1: \begin{thebibliography}{100}
2: \providecommand{\url}[1]{#1}
3: \csname url@rmstyle\endcsname
4: \providecommand{\newblock}{\relax}
5: \providecommand{\bibinfo}[2]{#2}
6: \providecommand\BIBentrySTDinterwordspacing{\spaceskip=0pt\relax}
7: \providecommand\BIBentryALTinterwordstretchfactor{4}
8: \providecommand\BIBentryALTinterwordspacing{\spaceskip=\fontdimen2\font plus
9: \BIBentryALTinterwordstretchfactor\fontdimen3\font minus
10: \fontdimen4\font\relax}
11: \providecommand\BIBforeignlanguage[2]{{%
12: \expandafter\ifx\csname l@#1\endcsname\relax
13: \typeout{** WARNING: IEEEtran.bst: No hyphenation pattern has been}%
14: \typeout{** loaded for the language `#1'. Using the pattern for}%
15: \typeout{** the default language instead.}%
16: \else
17: \language=\csname l@#1\endcsname
18: \fi
19: #2}}
20:
21: \bibitem{adm05}
22: S.~Aceda{\'n}ski, S.~Deb, M.~M{\'e}dard, and R.~Koetter, ``How good is random
23: linear coding based distributed networked storage?'' in \emph{Proc. WINMEE,
24: RAWNET and NETCOD 2005 Workshops}, Apr. 2005.
25:
26: \bibitem{acl00}
27: R.~Ahlswede, N.~Cai, S.-Y.~R. Li, and R.~W. Yeung, ``Network information
28: flow,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~46, no.~4, pp. 1204--1216,
29: July 2000.
30:
31: \bibitem{ams02}
32: A.~Ahluwalia, E.~Modiano, and L.~Shu, ``On the complexity and distributed
33: construction of energy-efficient broadcast trees in static ad hoc wireless
34: networks,'' in \emph{Proc. 2002 Conference on Information Sciences and
35: Systems (CISS 2002)}, Mar. 2002.
36:
37: \bibitem{amo93}
38: R.~K. Ahuja, T.~L. Magnanti, and J.~B. Orlin, \emph{Network Flows: Theory,
39: Algorithms, and Applications}.\hskip 1em plus 0.5em minus 0.4em\relax Upper
40: Saddle River, NJ: Prentice Hall, 1993.
41:
42: \bibitem{afi05}
43: M.~Arai, S.~Fukumoto, and K.~Iwasaki, ``Reliability analysis of a
44: convolutional-code-based packet level {FEC} under limited buffer size,''
45: \emph{IEICE Trans. Fundamentals}, vol. E88-A, no.~4, pp. 1047--1054, Apr.
46: 2005.
47:
48: \bibitem{ayi00}
49: M.~Arai, A.~Yamaguchi, and K.~Iwasaki, ``Method to recover internet packet
50: losses using $(n, n-1, m)$ convolutional codes,'' in \emph{Proc.
51: International Conference on Dependable Systems and Networks (DSN 2000)}, June
52: 2000, pp. 382--389.
53:
54: \bibitem{awl93}
55: B.~Awerbuch and T.~Leighton, ``A simple local-control approximation algorithm
56: for multicommodity flow,'' in \emph{Proc. 34th Annual IEEE Symposium on
57: Foundations of Computer Science}, Nov. 1993, pp. 459--468.
58:
59: \bibitem{ber80}
60: D.~P. Bertsekas, ``A class of optimal routing algorithms for communication
61: networks,'' in \emph{Proc. 5th International Conference on Computer
62: Communication (ICCC '80)}, Oct. 1980, pp. 71--76.
63:
64: \bibitem{ber95}
65: ------, \emph{Nonlinear Programming}.\hskip 1em plus 0.5em minus 0.4em\relax
66: Belmont, MA: Athena Scientific, 1995.
67:
68: \bibitem{ber98}
69: ------, \emph{Network Optimization: Continuous and Discrete Models}.\hskip 1em
70: plus 0.5em minus 0.4em\relax Belmont, MA: Athena Scientific, 1998.
71:
72: \bibitem{ber01b}
73: ------, \emph{Dynamic Programming and Optimal Control}, 2nd~ed.\hskip 1em plus
74: 0.5em minus 0.4em\relax Belmont, MA: Athena Scientific, 2001, vol.~2.
75:
76: \bibitem{bgg84}
77: D.~P. Bertsekas, E.~M. Gafni, and R.~G. Gallager, ``Second derivative
78: algorithms for minimum delay distributed routing in networks,'' \emph{{IEEE}
79: Trans. Commun.}, vol.~32, no.~8, pp. 911--919, Aug. 1984.
