009, pp.98–103.
    [76] T. Ho, M. Medard, R. Koetter. A coding view of network recovery andmanagment for single receiver communication. in CISS,2002.
    [77] N. Ratnakar and G. Kramer. The multicast capacity of deterministic relaynetworks with no interference. IEEE/ACM Trans. on Networks.2006,vol.52, no.6, pp.2425-2432.
    [78] Z. Zhang. Network error correction coding in packetized network. in IEEE Inf.Theory Workshop, Chengdu, China,2006.
    [79] S. Yang and R. W. Yeung. Characterization of network error correction/detection and erasure correction. NetCod2007, San Diego,2007.
    [80] H. Balli, X. Yan, Z. Zhang. Error correction capacity of random network errorcorrection codes. ISIT2007, Nice, France,2007.
    [81] X. Yan, H. Balli, Z. Zhang,“Some recent progresses in network error correctioncoding theory.2008Fourth Workshop on Network Coding, Theory, andApplications. Hong Kong, China. Jan.3-4,2008, pp.86-90.
    [82] T. Ho, B. Leong, R. Koetter, et al. Byzantine modification detection in multicastnetworks using randomized network coding. in IEEE International Symposiumon Information Theory,2004, pp.144–144.
    [83] Z. Zhang. Linear network error correction codes in packet networks. IEEETransactions on Information Theory.2008, vol.54, no.1, pp.209–218.
    [84] C. Gkantsidis and P. Rodriguez. Cooperative security for network coding filedistribution. in IEEE INFOCOM.2006, pp.2004–137.
    [85] M. Krohn, M. Freedman, D. Mazieres.On-the-fly verification of rateless erasurecodes for efficient content distribution. in IEEE Symposium on Security andPrivacy.2004, pp.226–240.
    [86] G. Liang, R. Agarwal, N. Vaidya. When watchdog meets coding. in IEEEINFOCOM.2010, pp.1–9.
    [87] D. Silva, F. Kschischang, R. Koetter. A rank-metric approach to error control inrandom network coding. IEEE Transactions on Information Theory.2008, vol.54, no.9, pp.3951–3967.
    [88] M. Langberg, S. Jaggi, B. Dey. Binary causal-adversary channels. in IEEEInternational Symposium on Information Theory. IEEE,2009, pp.2723–2727.
    [89] S. Kim, T. Ho, M. Effros, S. Avestimehr. Network error correction with unequallink capacities. in47th Annual Allerton Conference on Communication, Control,and Computing,2009.
    [90]——.New results on network error correction: capacities and upper bounds. inInformation Theory and Applications Workshop (ITA2010).2010, pp.1–10.
    [91] T. Ho, S. Kim, Y. Yang, et al. On network error correction with limited feedbackcapacity. in Information Theory and Applications Workshop (ITA2011).2011.
    [92] Widmer J, Fragouli C, Le Boudee J-Y. Low-complexity energy efficientbroadcasting in wireless ad-hoc networks using network coding. In Proc.Workshop on Network Coding, Theory, and Applications. Apr.2005.
    [93] Yuan Jun, Li Zongpeng, Yu W-ei, et al. A Cross-Layer Optimization Frameworkfor Multicast in Multi-hop Wireless Networks. In Proc. of First InternationalConference of Wireless Internet(W10DN), Budapest. Hungary,2005(Invited), pp.47-54.
    [94] T. Ho, Jin Jia-Qi, Viswanathan H. On network coding and routing in dynamicwireless multicast networks. In Information Theory and its Applications, Feb.2006.
    [95] Wu Y, Chou P A, Kung S-Y. Minimum-energy multicast in mobile ad hoenetworks using network coding. IEEE Information Theory Workshop. Oct.2004.
    [96] Lun D., Medard M., Koetter R. Efficient operation of wireless packet networksusing network coding. In Proa InternationaI Workshop on ConvergentTechnologies(IWCT2005). June2005.
    [97] Lun D, Ratnaksr N, Medard M, et a1. Minimum-cost multicast over coded packetnetworks. IEEE Trans Inform Theory. Jun.2006, vol.52, no.6, pp.2608-23.
