cs0605067/main.bbl
1: \begin{thebibliography}{100}
2: \providecommand{\url}[1]{#1}
3: \csname url@rmstyle\endcsname
4: \providecommand{\newblock}{\relax}
5: \providecommand{\bibinfo}[2]{#2}
6: \providecommand\BIBentrySTDinterwordspacing{\spaceskip=0pt\relax}
7: \providecommand\BIBentryALTinterwordstretchfactor{4}
8: \providecommand\BIBentryALTinterwordspacing{\spaceskip=\fontdimen2\font plus
9: \BIBentryALTinterwordstretchfactor\fontdimen3\font minus
10:   \fontdimen4\font\relax}
11: \providecommand\BIBforeignlanguage[2]{{%
12: \expandafter\ifx\csname l@#1\endcsname\relax
13: \typeout{** WARNING: IEEEtran.bst: No hyphenation pattern has been}%
14: \typeout{** loaded for the language `#1'. Using the pattern for}%
15: \typeout{** the default language instead.}%
16: \else
17: \language=\csname l@#1\endcsname
18: \fi
19: #2}}
20: 
21: \bibitem{adm05}
22: S.~Aceda{\'n}ski, S.~Deb, M.~M{\'e}dard, and R.~Koetter, ``How good is random
23:   linear coding based distributed networked storage?'' in \emph{Proc. WINMEE,
24:   RAWNET and NETCOD 2005 Workshops}, Apr. 2005.
25: 
26: \bibitem{acl00}
27: R.~Ahlswede, N.~Cai, S.-Y.~R. Li, and R.~W. Yeung, ``Network information
28:   flow,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~46, no.~4, pp. 1204--1216,
29:   July 2000.
30: 
31: \bibitem{ams02}
32: A.~Ahluwalia, E.~Modiano, and L.~Shu, ``On the complexity and distributed
33:   construction of energy-efficient broadcast trees in static ad hoc wireless
34:   networks,'' in \emph{Proc. 2002 Conference on Information Sciences and
35:   Systems (CISS 2002)}, Mar. 2002.
36: 
37: \bibitem{amo93}
38: R.~K. Ahuja, T.~L. Magnanti, and J.~B. Orlin, \emph{Network Flows: Theory,
39:   Algorithms, and Applications}.\hskip 1em plus 0.5em minus 0.4em\relax Upper
40:   Saddle River, NJ: Prentice Hall, 1993.
41: 
42: \bibitem{afi05}
43: M.~Arai, S.~Fukumoto, and K.~Iwasaki, ``Reliability analysis of a
44:   convolutional-code-based packet level {FEC} under limited buffer size,''
45:   \emph{IEICE Trans. Fundamentals}, vol. E88-A, no.~4, pp. 1047--1054, Apr.
46:   2005.
47: 
48: \bibitem{ayi00}
49: M.~Arai, A.~Yamaguchi, and K.~Iwasaki, ``Method to recover internet packet
50:   losses using $(n, n-1, m)$ convolutional codes,'' in \emph{Proc.
51:   International Conference on Dependable Systems and Networks (DSN 2000)}, June
52:   2000, pp. 382--389.
53: 
54: \bibitem{awl93}
55: B.~Awerbuch and T.~Leighton, ``A simple local-control approximation algorithm
56:   for multicommodity flow,'' in \emph{Proc. 34th Annual IEEE Symposium on
57:   Foundations of Computer Science}, Nov. 1993, pp. 459--468.
58: 
59: \bibitem{ber80}
60: D.~P. Bertsekas, ``A class of optimal routing algorithms for communication
61:   networks,'' in \emph{Proc. 5th International Conference on Computer
62:   Communication (ICCC '80)}, Oct. 1980, pp. 71--76.
63: 
64: \bibitem{ber95}
65: ------, \emph{Nonlinear Programming}.\hskip 1em plus 0.5em minus 0.4em\relax
66:   Belmont, MA: Athena Scientific, 1995.
67: 
68: \bibitem{ber98}
69: ------, \emph{Network Optimization: Continuous and Discrete Models}.\hskip 1em
70:   plus 0.5em minus 0.4em\relax Belmont, MA: Athena Scientific, 1998.
71: 
72: \bibitem{ber01b}
73: ------, \emph{Dynamic Programming and Optimal Control}, 2nd~ed.\hskip 1em plus
74:   0.5em minus 0.4em\relax Belmont, MA: Athena Scientific, 2001, vol.~2.
75: 
76: \bibitem{bgg84}
77: D.~P. Bertsekas, E.~M. Gafni, and R.~G. Gallager, ``Second derivative
78:   algorithms for minimum delay distributed routing in networks,'' \emph{{IEEE}
79:   Trans. Commun.}, vol.~32, no.~8, pp. 911--919, Aug. 1984.