80:
81: \bibitem{beg92}
82: D.~P. Bertsekas and R.~Gallager, \emph{Data Networks}, 2nd~ed.\hskip 1em plus
83: 0.5em minus 0.4em\relax Upper Saddle River, NJ: Prentice Hall, 1992.
84:
85: \bibitem{bpt98}
86: D.~Bertsimas, I.~C. Paschalidis, and J.~Tsitsiklis, ``On the large deviations
87: behavior of acyclic networks of {$G/G/1$} queues,'' \emph{Ann. Appl.
88: Probab.}, vol.~8, no.~4, pp. 1027--1069, Nov. 1998.
89:
90: \bibitem{bsg06}
91: S.~Bhadra, S.~Shakkottai, and P.~Gupta, ``Min-cost selfish multicast with
92: network coding,'' in \emph{Proc. 4th International Symposium on Modeling and
93: Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt '06)}, Apr. 2006.
94:
95: \bibitem{bhj83}
96: K.~Bharath-Kumar and J.~M. Jaffe, ``Routing to multiple destinations in
97: computer networks,'' \emph{{IEEE} Trans. Commun.}, vol.~31, no.~3, pp.
98: 343--351, Mar. 1983.
99:
100: \bibitem{bhn05}
101: K.~Bhattad and K.~R. Narayanan, ``Weakly secure network coding,'' in
102: \emph{Proc. WINMEE, RAWNET and NETCOD 2005 Workshops}, Apr. 2005.
103:
104: \bibitem{brk05}
105: K.~Bhattad, N.~Ratnakar, R.~Koetter, and K.~R. Narayanan, ``Minimal network
106: coding for multicast,'' in \emph{Proc. 2005 IEEE International Symposium on
107: Information Theory (ISIT 2005)}, Sept. 2005, pp. 1730--1734.
108:
109: \bibitem{blm02}
110: J.~W. Byers, M.~Luby, and M.~Mitzenmacher, ``A digital fountain approach to
111: asynchronous reliable multicast,'' \emph{{IEEE} J. Select. Areas Commun.},
112: vol.~20, no.~8, pp. 1528--1540, Oct. 2002.
113:
114: \bibitem{cay02}
115: N.~Cai and R.~W. Yeung, ``Secure network coding,'' in \emph{Proc. 2002 IEEE
116: International Symposium on Information Theory (ISIT 2002)}, June/July 2002,
117: p. 323.
118:
119: \bibitem{chm98}
120: V.~W.~S. Chan, K.~L. Hall, E.~Modiano, and K.~A. Rauschenbach, ``Architectures
121: and technologies for high-speed optical data networks,'' \emph{J. Lightwave
122: Technol.}, vol.~16, no.~12, pp. 2146--2168, Dec. 1998.
123:
124: \bibitem{ccc99}
125: M.~Charikar, C.~Chekuri, T.-y. Cheung, Z.~Dai, A.~Goel, S.~Guha, and M.~Li,
126: ``Approximation algorithms for directed {S}teiner problems,'' \emph{J.
127: Algorithms}, vol.~33, no.~1, pp. 73--91, Oct. 1999.
128:
129: \bibitem{chm91}
130: H.~Chen and A.~Mandelbaum, ``Discrete flow networks: Bottleneck analysis and
131: fluid approximations,'' \emph{Math. Oper. Res}, vol.~16, no.~2, pp. 408--446,
132: May 1991.
133:
134: \bibitem{chy01}
135: H.~Chen and D.~D. Yao, \emph{Fundamentals of Queueing Networks: Performance,
136: Asymptotics, and Optimization}, ser. Applications of Mathematics.\hskip 1em
137: plus 0.5em minus 0.4em\relax New York, NY: Springer, 2001, vol.~46.
138:
139: \bibitem{cwj03}
140: P.~A. Chou, Y.~Wu, and K.~Jain, ``Practical network coding,'' in \emph{Proc.
141: 41st Annual Allerton Conference on Communication, Control, and Computing},
142: Oct. 2003.
143:
144: \bibitem{cot91}
145: T.~M. Cover and J.~A. Thomas, \emph{Elements of Information Theory}.\hskip 1em
146: plus 0.5em minus 0.4em\relax New York, NY: John Wiley \& Sons, 1991.
147:
148: \bibitem{crs03}
149: R.~L. Cruz and A.~V. Santhanam, ``Optimal routing, link scheduling and power
150: control in multi-hop wireless networks,'' in \emph{Proc. IEEE Infocom 2003},
151: vol.~1, Mar./Apr. 2003, pp. 702--711.