    [98] Lun D., Ramakar N, Koetter R, et a1. Achieving minimum-cost multicast: Adecentralized approach based on network coding. In Proc. IEEE Infoeom2005,Miami, FL, Mar.2005.
    [99] Fragouli C., Widmer J., Le Boudec J.-Y. Efficient broadcasting using networkcoding. IEEE/ACM Transactions on Networking. Apr.2008, vol.16, no.2, pp.450-463.
    [100]Widmer J., Fragouli C, LeBoudec J.-Y. Energy efficient broadcasting in wirelessad hoc networks. In First Workshop on Network Coding. Mar.2005.
    [101]Fragouli C, Widmer J, Le Boudec J.-Y. A network coding approach to energyefficient broadcasting: from theory to practice[Technical Report].LCA-REPORT-2005-009. Infocom2006. EPFL, July2005.
    [102]LunD S, Medard M, Koetter R. Network Coding for Efficient Wireless Unicast.In IEEE International Zurich Seminar on Communications. February2006
    [103]Chen Y, Kishore S, Li J. Wireless Diversity through Network Coding. InProceeding of IEEE Wireless Communications and NetworkingConference(WCNC). Las Vegas, NV, Mar.2006.
    [104]T. Ho, Leong B, Medard M, et al. On the utilityof network coding in dynamicenvironments. In Proc. Intel Workshop on Wireless Ad-hoe Networks(IWWAN).June2004.
    [105]Petrovic D, Ramchandran K, Rabaey J. Coding for sensor networks usinguntuned radios. In IEEE6th Workshop on Signal Processing Advances inWireless Conmlunications. June2005, pp.1093-1097.
    [106]Zhang X, Wicker S B. Robustness vs efficiency in sensor networks. In FourthInternatiorml Symposium on Information Proccessing in Sensor Networks(IPSN),Apr.2005. pp.225-230.
    [107]Dimakis A G, Prabhakaran V,Ramchandran K. Ubiquitous access to distributeddata in large-scale sensor networks through decentralized erasure codes. InSymposium on Information Proccessing in Sensor Networks (IPSN). Apr.2005.
    [108]Katti S, Katabi D, Hu W, et al. The importance of being opportunistic: Practicalnetwork coding for wireless environments. In Pro. of ICCC. Sep.2005.
    [109]E. Erez and M. Feder. Efficient network codes for cyclic networks. IEEE Trans.Inf. Theory. Aug.,2010, vol.56, no.8, pp.3862-3878.
    [110]E.Erez and M. Feder. Convolutional network codes. IEEE InternationalSymposium on Information Theory. Chicago, USA. June27-July2,2004.
    [111]S.-Y. R. Li and Q. T. Sun. Network Coding Theory via Commutative Algebra.IEEE Trans. Inf. Theory. Jan.,2011, vol.57, no.1, pp.403-415.
    [112]S.-Y. R. Li and R. W. Yeung. Network Multicast Flow via Linear Coding. Proc.of ISORA.1998, pp.197–211.
    [113]A. Agarwal, M. Charikar. On the advantage of network coding for improvingnetwork throughput. IEEE Information Theory Workshop. San Antonio, Texas.2004.
    [114]S.-Y. R. Li and R. W. Yeung. On convolutional network coding. IEEETransactions on Information Theory. Seattle, USA. July2006, pp.1743-1747.
    [115]E. Erez. Topics in Network Coding. PhD thesis. April,2007.
    [116]S. Jaggi, M. Effros, T. Ho, et al. On linear network coding.42nd AllertonConference on Communication, Control and Computing. Monticello, IL.September2004.
    [117]C. Fragouli and E. Soljanin. A connection between network coding andconvolutional codes. IEEE Communications Society.2004. pp.661-666.
    [118]S.-Y. R. Li and Siu Ting Ho. Ring-theoretic foundation of convolution networkcoding. NetCod2008. CUHK, Hong Kong. Jan.2008.
    [119]Huang Jiaqing, Wang Liang, Cheng Wenqing, et al. Polynomial TimeConstruction Algorithm of BCNC for Network Coding in Cyclic Network.8thIEEE/ACIS International Conference on Computer and Information Science(ICIS). June1-3,2009. Shanghai, China. IEEE Press,2009, pp.228-233.
