#### Filter Results:

- Full text PDF available (17)

#### Publication Year

2001

2017

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Tracey Ho, Muriel Médard, +4 authors Ben Leong
- IEEE Transactions on Information Theory
- 2006

We present a distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks. Network nodes independently and randomly select linear mappings from inputs onto output links over some field. We show that this achieves capacity with probability exponentially approaching 1 with the code… (More)

We consider a randomized network coding approach for multicasting from several sources over a network, in which nodes independently and randomly select linear mappings from inputs onto output links over some field. This approach was first described in [3], which gave, for acyclic delay-free networks, a bound on error probability, in terms of the number of… (More)

- Aditya Ramamoorthy, Jun Shi, Richard D. Wesel
- IEEE Transactions on Information Theory
- 2005

We study the maximum flow possible between a single-source and multiple terminals in a weighted random graph (modeling a wired network) and a weighted random geometric graph (modeling an ad-hoc wireless network) using network coding. For the weighted random graph model, we show that the network coding capacity concentrates around the expected number of… (More)

- Tracey Ho, Muriel Médard, +4 authors Ben Leong
- 2004

We present a distributed randomized network coding approach for transmission and compression of information in general multi-source multicast networks. Network nodes independently and randomly select linear mappings from inputs onto output links over some field. We show that this achieves optimal capacity with probability rapidly approaching 1 with the code… (More)

- Jun Shi, Richard D. Wesel
- IEEE Trans. Communications
- 2004

—For trellis codes, generating function techniques provide the distance spectrum and a union bound on bit-error rate. The computation of the generating function of a trellis code may be separated into two stages. The first stage reduces the number of states as much as possible using low-complexity approaches. The second stage produces the generating… (More)

- Jun Shi, Richard D. Wesel
- IEEE Transactions on Information Theory
- 2007

Based on random codes and typical set decoding, an alternative proof of Root and Varaiya's compound channel coding theorem for linear Gaussian channels is presented. The performance limit of codes with finite block length under a compound channel is studied through error bounds and simulation. Although the theorem promises uniform convergence of the… (More)

- Ren Hao CUI, Jun Ping SHI, Yu Wen WANG
- 2011

The authors prove the uniqueness and existence of positive solutions for the semilinear elliptic system which involves nonlinearities with sublinear growth conditions.

- Adina Matache, Richard D. Wesel, Jun Shi
- ICC
- 2002

— Foschini's diagonally layered space-time transmission system known as D-BLAST is an advanced architecture designed for a Rayleigh fading environment using multiple element antenna arrays at both the transmit and receive sites to achieve very high spectral efficiencies. In this paper we examine the performance of trellis codes that are designed to have a… (More)

- Herwin Chan, Alireza Hodjat, Jun Shi, Richard D. Wesel, Ingrid Verbauwhede
- International Conference on Information…
- 2004

We describe a working implementation of a streaming encryption system for optical networks. The 10 Gbps data stream is encrypted on the physical level in both the wavelength and time domains. Security is obtained by applying a strong pseudo-random hopping pattern to both. The AES algorithm in counter mode is used to control the switches that implement the… (More)