152:
153: \bibitem{cxn04}
154: Y.~Cui, Y.~Xue, and K.~Nahrstedt, ``Optimal distributed multicast routing using
155: network coding: Theory and applications,'' \emph{SIGMETRICS Perform. Eval.
156: Rev.}, vol.~32, no.~2, pp. 47--49, 2004.
157:
158: \bibitem{deh05}
159: S.~Deb, M.~Effros, T.~Ho, D.~R. Karger, R.~Koetter, D.~S. Lun, M.~M{\'e}dard,
160: and N.~Ratnakar, ``Network coding for wireless applications: A brief
161: tutorial,'' in \emph{Proc. International Workshop on Wireless Ad-hoc Networks
162: (IWWAN) 2005}, May 2005, invited paper.
163:
164: \bibitem{dem}
165: S.~Deb and M.~M{\'e}dard, ``Algebraic gossip: A network coding approach to
166: optimal multiple rumor mongering,'' submitted to \emph{IEEE Trans. Inform.
167: Theory}.
168:
169: \bibitem{des04}
170: S.~Deb and R.~Srikant, ``Congestion control for fair resource allocation in
171: networks with multicast flows,'' \emph{{IEEE/ACM} Trans. Networking},
172: vol.~12, no.~2, pp. 274--285, Apr. 2004.
173:
174: \bibitem{dfz05}
175: R.~Dougherty, C.~Freiling, and K.~Zeger, ``Insufficiency of linear coding in
176: network information flow,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~51,
177: no.~8, pp. 2745--2759, Aug. 2005.
178:
179: \bibitem{eli56}
180: P.~Elias, ``Coding for two noisy channels,'' in \emph{Proc. Third London
181: Symposium on Information Theory}.\hskip 1em plus 0.5em minus 0.4em\relax
182: Academic Press, 1956, pp. 61--74.
183:
184: \bibitem{erf04}
185: E.~Erez and M.~Feder, ``Convolutional network codes,'' in \emph{Proc. 2004 IEEE
186: International Symposium on Information Theory (ISIT 2004)}, June/July 2004,
187: p. 146.
188:
189: \bibitem{erf05-efficient}
190: ------, ``Efficient network codes for cyclic networks,'' in \emph{Proc. 2005
191: IEEE International Symposium on Information Theory (ISIT 2005)}, Sept. 2005,
192: pp. 1982--1986.
193:
194: \bibitem{fms04}
195: J.~Feldman, T.~Malkin, R.~A. Servedio, and C.~Stein, ``On the capacity of
196: secure network coding,'' in \emph{Proc. 42nd Annual Allerton Conference on
197: Communication, Control, and Computing}, Sept./Oct. 2004.
198:
199: \bibitem{fel68}
200: W.~Feller, \emph{An Introduction to Probability Theory and its Applications},
201: 3rd~ed.\hskip 1em plus 0.5em minus 0.4em\relax New York, NY: John Wiley \&
202: Sons, 1968, vol.~1.
203:
204: \bibitem{frm05}
205: C.~Fragouli and A.~Markopoulou, ``A network coding approach to overlay network
206: monitoring,'' in \emph{Proc. 43rd Annual Allerton Conference on
207: Communication, Control, and Computing}, Sept. 2005, invited paper.
208:
209: \bibitem{frs04-connection}
210: C.~Fragouli and E.~Soljanin, ``A connection between network coding and
211: convolutional codes,'' in \emph{Proc. 2004 IEEE International Conference on
212: Communications (ICC 2004)}, vol.~2, June 2004, pp. 661--666.
213:
214: \bibitem{frs04}
215: ------, ``Decentralized network coding,'' in \emph{Proc. 2004 IEEE Information
216: Theory Workshop (ITW 2004)}, Oct. 2004, pp. 310--314.
217:
218: \bibitem{gal01}
219: R.~G. Gallager, ``{C}laude {E}. {S}hannon: A retrospective on his life, work,
220: and impact,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~47, no.~7, pp.
221: 2681--2695, Nov. 2001.
222:
223: \bibitem{gvs88}
224: S.~Ghez, S.~Verd{\'u}, and S.~C. Schwartz, ``Stability properties of slotted
225: {A}loha with multipacket reception capability,'' \emph{{IEEE} Trans. Automat.
226: Contr.}, vol.~33, no.~7, pp. 640--649, July 1988.
227:
228: \bibitem{gkr05}
229: C.~Gkantsidis and P.~R. Rodriguez, ``Network coding for large scale content
230: distribution,'' in \emph{Proc. IEEE Infocom 2005}, vol.~4, Mar. 2005, pp.