    [120]Qin Guo, Mingxing Luo, Lixiang Li, et al. Construction of convolutional networkcoding for cyclic multicast networks.2010IEEE2ndSymposium on Web Society.Aug.16-17,2010. Beijing, China, pp.336-241.
    [121]G. D. Forney, Jr. Convolutional codes I: algebraic structure. IEEE Trans. Inf.Theory. Nov.1970, vol.16, pp.720-738.
    [122]N. Cai and Wangmei Guo. The conditions to determine convolutional networkcoding on matrix representation. NetCod2009. Lausanne, Switzerland. Jun.2009.
    [123]Wangmei Guo, N. Cai, X. Shi et al. Localized Dimension Growth in RandomNetwork Coding: A Convolutional Approach. ISIT2011. St. Perterburger,Russian. July31-Aug.6,2011.
    [124]Ho Tracy, Jaggi S., Vyetrenko S. et al. Universal and robust distributed networkcodes.2011Proceedings IEEE of INFOCOM. Shanghai. pp.766-774,2011.
    [125]Joyce Liang and C.-C. Jay Kuo. Robust and Secure Secret Sharing in Wirelessnetworks with convolutional network coding. in the Preceeding of IEEEGlobecom2010. Dec.6-10,2010. Los Angeles, CA, USA.
    [126]K. Prasad, B. Sundar Rajan. Convolutional codes for network error correction.Globecom2009. Nov.30-Dec.42009. Bangalore, India, pp.1-6.
    [127]王育民.信息论与编码理论.高等教育出版社.2005.
    [128]冯克勤.纠错码的代数理论.清华大学出版社.2005.
    [129]王新梅,肖国镇.纠错码-原理与方法.西安电子科技大学出版社.2001.
    [130]Shu Lin等著,晏坚等译.差错控制编码.机械工业出版社.2007.
    [131]Fong S.L. and Yeung R. W. Variable-rate linear network coding. IEEE ITW’06.Punta del Este, Uruguay. Oct2006.
    [132]Song-ya Ma, Xiu-bo Chen, Ming-xing Luo, et al. Variable-rate convolutionalnetwork coding. The Journal of China Universities of Posts andTelecommunications. June2010, vol.17, Issue3, pp.91-96.
    [133]Yunnan Wu. Network coding to wireless network. Overview report.2008.
    [134]Majid Ghaderi, Don Towsley and Jim Kurose. Reliability Benefit of NetworkCoding. University of Massachusetts Amherst. Tech. Rep. TR-07-08.2007.
    [135]Fred Buckley, Marty Lewinter. A Friendly Introduction to Graph Theory. PrenticeHall.1st edition. Nov.14,2002.
    [136]Ford, L.R, D.R. Fulkerson. Maximal flow through a network. Canadian Journalof Mathematics.1956, vol8, pp.399-404.
    [137]Gary Chartrand, Ortrud R Oellermann. Applied and Algorithmic Graph Theory.New York. McGraw-Hill.1993.
    [138]Http://mathworld.wolfram.com/PaitialOrder.html.
    [139]C. Fragouli and E. Soljanin. Information flow decomposition for network coding.IEEE Trans. Inf. Theory. Mar.2004, vol.53, no.3, pp.829-848.
    [140]H. Balli, X. Yan and Z. Zhang. On randomized linear network codes and theirerror correction capabilities. IEEE Trans. on Inform. Theory.2009, vol.55, no.7,pp.3148-3160.
    [141]John G. Proakis. Digital Communications. McGraw-Hill. Fifth edition.2008.
    [142]Rudolf Lidl, Harald Niederreiter, P. M. Cohn. Finite Fields. Massachusetts, USA.Addison-Wesley Publishing Company.1983.
    [143]Masato Tajima, Koji Okino, Takashi Miyagoshi. Error-Trellis Construction forconvolutional codes using shifted Error/Syndrome-subsequences. IEICE trans.Fundamentals. August2009, vol. E92-A. No.8, pp.2086-2096.