80: 
81: \bibitem{beg92}
82: D.~P. Bertsekas and R.~Gallager, \emph{Data Networks}, 2nd~ed.\hskip 1em plus
83:   0.5em minus 0.4em\relax Upper Saddle River, NJ: Prentice Hall, 1992.
84: 
85: \bibitem{bpt98}
86: D.~Bertsimas, I.~C. Paschalidis, and J.~Tsitsiklis, ``On the large deviations
87:   behavior of acyclic networks of {$G/G/1$} queues,'' \emph{Ann. Appl.
88:   Probab.}, vol.~8, no.~4, pp. 1027--1069, Nov. 1998.
89: 
90: \bibitem{bsg06}
91: S.~Bhadra, S.~Shakkottai, and P.~Gupta, ``Min-cost selfish multicast with
92:   network coding,'' in \emph{Proc. 4th International Symposium on Modeling and
93:   Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt '06)}, Apr. 2006.
94: 
95: \bibitem{bhj83}
96: K.~Bharath-Kumar and J.~M. Jaffe, ``Routing to multiple destinations in
97:   computer networks,'' \emph{{IEEE} Trans. Commun.}, vol.~31, no.~3, pp.
98:   343--351, Mar. 1983.
99: 
100: \bibitem{bhn05}
101: K.~Bhattad and K.~R. Narayanan, ``Weakly secure network coding,'' in
102:   \emph{Proc. WINMEE, RAWNET and NETCOD 2005 Workshops}, Apr. 2005.
103: 
104: \bibitem{brk05}
105: K.~Bhattad, N.~Ratnakar, R.~Koetter, and K.~R. Narayanan, ``Minimal network
106:   coding for multicast,'' in \emph{Proc. 2005 IEEE International Symposium on
107:   Information Theory (ISIT 2005)}, Sept. 2005, pp. 1730--1734.
108: 
109: \bibitem{blm02}
110: J.~W. Byers, M.~Luby, and M.~Mitzenmacher, ``A digital fountain approach to
111:   asynchronous reliable multicast,'' \emph{{IEEE} J. Select. Areas Commun.},
112:   vol.~20, no.~8, pp. 1528--1540, Oct. 2002.
113: 
114: \bibitem{cay02}
115: N.~Cai and R.~W. Yeung, ``Secure network coding,'' in \emph{Proc. 2002 IEEE
116:   International Symposium on Information Theory (ISIT 2002)}, June/July 2002,
117:   p. 323.
118: 
119: \bibitem{chm98}
120: V.~W.~S. Chan, K.~L. Hall, E.~Modiano, and K.~A. Rauschenbach, ``Architectures
121:   and technologies for high-speed optical data networks,'' \emph{J. Lightwave
122:   Technol.}, vol.~16, no.~12, pp. 2146--2168, Dec. 1998.
123: 
124: \bibitem{ccc99}
125: M.~Charikar, C.~Chekuri, T.-y. Cheung, Z.~Dai, A.~Goel, S.~Guha, and M.~Li,
126:   ``Approximation algorithms for directed {S}teiner problems,'' \emph{J.
127:   Algorithms}, vol.~33, no.~1, pp. 73--91, Oct. 1999.
128: 
129: \bibitem{chm91}
130: H.~Chen and A.~Mandelbaum, ``Discrete flow networks: Bottleneck analysis and
131:   fluid approximations,'' \emph{Math. Oper. Res}, vol.~16, no.~2, pp. 408--446,
132:   May 1991.
133: 
134: \bibitem{chy01}
135: H.~Chen and D.~D. Yao, \emph{Fundamentals of Queueing Networks: Performance,
136:   Asymptotics, and Optimization}, ser. Applications of Mathematics.\hskip 1em
137:   plus 0.5em minus 0.4em\relax New York, NY: Springer, 2001, vol.~46.
138: 
139: \bibitem{cwj03}
140: P.~A. Chou, Y.~Wu, and K.~Jain, ``Practical network coding,'' in \emph{Proc.
141:   41st Annual Allerton Conference on Communication, Control, and Computing},
142:   Oct. 2003.
143: 
144: \bibitem{cot91}
145: T.~M. Cover and J.~A. Thomas, \emph{Elements of Information Theory}.\hskip 1em
146:   plus 0.5em minus 0.4em\relax New York, NY: John Wiley \& Sons, 1991.
147: 
148: \bibitem{crs03}
149: R.~L. Cruz and A.~V. Santhanam, ``Optimal routing, link scheduling and power
150:   control in multi-hop wireless networks,'' in \emph{Proc. IEEE Infocom 2003},
151:   vol.~1, Mar./Apr. 2003, pp. 702--711.
