Security Enhancement via Dynamic Fountain Code for Wireless Multicast
暂无分享,去创建一个
Houbing Song | Qinghe Du | Wanyu Li | Houbing Song | Qinghe Du | W. Li
[1] Zhi-Zhong Chen,et al. A 3.4713-approximation algorithm for the capacitated multicast tree routing problem , 2009, Theor. Comput. Sci..
[2] Qinghe Du,et al. Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams , 2010, IEEE Journal on Selected Areas in Communications.
[3] Li Sun,et al. Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Informatics.
[4] Song Guo,et al. Utility Based Data Computing Scheme to Provide Sensing Service in Internet of Things , 2019, IEEE Transactions on Emerging Topics in Computing.
[5] John Zahorjan,et al. The challenges of mobile computing , 1994, Computer.
[6] Randy Goebel,et al. Size-constrained tree partitioning: Approximating the multicast k-tree routing problem , 2011, Theor. Comput. Sci..
[7] Xi Liu,et al. Fountain codes over fading relay channels , 2009, IEEE Transactions on Wireless Communications.
[8] Qinghe Du,et al. Adaptive Low-Complexity Erasure-Correcting Code-Based Protocols for QoS-Driven Mobile Multicast Services Over Wireless Networks , 2006, IEEE Trans. Veh. Technol..
[9] Georgios B. Giannakis,et al. Queuing with adaptive modulation and coding over wireless links: cross-Layer analysis and design , 2005, IEEE Transactions on Wireless Communications.
[10] Michael Mitzenmacher,et al. A digital fountain approach to asynchronous reliable multicast , 2002, IEEE J. Sel. Areas Commun..
[11] Song Guo,et al. A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Vehicular Technology.
[12] Li Sun,et al. Security enhancement for video transmission via noise aggregation in immersive systems , 2015, Multimedia Tools and Applications.
[13] Georgios B. Giannakis,et al. Cross-Layer combining of adaptive Modulation and coding with truncated ARQ over wireless links , 2004, IEEE Transactions on Wireless Communications.
[14] Li Sun,et al. Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.
[15] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[16] Jianzhong Li,et al. Capacity of wireless networks with multiple types of multicast sessions , 2014, MobiHoc '14.
[17] Guohui Lin,et al. Improved Approximation Algorithms for the Capacitated Multicast Routing Problem , 2005, COCOON.