    [144]Ajay Dholakia. Introduction to Convolutional Codes with Applications. USA.Kluwer Academic Publishers.1994.
    [145]Ph. Piret. Convolutional codes: an algebraic approach. Cambridge, Mass. MITPress.1988.
    [146]Jaggi S., Yuval Cassuto, Michelle Effros. Low complexity encoding for networkcodes. ISIT2006. Seattle, USA. July9-14.
    [147]Chen Yuan, Haibin Kan. Secure Convolutional Network codes. Report.2009.
    [148]K. Prasad, B. Sundar Rajan. Network error correction for unit-delay,memory-free networks using convolutional codes. ICC2010. May2010.
    [149]M. Xiao, M. Medard, and T. Aulin. A binary coding approach for combinationnetworks and general erasure networks. in Proc. Of IEEE Int. Sym. On Info.Theory (ISIT).2008. pp.786-790.
    [150]Ayres and F. Jr. Schaum’s Outline of Theory and Problems of Matrices. NewYork: Schaum.1962, pp.11.
    [151]J. L. Massey and M. K. Sain. Inverses of linear sequential circuits. IEEETransactions on Computer Science. Apr.1968, vol.100, No.4, pp.330-337.
    [152]Jac Romme. Variable rate convolutional codes by dumy bit insertion. Eindhovenuniversity of technology department of electrical engineering&Siemens agDepartment of Mobile phone development. Thesis.2000.
    [153]J. H. van Lint. Introduction to Coding theory. Springer-Verlag publishers.2003.
    [154]张贤达.矩阵分析与应用.清华大学出版社.2004.
    [155]A. R. Lehman and E. Lehman. Complexity classification of network informationflow problems. in Proc. Symp. Discrete Algorithms. New Orleans, LA.2004.pp.142-150.
    [156]M. Feder, D. Ron, and A. Tavory. Bounds on linear codes for network multicast.Electronic Colloquium on Computational Complexity.2003, vol.10, pp.1-28.
    [157]Wachter-zeh A, Sidorenko V. Rank Metric Convolutional Codes for RandomLinear Network Coding.2012International Symposium on Network Coding(NetCod). June29-30,2012. Boston, USA. IEEE Press.2012:1-6.
    [158]A.H.施利亚耶夫.概率(第二卷).高等教育出版社.2008-01-01.
    [159]叶其孝,沈永欢.实用数学手册.科学出版社.1992.
    [160]Erik Nygren, Ramesh K. Sitaraman, and Jennifer Sun. The Akamai network: APlatform for High-Performance Internet Applications. ACM SIGOPS OperatingSystem Review. July,2010, vol.44, issue3, pp.2-19.
    [161]Angela I. Barbero and Qyvind Ytrehus. Introduction to network coding foracyclic networks.2009.
    [162]Angela I. Barbero and Qyvind Ytrehus. Cycle-Logical Treatment for CyclopathicNetworks. IEEE Trans. On Networking. June2006, vol.14, No. SI,pp.2795-2804.
    [163]A. F. Dana, R. Gowaikar, R. Palanki, et al. Capacity of wireless erasure network.IEEE Trans. On information theory. March2006, vol.52, no.3, pp.789-804.
    [164]D. S. Lun, M. Medard and M. Effros. On coding for reliable communication overpacket networks. in Proc.42nd Annu. Allerton Conf. Communication, Controcand Computing. Monticello, IL. Oct.2004.
    [165]MinJi Kim, Muriel Médard. Algebraic Network Coding Approach toDeterministic Wireless Relay Networks. Allerton Conference on Communication,Control and Computing. September2010.
    [166]C. Fragouli, E. Soljanin, A. Shokrollahi. Network coding as a coloring problem.Proceeding of CISS2004.
    [167]Katti S, Rahul H, Hu W, et al. XORs in the air: practical wireless network coding.Computer communication review,2006, vol.36, no.4, pp.243-254.
    [168]Michele Sanna and Ebroul Izquierdo. A survey of linear network coding andnetwork error correction code constructions and algorithms. International Jouranlof Digital Multimedia Broadcasting.2011.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700