231: 2235--2245.
232:
233: \bibitem{gdp04}
234: R.~Gowaikar, A.~F. Dana, R.~Palanki, B.~Hassibi, and M.~Effros, ``On the
235: capacity of wireless erasure networks,'' in \emph{Proc. 2004 IEEE
236: International Symposium on Information Theory (ISIT 2004)}, June/July 2004,
237: p. 401.
238:
239: \bibitem{han80}
240: T.~S. Han, ``{S}lepian-{W}olf-{C}over theorem for networks of channels,''
241: \emph{Inf. Control}, vol.~47, pp. 67--83, 1980.
242:
243: \bibitem{hkm05}
244: N.~J.~A. Harvey, D.~R. Karger, and K.~Murota, ``Deterministic network coding by
245: matrix completion,'' in \emph{Proc. 16th Annual ACM-SIAM Symposium on
246: Discrete Algorithms (SODA 2005)}, Jan. 2005, pp. 489--498.
247:
248: \bibitem{hlc05}
249: T.~Ho, B.~Leong, Y.-H. Chang, Y.~Wen, and R.~Koetter, ``Network monitoring in
250: multicast networks using network coding,'' in \emph{Proc. 2005 IEEE
251: International Symposium on Information Theory (ISIT 2005)}, Sept. 2005, pp.
252: 1977--1981.
253:
254: \bibitem{hlk04}
255: T.~Ho, B.~Leong, R.~Koetter, M.~M{\'e}dard, M.~Effros, and D.~R. Karger,
256: ``Byzantine modification detection in multicast networks using randomized
257: network coding,'' in \emph{Proc. 2004 IEEE International Symposium on
258: Information Theory (ISIT 2004)}, June/July 2004, p. 144.
259:
260: \bibitem{hmk05}
261: T.~Ho, M.~M{\'e}dard, and R.~Koetter, ``An information-theoretic view of
262: network management,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~51, no.~4,
263: pp. 1295--1312, Apr. 2005.
264:
265: \bibitem{hmk}
266: \BIBentryALTinterwordspacing
267: T.~Ho, M.~M{\'e}dard, R.~Koetter, D.~R. Karger, M.~Effros, J.~Shi, and
268: B.~Leong, ``A random linear network coding approach to multicast,'' submitted
269: to \emph{IEEE Trans. Inform. Theory}. [Online]. Available:
270: \url{http://www.its.caltech.edu/~tho/itrandom-revision.pdf}
271: \BIBentrySTDinterwordspacing
272:
273: \bibitem{hov05}
274: T.~Ho and H.~Viswanathan, ``Dynamic algorithms for multicast with intra-session
275: network coding,'' in \emph{Proc. 43rd Annual Allerton Conference on
276: Communication, Control, and Computing}, Sept. 2005.
277:
278: \bibitem{imw91}
279: M.~Imase and B.~M. Waxman, ``Dynamic {S}teiner tree problem,'' \emph{SIAM J.
280: Disc. Math.}, vol.~4, no.~3, pp. 369--384, Aug. 1991.
281:
282: \bibitem{jlh05}
283: S.~Jaggi, M.~Langberg, T.~Ho, and M.~Effros, ``Correction of adversarial errors
284: in networks,'' in \emph{Proc. 2005 IEEE International Symposium on
285: Information Theory (ISIT 2005)}, Sept. 2005, pp. 1455--1459.
286:
287: \bibitem{jsc05}
288: S.~Jaggi, P.~Sanders, P.~A. Chou, M.~Effros, S.~Egner, K.~Jain, and L.~M. G.~M.
289: Tolhuizen, ``Polynomial time algorithms for multicast network code
290: construction,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~51, no.~6, pp.
291: 1973--1982, June 2005.
292:
293: \bibitem{jlc05}
294: K.~Jain, L.~Lov{\'a}sz, and P.~A. Chou, ``Building scalable and robust
295: peer-to-peer overlay networks for broadcasting using network coding,'' in
296: \emph{PODC '05: Proc. 24th Annual ACM SIGACT-SIGOPS Symposium on Principles
297: of Distributed Computing}, 2005, pp. 51--59.
298:
299: \bibitem{jpp03}
300: K.~Jain, J.~Padhye, V.~N. Padmanabhan, and L.~Qiu, ``Impact of interference on
301: multi-hop wireless network performance,'' in \emph{MobiCom '03: Proc. 9th
302: Annual International Conference on Mobile Computing and Networking}, 2003,
303: pp. 66--80.
304:
305: \bibitem{jxb03}
306: M.~Johansson, L.~Xiao, and S.~Boyd, ``Simultaneous routing and power allocation
307: in {CDMA} wireless data networks,'' in \emph{Proc. 2003 IEEE International
308: Conference on Communications (ICC 2003)}, vol.~1, May 2003, pp. 51--55.
309:
310: \bibitem{kkh05}
311: S.~Katti, D.~Katabi, W.~Hu, H.~Rahul, and M.~M{\'e}dard, ``The importance of
312: being opportunistic: Practical network coding for wireless environments,'' in
313: \emph{Proc. 43rd Annual Allerton Conference on Communication, Control, and
314: Computing}, Sept. 2005.
315:
316: \bibitem{kel79}
317: F.~P. Kelly, \emph{Reversibility and Stochastic Networks}.\hskip 1em plus 0.5em
318: minus 0.4em\relax Chichester: John Wiley \& Sons, 1979.
319:
320: \bibitem{khs05-multirelay}
321: R.~Khalili and K.~Salamatian, ``On the capacity of erasure relay channel:
322: Multi-relay case,'' in \emph{Proc. 2005 IEEE Information Theory Workshop (ITW
323: 2005)}, Aug. 2005.
324:
325: \bibitem{kon05}
326: M.~Kodialam and T.~Nandagopal, ``Characterizing achievable rates in multi-hop
327: wireless mesh networks with orthogonal channels,'' \emph{{IEEE/ACM} Trans.
328: Networking}, vol.~13, no.~4, pp. 868--880, Aug. 2005.
329:
330: \bibitem{kom03}
331: R.~Koetter and M.~M{\'e}dard, ``An algebraic approach to network coding,''
332: \emph{{IEEE/ACM} Trans. Networking}, vol.~11, no.~5, pp. 782--795, Oct. 2003.
333:
334: \bibitem{lem05}
335: A.~H. Lee and M.~M\'edard, ``Simplified random network codes for multicast
336: networks,'' in \emph{Proc. 2005 IEEE International Symposium on Information
337: Theory (ISIT 2005)}, Sept. 2005, pp. 1725--1729.
338:
339: \bibitem{lyc03}
340: S.-Y.~R. Li, R.~W. Yeung, and N.~Cai, ``Linear network coding,'' \emph{{IEEE}
341: Trans. Inform. Theory}, vol.~49, no.~2, pp. 371--381, Feb. 2003.
342:
343: \bibitem{lil04}
344: Z.~Li and B.~Li, ``Network coding: The case of multiple unicast sessions,'' in
345: \emph{Proc. 42nd Annual Allerton Conference on Communication, Control, and
346: Computing}, Sept./Oct. 2004.
347:
348: \bibitem{lil05}
349: ------, ``Efficient and distributed computation of maximum multicast rates,''
350: in \emph{Proc. IEEE Infocom 2005}, vol.~3, Mar. 2005, pp. 1618--1628.
351:
352: \bibitem{llj05}
353: Z.~Li, B.~Li, D.~Jiang, and L.~C. Lau, ``On achieving optimal throughput with
354: network coding,'' in \emph{Proc. IEEE Infocom 2005}, vol.~3, Mar. 2005, pp.
355: 2184--2194.
356:
357: \bibitem{lia02}
358: W.~Liang, ``Constructing minimum-energy broadcast trees in wireless ad hoc
359: networks,'' in \emph{Proc. 3rd ACM International Symposium on Mobile Ad Hoc
360: Networking \& Computing (MOBIHOC '02)}, June 2002, pp. 112--122.
361:
362: \bibitem{lub02}
363: M.~Luby, ``{LT} codes,'' in \emph{Proc. 43rd Annual IEEE Symposium on
364: Foundations of Computer Science}, Nov. 2002, pp. 271--280.
365:
366: \bibitem{lme04}
367: D.~S. Lun, M.~M{\'e}dard, and M.~Effros, ``On coding for reliable communication
368: over packet networks,'' in \emph{Proc. 42nd Annual Allerton Conference on
369: Communication, Control, and Computing}, Sept./Oct. 2004, invited paper.
370:
371: \bibitem{lmh04}
372: D.~S. Lun, M.~M{\'e}dard, T.~Ho, and R.~Koetter, ``Network coding with a cost
373: criterion,'' in \emph{Proc. 2004 International Symposium on Information
374: Theory and its Applications (ISITA 2004)}, Oct. 2004, pp. 1232--1237.