152: 
153: \bibitem{cxn04}
154: Y.~Cui, Y.~Xue, and K.~Nahrstedt, ``Optimal distributed multicast routing using
155:   network coding: Theory and applications,'' \emph{SIGMETRICS Perform. Eval.
156:   Rev.}, vol.~32, no.~2, pp. 47--49, 2004.
157: 
158: \bibitem{deh05}
159: S.~Deb, M.~Effros, T.~Ho, D.~R. Karger, R.~Koetter, D.~S. Lun, M.~M{\'e}dard,
160:   and N.~Ratnakar, ``Network coding for wireless applications: A brief
161:   tutorial,'' in \emph{Proc. International Workshop on Wireless Ad-hoc Networks
162:   (IWWAN) 2005}, May 2005, invited paper.
163: 
164: \bibitem{dem}
165: S.~Deb and M.~M{\'e}dard, ``Algebraic gossip: A network coding approach to
166:   optimal multiple rumor mongering,'' submitted to \emph{IEEE Trans. Inform.
167:   Theory}.
168: 
169: \bibitem{des04}
170: S.~Deb and R.~Srikant, ``Congestion control for fair resource allocation in
171:   networks with multicast flows,'' \emph{{IEEE/ACM} Trans. Networking},
172:   vol.~12, no.~2, pp. 274--285, Apr. 2004.
173: 
174: \bibitem{dfz05}
175: R.~Dougherty, C.~Freiling, and K.~Zeger, ``Insufficiency of linear coding in
176:   network information flow,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~51,
177:   no.~8, pp. 2745--2759, Aug. 2005.
178: 
179: \bibitem{eli56}
180: P.~Elias, ``Coding for two noisy channels,'' in \emph{Proc. Third London
181:   Symposium on Information Theory}.\hskip 1em plus 0.5em minus 0.4em\relax
182:   Academic Press, 1956, pp. 61--74.
183: 
184: \bibitem{erf04}
185: E.~Erez and M.~Feder, ``Convolutional network codes,'' in \emph{Proc. 2004 IEEE
186:   International Symposium on Information Theory (ISIT 2004)}, June/July 2004,
187:   p. 146.
188: 
189: \bibitem{erf05-efficient}
190: ------, ``Efficient network codes for cyclic networks,'' in \emph{Proc. 2005
191:   IEEE International Symposium on Information Theory (ISIT 2005)}, Sept. 2005,
192:   pp. 1982--1986.
193: 
194: \bibitem{fms04}
195: J.~Feldman, T.~Malkin, R.~A. Servedio, and C.~Stein, ``On the capacity of
196:   secure network coding,'' in \emph{Proc. 42nd Annual Allerton Conference on
197:   Communication, Control, and Computing}, Sept./Oct. 2004.
198: 
199: \bibitem{fel68}
200: W.~Feller, \emph{An Introduction to Probability Theory and its Applications},
201:   3rd~ed.\hskip 1em plus 0.5em minus 0.4em\relax New York, NY: John Wiley \&
202:   Sons, 1968, vol.~1.
203: 
204: \bibitem{frm05}
205: C.~Fragouli and A.~Markopoulou, ``A network coding approach to overlay network
206:   monitoring,'' in \emph{Proc. 43rd Annual Allerton Conference on
207:   Communication, Control, and Computing}, Sept. 2005, invited paper.
208: 
209: \bibitem{frs04-connection}
210: C.~Fragouli and E.~Soljanin, ``A connection between network coding and
211:   convolutional codes,'' in \emph{Proc. 2004 IEEE International Conference on
212:   Communications (ICC 2004)}, vol.~2, June 2004, pp. 661--666.
213: 
214: \bibitem{frs04}
215: ------, ``Decentralized network coding,'' in \emph{Proc. 2004 IEEE Information
216:   Theory Workshop (ITW 2004)}, Oct. 2004, pp. 310--314.
217: 
218: \bibitem{gal01}
219: R.~G. Gallager, ``{C}laude {E}. {S}hannon: A retrospective on his life, work,
220:   and impact,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~47, no.~7, pp.
221:   2681--2695, Nov. 2001.
222: 
223: \bibitem{gvs88}
224: S.~Ghez, S.~Verd{\'u}, and S.~C. Schwartz, ``Stability properties of slotted
225:   {A}loha with multipacket reception capability,'' \emph{{IEEE} Trans. Automat.
226:   Contr.}, vol.~33, no.~7, pp. 640--649, July 1988.
227: 
228: \bibitem{gkr05}
229: C.~Gkantsidis and P.~R. Rodriguez, ``Network coding for large scale content
230:   distribution,'' in \emph{Proc. IEEE Infocom 2005}, vol.~4, Mar. 2005, pp.
