55
Views
0
CrossRef citations to date
0
Altmetric
Articles

Clique-based Network Coding Technique

, &

REFERENCES

  • S. Leu, and R. -S. Chang, “A weight-value algorithm for finding connected dominating sets in a MANET,” J. Netw. Comput. Appl., Vol. 35, pp. 1615–9, Apr. 2012.
  • N. Wang, J. Dai, D. Li, and M. Li, “An approximation algorithm for connected dominating set in wireless ad hoc network,” in IET International Conference on Information and Science and Control Engineering, Shenzhen, 2012, pp. 3.77–3.77.
  • J. Chen, K. He, R. Du, M. Zheng, and Y. Xiang, “Dominating set and network coding-based routing in wireless mesh networks,” IEEE Trans Parallel Distrib. Syst., Vol. 26, no. 2, Feb. 2015, pp. 106.
  • R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung, “Network information flow,” IEEE Trans. Inf. Theory, Vol. 46, no. 4, pp. 1204–16, July 2000.
  • S. Li, R. Yeung, and N. Cai, “Linear network coding,” IEEE Trans Inf. Theory, Vol. 49, no. 2, pp. 371–81, Feb. 2009.
  • S. Sengupta, S. Rayanchu, and S. Banerjee, “An analysis of wireless network coding for unicast sessions: The case for coding-aware routing,” in Proceedings of the IEEE INFOCOM, UK, May 2010, pp. 1028–36.
  • S. Katti, D. Katabi, W. Hu, H. Rahul, and M. Medard, “The importance of being opportunistic: Practical network coding for wireless environments,” presented at the Proceedings of the 43rd Annual Allerton Conference on Communication, Canada, 2009.
  • M. Tan, R. W. Yeung, S. T. Ho, and N. Cai, “A unified framework for linear network coding,” IEEE Trans. Inf. Theory, Vol. 57, no. 1, pp. 416–23, Jan. 2011.
  • S. Kaur, “Intelligence in wireless networks with cognitive radio networks,” IETE Tech. Rev., Vol. 30, no. 1, pp. 6–11, 2013.
  • R. Koetter and M. Medard, “An algebraic approach to network coding,” IEEE Trans Netw., Vol. 11, no. 5, pp. 782–95, Oct. 2009.
  • P. Sanders, S. Egner, and L. Tolhuizen, “Polynomial time algorithms for network information flow,” presented at the Proceedings of the Fifteenth Annual ACM Symposium on Parallel Algorithms and Architectures, California, 2010.
  • S. M. S. Yazdi, S. A. Savari, and G. Kramer, “Network coding in no deconstrained line and star networks,” IEEE Trans. Inf. Theory, Vol. 57, no. 7, pp. 4452–8, July 2011.
  • P. S. Pandey, and N. Purohit, “A scheme for improving the performance of network coding technique,” presented at the IEEE 8th International Conference on Advanced Networks and Telecommunications Systems (ANTS), India, Dec. 2014.
  • S.-Y. R. Li and Q. T. Sun, “Network coding theory via commutative algebra,” IEEE Trans. Inf. Theory, Vol. 57, no. 1, pp. 403–15, Jan. 2013.
  • J. Yu, N. Wang, and G. Wang, “Heuristic algorithms for constructing connected dominating sets with minimum size and bounded diameter in wireless networks,” in LNCS, Vol. 48. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 11–20.
  • B. Han, “Zone-based virtual backbone formation in wireless ad hoc networks,” J. Ad Hoc Netw., Vol. 7, pp. 183–200, Aug. 2009.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.