375:
376: \bibitem{lmk05}
377: D.~S. Lun, M.~M{\'e}dard, and D.~R. Karger, ``On the dynamic multicast problem
378: for coded networks,'' in \emph{Proc. WINMEE, RAWNET and NETCOD 2005
379: Workshops}, Apr. 2005.
380:
381: \bibitem{lmk05-efficient}
382: D.~S. Lun, M.~M{\'e}dard, and R.~Koetter, ``Efficient operation of wireless
383: packet networks using network coding,'' in \emph{Proc. International Workshop
384: on Convergent Technologies (IWCT) 2005}, June 2005, invited paper.
385:
386: \bibitem{lmk06}
387: ------, ``Network coding for efficient wireless unicast,'' in \emph{Proc. 2006
388: International Zurich Seminar on Communications (IZS 2006)}, Feb. 2006, pp.
389: 74--77, invited paper.
390:
391: \bibitem{lmk}
392: \BIBentryALTinterwordspacing
393: D.~S. Lun, M.~M{\'e}dard, R.~Koetter, and M.~Effros, ``On coding for reliable
394: communication over packet networks,'' submitted to \emph{IEEE Trans. Inform.
395: Theory}. [Online]. Available: \url{http://arxiv.org/abs/cs.IT/0510070}
396: \BIBentrySTDinterwordspacing
397:
398: \bibitem{lmk05-further}
399: ------, ``Further results on coding for reliable communication over packet
400: networks,'' in \emph{Proc. 2005 IEEE International Symposium on Information
401: Theory (ISIT 2005)}, Sept. 2005, pp. 1848--1852.
402:
403: \bibitem{lpf06}
404: D.~S. Lun, P.~Pakzad, C.~Fragouli, M.~M{\'e}dard, and R.~Koetter, ``An analysis
405: of finite-memory random linear coding on packet streams,'' in \emph{Proc. 4th
406: International Symposium on Modeling and Optimization in Mobile, Ad Hoc and
407: Wireless Networks (WiOpt '06)}, Apr. 2006.
408:
409: \bibitem{lrk05}
410: D.~S. Lun, N.~Ratnakar, R.~Koetter, M.~M{\'e}dard, E.~Ahmed, and H.~Lee,
411: ``Achieving minimum-cost multicast: A decentralized approach based on network
412: coding,'' in \emph{Proc. IEEE Infocom 2005}, vol.~3, Mar. 2005, pp.
413: 1608--1617.
414:
415: \bibitem{lrm}
416: \BIBentryALTinterwordspacing
417: D.~S. Lun, N.~Ratnakar, M.~M{\'e}dard, R.~Koetter, D.~R. Karger, T.~Ho,
418: E.~Ahmed, and F.~Zhao, ``Minimum-cost multicast over coded packet networks,''
419: to appear in \emph{IEEE Trans. Inform. Theory}. [Online]. Available:
420: \url{http://arxiv.org/abs/cs.IT/0503064}
421: \BIBentrySTDinterwordspacing
422:
423: \bibitem{msw02}
424: R.~Mahajan, N.~Spring, D.~Wetherall, and T.~Anderson, ``Inferring link weights
425: using end-to-end measurements,'' in \emph{Proc. 2nd ACM SIGCOMM Workshop on
426: Internet Measurement (IMW 2002)}, Nov. 2002, pp. 231--236.
427:
428: \bibitem{may02}
429: P.~Maymounkov, ``Online codes,'' NYU, Technical Report TR2002-833, Nov. 2002.
430:
431: \bibitem{mek03}
432: M.~M{\'e}dard, M.~Effros, D.~Karger, and T.~Ho, ``On coding for non-multicast
433: networks,'' in \emph{Proc. 41st Annual Allerton Conference on Communication,
434: Control, and Computing}, Oct. 2003.
435:
436: \bibitem{new99}
437: G.~L. Nemhauser and L.~A. Wolsey, \emph{Integer and Combinatorial
438: Optimization}.\hskip 1em plus 0.5em minus 0.4em\relax New York, NY: John
439: Wiley \& Sons, 1999.
440:
441: \bibitem{omv00}
442: A.~Ouorou, P.~Mahey, and J.-P. Vial, ``A survey of algorithms for convex
443: multicommodity flow problems,'' \emph{Manage. Sci.}, vol.~46, no.~1, pp.
444: 126--147, Jan. 2000.
445:
446: \bibitem{pfs05}
447: P.~Pakzad, C.~Fragouli, and A.~Shokrollahi, ``Coding schemes for line
448: networks,'' in \emph{Proc. 2005 IEEE International Symposium on Information
449: Theory (ISIT 2005)}, Sept. 2005, pp. 1853--1857.