231:   2235--2245.
232: 
233: \bibitem{gdp04}
234: R.~Gowaikar, A.~F. Dana, R.~Palanki, B.~Hassibi, and M.~Effros, ``On the
235:   capacity of wireless erasure networks,'' in \emph{Proc. 2004 IEEE
236:   International Symposium on Information Theory (ISIT 2004)}, June/July 2004,
237:   p. 401.
238: 
239: \bibitem{han80}
240: T.~S. Han, ``{S}lepian-{W}olf-{C}over theorem for networks of channels,''
241:   \emph{Inf. Control}, vol.~47, pp. 67--83, 1980.
242: 
243: \bibitem{hkm05}
244: N.~J.~A. Harvey, D.~R. Karger, and K.~Murota, ``Deterministic network coding by
245:   matrix completion,'' in \emph{Proc. 16th Annual ACM-SIAM Symposium on
246:   Discrete Algorithms (SODA 2005)}, Jan. 2005, pp. 489--498.
247: 
248: \bibitem{hlc05}
249: T.~Ho, B.~Leong, Y.-H. Chang, Y.~Wen, and R.~Koetter, ``Network monitoring in
250:   multicast networks using network coding,'' in \emph{Proc. 2005 IEEE
251:   International Symposium on Information Theory (ISIT 2005)}, Sept. 2005, pp.
252:   1977--1981.
253: 
254: \bibitem{hlk04}
255: T.~Ho, B.~Leong, R.~Koetter, M.~M{\'e}dard, M.~Effros, and D.~R. Karger,
256:   ``Byzantine modification detection in multicast networks using randomized
257:   network coding,'' in \emph{Proc. 2004 IEEE International Symposium on
258:   Information Theory (ISIT 2004)}, June/July 2004, p. 144.
259: 
260: \bibitem{hmk05}
261: T.~Ho, M.~M{\'e}dard, and R.~Koetter, ``An information-theoretic view of
262:   network management,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~51, no.~4,
263:   pp. 1295--1312, Apr. 2005.
264: 
265: \bibitem{hmk}
266: \BIBentryALTinterwordspacing
267: T.~Ho, M.~M{\'e}dard, R.~Koetter, D.~R. Karger, M.~Effros, J.~Shi, and
268:   B.~Leong, ``A random linear network coding approach to multicast,'' submitted
269:   to \emph{IEEE Trans. Inform. Theory}. [Online]. Available:
270:   \url{http://www.its.caltech.edu/~tho/itrandom-revision.pdf}
271: \BIBentrySTDinterwordspacing
272: 
273: \bibitem{hov05}
274: T.~Ho and H.~Viswanathan, ``Dynamic algorithms for multicast with intra-session
275:   network coding,'' in \emph{Proc. 43rd Annual Allerton Conference on
276:   Communication, Control, and Computing}, Sept. 2005.
277: 
278: \bibitem{imw91}
279: M.~Imase and B.~M. Waxman, ``Dynamic {S}teiner tree problem,'' \emph{SIAM J.
280:   Disc. Math.}, vol.~4, no.~3, pp. 369--384, Aug. 1991.
281: 
282: \bibitem{jlh05}
283: S.~Jaggi, M.~Langberg, T.~Ho, and M.~Effros, ``Correction of adversarial errors
284:   in networks,'' in \emph{Proc. 2005 IEEE International Symposium on
285:   Information Theory (ISIT 2005)}, Sept. 2005, pp. 1455--1459.
286: 
287: \bibitem{jsc05}
288: S.~Jaggi, P.~Sanders, P.~A. Chou, M.~Effros, S.~Egner, K.~Jain, and L.~M. G.~M.
289:   Tolhuizen, ``Polynomial time algorithms for multicast network code
290:   construction,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~51, no.~6, pp.
291:   1973--1982, June 2005.
292: 
293: \bibitem{jlc05}
294: K.~Jain, L.~Lov{\'a}sz, and P.~A. Chou, ``Building scalable and robust
295:   peer-to-peer overlay networks for broadcasting using network coding,'' in
296:   \emph{PODC '05: Proc. 24th Annual ACM SIGACT-SIGOPS Symposium on Principles
297:   of Distributed Computing}, 2005, pp. 51--59.
298: 
299: \bibitem{jpp03}
300: K.~Jain, J.~Padhye, V.~N. Padmanabhan, and L.~Qiu, ``Impact of interference on
301:   multi-hop wireless network performance,'' in \emph{MobiCom '03: Proc. 9th
302:   Annual International Conference on Mobile Computing and Networking}, 2003,
303:   pp. 66--80.
304: 
305: \bibitem{jxb03}
306: M.~Johansson, L.~Xiao, and S.~Boyd, ``Simultaneous routing and power allocation
307:   in {CDMA} wireless data networks,'' in \emph{Proc. 2003 IEEE International
308:   Conference on Communications (ICC 2003)}, vol.~1, May 2003, pp. 51--55.
309: 
310: \bibitem{kkh05}
311: S.~Katti, D.~Katabi, W.~Hu, H.~Rahul, and M.~M{\'e}dard, ``The importance of
312:   being opportunistic: Practical network coding for wireless environments,'' in
313:   \emph{Proc. 43rd Annual Allerton Conference on Communication, Control, and
314:   Computing}, Sept. 2005.
315: 
316: \bibitem{kel79}
317: F.~P. Kelly, \emph{Reversibility and Stochastic Networks}.\hskip 1em plus 0.5em
318:   minus 0.4em\relax Chichester: John Wiley \& Sons, 1979.
319: 
320: \bibitem{khs05-multirelay}
321: R.~Khalili and K.~Salamatian, ``On the capacity of erasure relay channel:
322:   Multi-relay case,'' in \emph{Proc. 2005 IEEE Information Theory Workshop (ITW
323:   2005)}, Aug. 2005.
324: 
325: \bibitem{kon05}
326: M.~Kodialam and T.~Nandagopal, ``Characterizing achievable rates in multi-hop
327:   wireless mesh networks with orthogonal channels,'' \emph{{IEEE/ACM} Trans.
328:   Networking}, vol.~13, no.~4, pp. 868--880, Aug. 2005.
329: 
330: \bibitem{kom03}
331: R.~Koetter and M.~M{\'e}dard, ``An algebraic approach to network coding,''
332:   \emph{{IEEE/ACM} Trans. Networking}, vol.~11, no.~5, pp. 782--795, Oct. 2003.
333: 
334: \bibitem{lem05}
335: A.~H. Lee and M.~M\'edard, ``Simplified random network codes for multicast
336:   networks,'' in \emph{Proc. 2005 IEEE International Symposium on Information
337:   Theory (ISIT 2005)}, Sept. 2005, pp. 1725--1729.
338: 
339: \bibitem{lyc03}
340: S.-Y.~R. Li, R.~W. Yeung, and N.~Cai, ``Linear network coding,'' \emph{{IEEE}
341:   Trans. Inform. Theory}, vol.~49, no.~2, pp. 371--381, Feb. 2003.
342: 
343: \bibitem{lil04}
344: Z.~Li and B.~Li, ``Network coding: The case of multiple unicast sessions,'' in
345:   \emph{Proc. 42nd Annual Allerton Conference on Communication, Control, and
346:   Computing}, Sept./Oct. 2004.
347: 
348: \bibitem{lil05}
349: ------, ``Efficient and distributed computation of maximum multicast rates,''
350:   in \emph{Proc. IEEE Infocom 2005}, vol.~3, Mar. 2005, pp. 1618--1628.
351: 
352: \bibitem{llj05}
353: Z.~Li, B.~Li, D.~Jiang, and L.~C. Lau, ``On achieving optimal throughput with
354:   network coding,'' in \emph{Proc. IEEE Infocom 2005}, vol.~3, Mar. 2005, pp.
355:   2184--2194.
356: 
357: \bibitem{lia02}
358: W.~Liang, ``Constructing minimum-energy broadcast trees in wireless ad hoc
359:   networks,'' in \emph{Proc. 3rd ACM International Symposium on Mobile Ad Hoc
360:   Networking \& Computing (MOBIHOC '02)}, June 2002, pp. 112--122.
361: 
362: \bibitem{lub02}
363: M.~Luby, ``{LT} codes,'' in \emph{Proc. 43rd Annual IEEE Symposium on
364:   Foundations of Computer Science}, Nov. 2002, pp. 271--280.
365: 
366: \bibitem{lme04}
367: D.~S. Lun, M.~M{\'e}dard, and M.~Effros, ``On coding for reliable communication
368:   over packet networks,'' in \emph{Proc. 42nd Annual Allerton Conference on
369:   Communication, Control, and Computing}, Sept./Oct. 2004, invited paper.
370: 
371: \bibitem{lmh04}
372: D.~S. Lun, M.~M{\'e}dard, T.~Ho, and R.~Koetter, ``Network coding with a cost
373:   criterion,'' in \emph{Proc. 2004 International Symposium on Information
374:   Theory and its Applications (ISITA 2004)}, Oct. 2004, pp. 1232--1237.
375: 
376: \bibitem{lmk05}
377: D.~S. Lun, M.~M{\'e}dard, and D.~R. Karger, ``On the dynamic multicast problem
378:   for coded networks,'' in \emph{Proc. WINMEE, RAWNET and NETCOD 2005
379:   Workshops}, Apr. 2005.
380: 
381: \bibitem{lmk05-efficient}
382: D.~S. Lun, M.~M{\'e}dard, and R.~Koetter, ``Efficient operation of wireless
383:   packet networks using network coding,'' in \emph{Proc. International Workshop
384:   on Convergent Technologies (IWCT) 2005}, June 2005, invited paper.
385: 
386: \bibitem{lmk06}
387: ------, ``Network coding for efficient wireless unicast,'' in \emph{Proc. 2006
388:   International Zurich Seminar on Communications (IZS 2006)}, Feb. 2006, pp.
389:   74--77, invited paper.
390: 
391: \bibitem{lmk}
392: \BIBentryALTinterwordspacing
393: D.~S. Lun, M.~M{\'e}dard, R.~Koetter, and M.~Effros, ``On coding for reliable
394:   communication over packet networks,'' submitted to \emph{IEEE Trans. Inform.
395:   Theory}. [Online]. Available: \url{http://arxiv.org/abs/cs.IT/0510070}
396: \BIBentrySTDinterwordspacing
397: 
398: \bibitem{lmk05-further}
399: ------, ``Further results on coding for reliable communication over packet
400:   networks,'' in \emph{Proc. 2005 IEEE International Symposium on Information
401:   Theory (ISIT 2005)}, Sept. 2005, pp. 1848--1852.
402: 
403: \bibitem{lpf06}
404: D.~S. Lun, P.~Pakzad, C.~Fragouli, M.~M{\'e}dard, and R.~Koetter, ``An analysis
405:   of finite-memory random linear coding on packet streams,'' in \emph{Proc. 4th
406:   International Symposium on Modeling and Optimization in Mobile, Ad Hoc and
407:   Wireless Networks (WiOpt '06)}, Apr. 2006.
408: 
409: \bibitem{lrk05}
410: D.~S. Lun, N.~Ratnakar, R.~Koetter, M.~M{\'e}dard, E.~Ahmed, and H.~Lee,
411:   ``Achieving minimum-cost multicast: A decentralized approach based on network
412:   coding,'' in \emph{Proc. IEEE Infocom 2005}, vol.~3, Mar. 2005, pp.
413:   1608--1617.
414: 
415: \bibitem{lrm}
416: \BIBentryALTinterwordspacing
417: D.~S. Lun, N.~Ratnakar, M.~M{\'e}dard, R.~Koetter, D.~R. Karger, T.~Ho,
418:   E.~Ahmed, and F.~Zhao, ``Minimum-cost multicast over coded packet networks,''
419:   to appear in \emph{IEEE Trans. Inform. Theory}. [Online]. Available:
420:   \url{http://arxiv.org/abs/cs.IT/0503064}
421: \BIBentrySTDinterwordspacing
422: 
423: \bibitem{msw02}
424: R.~Mahajan, N.~Spring, D.~Wetherall, and T.~Anderson, ``Inferring link weights
425:   using end-to-end measurements,'' in \emph{Proc. 2nd ACM SIGCOMM Workshop on
426:   Internet Measurement (IMW 2002)}, Nov. 2002, pp. 231--236.
427: 
428: \bibitem{may02}
429: P.~Maymounkov, ``Online codes,'' NYU, Technical Report TR2002-833, Nov. 2002.
430: 
431: \bibitem{mek03}
432: M.~M{\'e}dard, M.~Effros, D.~Karger, and T.~Ho, ``On coding for non-multicast
433:   networks,'' in \emph{Proc. 41st Annual Allerton Conference on Communication,
434:   Control, and Computing}, Oct. 2003.
435: 
436: \bibitem{new99}
437: G.~L. Nemhauser and L.~A. Wolsey, \emph{Integer and Combinatorial
438:   Optimization}.\hskip 1em plus 0.5em minus 0.4em\relax New York, NY: John
439:   Wiley \& Sons, 1999.
440: 
441: \bibitem{omv00}
442: A.~Ouorou, P.~Mahey, and J.-P. Vial, ``A survey of algorithms for convex
443:   multicommodity flow problems,'' \emph{Manage. Sci.}, vol.~46, no.~1, pp.
444:   126--147, Jan. 2000.
445: 
446: \bibitem{pfs05}
447: P.~Pakzad, C.~Fragouli, and A.~Shokrollahi, ``Coding schemes for line
448:   networks,'' in \emph{Proc. 2005 IEEE International Symposium on Information
449:   Theory (ISIT 2005)}, Sept. 2005, pp. 1853--1857.
450: 
451: \bibitem{ppp03}
452: G.~I. Papadimitriou, C.~Papazoglou, and A.~S. Pomportsis, ``Optical switching:
453:   Switch fabrics, techniques, and architectures,'' \emph{J. Lightwave
454:   Technol.}, vol.~21, no.~2, pp. 384--405, Feb. 2003.
455: 
456: \bibitem{pal03}
457: I.~C. Paschalidis and Y.~Liu, ``Large deviations-based asymptotics for
458:   inventory control in supply chains,'' \emph{Oper. Res.}, vol.~51, no.~3, pp.
459:   437--460, May--June 2003.
460: 
461: \bibitem{rsw05}
462: A.~Ramamoorthy, J.~Shi, and R.~D. Wesel, ``On the capacity of network coding
463:   for random networks,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~51, no.~8,
464:   pp. 2878--2885, Aug. 2005.
465: 
466: \bibitem{ram96}
467: S.~Ramanathan, ``Multicast tree generation in networks with asymmetric links,''
468:   \emph{{IEEE/ACM} Trans. Networking}, vol.~4, no.~4, pp. 558--568, Aug. 1996.
469: 
470: \bibitem{ral03}
471: A.~Rasala~Lehman and E.~Lehman, ``Complexity classification of network
472:   information flow problems,'' in \emph{Proc. 41st Annual Allerton Conference
473:   on Communication, Control, and Computing}, Oct. 2003.
474: 
475: \bibitem{rak}
476: N.~Ratnakar and G.~Kramer, ``The multicast capacity of acyclic, deterministic
477:   relay networks with no interference,'' to appear in \emph{IEEE Trans. Inform.
478:   Theory}.
479: 
480: \bibitem{rtk06}
481: N.~Ratnakar, D.~Traskov, and R.~Koetter, ``Approaches to network coding for
482:   multiple unicasts,'' in \emph{Proc. 2006 International Zurich Seminar on
483:   Communications (IZS 2006)}, Feb. 2006, pp. 70--73, invited paper.
484: 
485: \bibitem{rii04}
486: S.~Riis, ``Linear versus non-linear {B}oolean functions in network flow,'' in
487:   \emph{Proc. 2004 Conference on Information Sciences and Systems (CISS 2004)},
488:   Mar. 2004.
489: 
490: \bibitem{sae05-crosslayer}
491: Y.~E. Sagduyu and A.~Ephremides, ``Crosslayer design and distributed {MAC} and
492:   network coding in wireless ad hoc networks,'' in \emph{Proc. 2005 IEEE
493:   International Symposium on Information Theory (ISIT 2005)}, Sept. 2005, pp.
494:   1863--1867.
495: 
496: \bibitem{shc96}
497: H.~D. Sherali and G.~Choi, ``Recovery of primal solutions when using
498:   subgradient optimization methods to solve {L}agrangian duals of linear
499:   programs,'' \emph{Oper. Res. Lett.}, vol.~19, pp. 105--113, 1996.
500: 
501: \bibitem{sho04}
502: \BIBentryALTinterwordspacing
503: A.~Shokrollahi, ``Raptor codes,'' Jan. 2004, preprint. [Online]. Available:
504:   \url{http://algo.epfl.ch/contents/output/pubs/raptor.pdf}
505: \BIBentrySTDinterwordspacing
506: 
507: \bibitem{shu03}
508: N.~Shulman, ``Communication over an unknown channel via common broadcasting,''
509:   Ph.D. dissertation, Tel Aviv University, July 2003.
510: 
511: \bibitem{shf00}
512: N.~Shulman and M.~Feder, ``Static broadcasting,'' in \emph{Proc. 2000 IEEE
513:   International Symposium on Information Theory (ISIT 2000)}, June 2000, p.~23.
514: 
515: \bibitem{syc03}
516: L.~Song, R.~W. Yeung, and N.~Cai, ``Zero-error network coding for acyclic
517:   networks,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~49, no.~12, pp.
518:   3129--3139, Dec. 2003.
519: 
520: \bibitem{sri04}
521: R.~Srikant, \emph{The Mathematics of Internet Congestion Control}.\hskip 1em
522:   plus 0.5em minus 0.4em\relax Boston, MA: Brikh{\"a}user, 2004.
523: 
524: \bibitem{tam06}
525: J.~Tan and M.~M{\'e}dard, ``Secure network coding with a cost criterion,'' in
526:   \emph{Proc. 4th International Symposium on Modeling and Optimization in
527:   Mobile, Ad Hoc and Wireless Networks (WiOpt '06)}, Apr. 2006.
528: 
529: \bibitem{tae92}
530: L.~Tassiulas and A.~F. Ephremides, ``Stability properties of constrained
531:   queueing systems and scheduling policies for maximum throughput in multihop
532:   radio networks,'' \emph{{IEEE} Trans. Automat. Contr.}, vol.~37, no.~12, pp.
533:   1936--1948, Dec. 1992.
534: 
535: \bibitem{tsi93}
536: J.~N. Tsitsiklis, ``Decentralized detection,'' in \emph{Advances in Statistical
537:   Signal Processing}.\hskip 1em plus 0.5em minus 0.4em\relax Greenwich, CT: JAI
538:   Press, 1993, vol.~2, pp. 297--344.
539: 
540: \bibitem{meu71}
541: E.~C. van~der Meulen, ``Three-terminal communication channels,'' \emph{Adv.
542:   Appl. Probab.}, vol.~3, pp. 120--154, 1971.
543: 
544: \bibitem{wax88}
545: B.~M. Waxman, ``Routing of multicast connections,'' \emph{{IEEE} J. Select.
546:   Areas Commun.}, vol.~6, no.~9, pp. 1617--1622, Dec. 1988.
547: 
548: \bibitem{wfl05}
549: J.~Widmer, C.~Fragouli, and J.-Y. Le~Boudec, ``Low-complexity energy-efficient
550:   broadcasting in wireless ad-hoc networks using network coding,'' in
551:   \emph{Proc. WINMEE, RAWNET and NETCOD 2005 Workshops}, Apr. 2005.
552: 
553: \bibitem{wne02b}
554: J.~E. Wieselthier, G.~D. Nguyen, and A.~Ephremides, ``Energy-efficient
555:   broadcast and multicast trees in wireless networks,'' \emph{Mobile Networks
556:   and Applications}, vol.~7, pp. 481--492, 2002.
557: 
558: \bibitem{wck06}
559: Y.~Wu, M.~Chiang, and S.-Y. Kung, ``Distributed utility maximization for
560:   network coding based multicasting: A critical cut approach,'' in \emph{Proc.
561:   4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc
562:   and Wireless Networks (WiOpt '06)}, Apr. 2006.
563: 
564: \bibitem{wcj04}
565: Y.~Wu, P.~A. Chou, and K.~Jain, ``A comparison of network coding and tree
566:   packing,'' in \emph{Proc. 2004 IEEE International Symposium on Information
567:   Theory (ISIT 2004)}, June/July 2004, p. 143.
568: 
569: \bibitem{wck05-information}
570: Y.~Wu, P.~A. Chou, and S.-Y. Kung, ``Information exchange in wireless networks
571:   with network coding and physical-layer broadcast,'' in \emph{Proc. 2005
572:   Conference on Information Sciences and Systems (CISS 2005)}, Mar. 2005.
573: 
574: \bibitem{wck05}
575: ------, ``Minimum-energy multicast in mobile ad hoc networks using network
576:   coding,'' \emph{{IEEE} Trans. Commun.}, vol.~53, no.~11, pp. 1906--1918, Nov.
577:   2005.
578: 
579: \bibitem{xiy05}
580: Y.~Xi and E.~M. Yeh, ``Distributed algorithms for minimum cost multicast with
581:   network coding,'' in \emph{Proc. 43rd Annual Allerton Conference on
582:   Communication, Control, and Computing}, Sept. 2005.
583: 
584: \bibitem{xiy06}
585: ------, ``Distributed algorithms for minimum cost multicast with network coding
586:   in wireless networks,'' in \emph{Proc. 4th International Symposium on
587:   Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt
588:   '06)}, Apr. 2006.
589: 
590: \bibitem{xjb04}
591: L.~Xiao, M.~Johansson, and S.~Boyd, ``Simultaneous routing and resource
592:   allocation via dual decomposition,'' \emph{{IEEE} Trans. Commun.}, vol.~52,
593:   no.~7, pp. 1136--1144, July 2004.
594: 
595: \bibitem{yeu95}
596: R.~W. Yeung, ``Multilevel diversity coding with distortion,'' \emph{{IEEE}
597:   Trans. Inform. Theory}, vol.~41, no.~2, pp. 412--422, Mar. 1995.
598: 
599: \bibitem{zlg04}
600: Y.~Zhu, B.~Li, and J.~Guo, ``Multicast with network coding in application-layer
601:   overlay networks,'' \emph{{IEEE} J. Select. Areas Commun.}, vol.~22, no.~1,
602:   pp. 107--120, Jan. 2004.
603: 
604: \bibitem{zok02}
605: L.~Zosin and S.~Khuller, ``On directed {S}teiner trees,'' in \emph{Proc. 13th
606:   Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2002)}, Jan. 2002, pp.
607:   59--63.
608: 
609: \end{thebibliography}
610: