Login / Signup

Robust network coding in the presence of untrusted nodes.

Da WangDanilo SilvaFrank R. Kschischang
Published in: IEEE Trans. Inf. Theory (2010)
Keyphrases
  • network coding
  • intermediate nodes
  • wireless networks
  • network layer
  • peer to peer
  • shortest path
  • network structure
  • network bandwidth