450:
451: \bibitem{ppp03}
452: G.~I. Papadimitriou, C.~Papazoglou, and A.~S. Pomportsis, ``Optical switching:
453: Switch fabrics, techniques, and architectures,'' \emph{J. Lightwave
454: Technol.}, vol.~21, no.~2, pp. 384--405, Feb. 2003.
455:
456: \bibitem{pal03}
457: I.~C. Paschalidis and Y.~Liu, ``Large deviations-based asymptotics for
458: inventory control in supply chains,'' \emph{Oper. Res.}, vol.~51, no.~3, pp.
459: 437--460, May--June 2003.
460:
461: \bibitem{rsw05}
462: A.~Ramamoorthy, J.~Shi, and R.~D. Wesel, ``On the capacity of network coding
463: for random networks,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~51, no.~8,
464: pp. 2878--2885, Aug. 2005.
465:
466: \bibitem{ram96}
467: S.~Ramanathan, ``Multicast tree generation in networks with asymmetric links,''
468: \emph{{IEEE/ACM} Trans. Networking}, vol.~4, no.~4, pp. 558--568, Aug. 1996.
469:
470: \bibitem{ral03}
471: A.~Rasala~Lehman and E.~Lehman, ``Complexity classification of network
472: information flow problems,'' in \emph{Proc. 41st Annual Allerton Conference
473: on Communication, Control, and Computing}, Oct. 2003.
474:
475: \bibitem{rak}
476: N.~Ratnakar and G.~Kramer, ``The multicast capacity of acyclic, deterministic
477: relay networks with no interference,'' to appear in \emph{IEEE Trans. Inform.
478: Theory}.
479:
480: \bibitem{rtk06}
481: N.~Ratnakar, D.~Traskov, and R.~Koetter, ``Approaches to network coding for
482: multiple unicasts,'' in \emph{Proc. 2006 International Zurich Seminar on
483: Communications (IZS 2006)}, Feb. 2006, pp. 70--73, invited paper.
484:
485: \bibitem{rii04}
486: S.~Riis, ``Linear versus non-linear {B}oolean functions in network flow,'' in
487: \emph{Proc. 2004 Conference on Information Sciences and Systems (CISS 2004)},
488: Mar. 2004.
489:
490: \bibitem{sae05-crosslayer}
491: Y.~E. Sagduyu and A.~Ephremides, ``Crosslayer design and distributed {MAC} and
492: network coding in wireless ad hoc networks,'' in \emph{Proc. 2005 IEEE
493: International Symposium on Information Theory (ISIT 2005)}, Sept. 2005, pp.
494: 1863--1867.
495:
496: \bibitem{shc96}
497: H.~D. Sherali and G.~Choi, ``Recovery of primal solutions when using
498: subgradient optimization methods to solve {L}agrangian duals of linear
499: programs,'' \emph{Oper. Res. Lett.}, vol.~19, pp. 105--113, 1996.
500:
501: \bibitem{sho04}
502: \BIBentryALTinterwordspacing
503: A.~Shokrollahi, ``Raptor codes,'' Jan. 2004, preprint. [Online]. Available:
504: \url{http://algo.epfl.ch/contents/output/pubs/raptor.pdf}
505: \BIBentrySTDinterwordspacing
506:
507: \bibitem{shu03}
508: N.~Shulman, ``Communication over an unknown channel via common broadcasting,''
509: Ph.D. dissertation, Tel Aviv University, July 2003.
510:
511: \bibitem{shf00}
512: N.~Shulman and M.~Feder, ``Static broadcasting,'' in \emph{Proc. 2000 IEEE
513: International Symposium on Information Theory (ISIT 2000)}, June 2000, p.~23.
514:
515: \bibitem{syc03}
516: L.~Song, R.~W. Yeung, and N.~Cai, ``Zero-error network coding for acyclic
517: networks,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~49, no.~12, pp.
518: 3129--3139, Dec. 2003.
519:
520: \bibitem{sri04}
521: R.~Srikant, \emph{The Mathematics of Internet Congestion Control}.\hskip 1em
522: plus 0.5em minus 0.4em\relax Boston, MA: Brikh{\"a}user, 2004.
523:
524: \bibitem{tam06}
525: J.~Tan and M.~M{\'e}dard, ``Secure network coding with a cost criterion,'' in
526: \emph{Proc. 4th International Symposium on Modeling and Optimization in
527: Mobile, Ad Hoc and Wireless Networks (WiOpt '06)}, Apr. 2006.
528:
529: \bibitem{tae92}
530: L.~Tassiulas and A.~F. Ephremides, ``Stability properties of constrained
531: queueing systems and scheduling policies for maximum throughput in multihop
532: radio networks,'' \emph{{IEEE} Trans. Automat. Contr.}, vol.~37, no.~12, pp.
533: 1936--1948, Dec. 1992.
534:
535: \bibitem{tsi93}
536: J.~N. Tsitsiklis, ``Decentralized detection,'' in \emph{Advances in Statistical
537: Signal Processing}.\hskip 1em plus 0.5em minus 0.4em\relax Greenwich, CT: JAI
538: Press, 1993, vol.~2, pp. 297--344.
539:
540: \bibitem{meu71}
541: E.~C. van~der Meulen, ``Three-terminal communication channels,'' \emph{Adv.
542: Appl. Probab.}, vol.~3, pp. 120--154, 1971.
543:
544: \bibitem{wax88}
545: B.~M. Waxman, ``Routing of multicast connections,'' \emph{{IEEE} J. Select.
546: Areas Commun.}, vol.~6, no.~9, pp. 1617--1622, Dec. 1988.
547:
548: \bibitem{wfl05}
549: J.~Widmer, C.~Fragouli, and J.-Y. Le~Boudec, ``Low-complexity energy-efficient
550: broadcasting in wireless ad-hoc networks using network coding,'' in
551: \emph{Proc. WINMEE, RAWNET and NETCOD 2005 Workshops}, Apr. 2005.
552:
553: \bibitem{wne02b}
554: J.~E. Wieselthier, G.~D. Nguyen, and A.~Ephremides, ``Energy-efficient
555: broadcast and multicast trees in wireless networks,'' \emph{Mobile Networks
556: and Applications}, vol.~7, pp. 481--492, 2002.
557:
558: \bibitem{wck06}
559: Y.~Wu, M.~Chiang, and S.-Y. Kung, ``Distributed utility maximization for
560: network coding based multicasting: A critical cut approach,'' in \emph{Proc.
561: 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc
562: and Wireless Networks (WiOpt '06)}, Apr. 2006.
563:
564: \bibitem{wcj04}
565: Y.~Wu, P.~A. Chou, and K.~Jain, ``A comparison of network coding and tree
566: packing,'' in \emph{Proc. 2004 IEEE International Symposium on Information
567: Theory (ISIT 2004)}, June/July 2004, p. 143.
568:
569: \bibitem{wck05-information}
570: Y.~Wu, P.~A. Chou, and S.-Y. Kung, ``Information exchange in wireless networks
571: with network coding and physical-layer broadcast,'' in \emph{Proc. 2005
572: Conference on Information Sciences and Systems (CISS 2005)}, Mar. 2005.
573:
574: \bibitem{wck05}
575: ------, ``Minimum-energy multicast in mobile ad hoc networks using network
576: coding,'' \emph{{IEEE} Trans. Commun.}, vol.~53, no.~11, pp. 1906--1918, Nov.
577: 2005.
578:
579: \bibitem{xiy05}
580: Y.~Xi and E.~M. Yeh, ``Distributed algorithms for minimum cost multicast with
581: network coding,'' in \emph{Proc. 43rd Annual Allerton Conference on
582: Communication, Control, and Computing}, Sept. 2005.
583:
584: \bibitem{xiy06}
585: ------, ``Distributed algorithms for minimum cost multicast with network coding
586: in wireless networks,'' in \emph{Proc. 4th International Symposium on
587: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt
588: '06)}, Apr. 2006.
589:
590: \bibitem{xjb04}
591: L.~Xiao, M.~Johansson, and S.~Boyd, ``Simultaneous routing and resource
592: allocation via dual decomposition,'' \emph{{IEEE} Trans. Commun.}, vol.~52,
593: no.~7, pp. 1136--1144, July 2004.
594:
595: \bibitem{yeu95}
596: R.~W. Yeung, ``Multilevel diversity coding with distortion,'' \emph{{IEEE}
597: Trans. Inform. Theory}, vol.~41, no.~2, pp. 412--422, Mar. 1995.
598:
599: \bibitem{zlg04}
600: Y.~Zhu, B.~Li, and J.~Guo, ``Multicast with network coding in application-layer
601: overlay networks,'' \emph{{IEEE} J. Select. Areas Commun.}, vol.~22, no.~1,
602: pp. 107--120, Jan. 2004.
603:
604: \bibitem{zok02}
605: L.~Zosin and S.~Khuller, ``On directed {S}teiner trees,'' in \emph{Proc. 13th
606: Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2002)}, Jan. 2002, pp.
607: 59--63.
608:
609: \end{thebibliography}
610: