Login / Signup
Robust network coding in the presence of untrusted nodes.
Da Wang
Danilo Silva
Frank R. Kschischang
Published in:
IEEE Trans. Inf. Theory (2010)
Keyphrases
</>
network coding
intermediate nodes
wireless networks
network layer
peer to peer
shortest path
network structure
network bandwidth