2015 International Symposium on Network Coding (NetCod)最新文献

筛选
英文 中文
Towards unconditional tor-like anonymity 走向无条件的tor式匿名
2015 International Symposium on Network Coding (NetCod) Pub Date : 2015-06-22 DOI: 10.1109/NETCOD.2015.7176791
I. Safaka, László Czap, K. Argyraki, C. Fragouli
{"title":"Towards unconditional tor-like anonymity","authors":"I. Safaka, László Czap, K. Argyraki, C. Fragouli","doi":"10.1109/NETCOD.2015.7176791","DOIUrl":"https://doi.org/10.1109/NETCOD.2015.7176791","url":null,"abstract":"We design and evaluate a traffic anonymization protocol for wireless networks, aiming to protect against computationally powerful adversaries. Our protocol builds on recent key-generation techniques, that leverage intrinsic properties of the wireless together with standard coding techniques. We show how to exploit the security properties of such keys to design a Tor-like anonymity network, without making any assumptions about the computational capabilities of an adversary. Our analysis and evaluation on simulated ad-hoc wireless networks, shows that our protocol achieves a level of anonymity comparable to the level of the Tor network.","PeriodicalId":129376,"journal":{"name":"2015 International Symposium on Network Coding (NetCod)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Index coding over correlated sources 对相关源进行索引编码
2015 International Symposium on Network Coding (NetCod) Pub Date : 2015-06-22 DOI: 10.1109/NETCOD.2015.7176785
S. Miyake, J. Muramatsu
{"title":"Index coding over correlated sources","authors":"S. Miyake, J. Muramatsu","doi":"10.1109/NETCOD.2015.7176785","DOIUrl":"https://doi.org/10.1109/NETCOD.2015.7176785","url":null,"abstract":"One of the promising architectures for the next generation of content distribution networks is the “cache network”, where each node has cache or local storage.We consider the index coding problem, where a central content server disseminates compressed multiple content data to each client that recovers the target content using the cached content, as side information. The coding scheme discussed in this paper is proposed under the condition that there is some correlation between multiple contents, and the scheme is shown to be optimal when the content is less than or equal to three. We believe the sum-product algorithm or linear programming can be used to implement an efficient code by constructing the proposed code using sparse matrices.","PeriodicalId":129376,"journal":{"name":"2015 International Symposium on Network Coding (NetCod)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124366321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On adaptive (functional MSR code based) distributed storage systems 基于功能MSR代码的自适应分布式存储系统
2015 International Symposium on Network Coding (NetCod) Pub Date : 2015-06-22 DOI: 10.1109/NETCOD.2015.7176787
B. K. Rai
{"title":"On adaptive (functional MSR code based) distributed storage systems","authors":"B. K. Rai","doi":"10.1109/NETCOD.2015.7176787","DOIUrl":"https://doi.org/10.1109/NETCOD.2015.7176787","url":null,"abstract":"Suppose that a data storage service provider implements a functional MSR code based distributed storage system (DSS). Consider a scenario where the service provider has implemented an (n<sub>1</sub>, k<sub>1</sub>, B, d<sub>1</sub>, t<sub>1</sub>) functional MSR code based DSS, where B is the file that is stored. At a later point of time, due to certain considerations (such as storage cost, download bandwidth to repair failed nodes etc.), the service provider wants to convert this (n<sub>1</sub>, k<sub>1</sub>, B, d<sub>1</sub>, t<sub>1</sub>) functional MSR code based DSS to an (n<sub>2</sub>, k<sub>2</sub>, B, d<sub>2</sub>, t<sub>2</sub>) functional MSR code based DSS. The service provider wants to perform this conversion at the lowest possible cost, i.e., by downloading the minimum amount of data. The question is: How should one design an (n<sub>1</sub>, k<sub>1</sub>, B, d<sub>1</sub>, t<sub>1</sub>) functional MSR code based DSS so that it requires minimum download to convert the DSS to an (n<sub>2</sub>, k<sub>2</sub>, B, d<sub>2</sub>, t<sub>2</sub>) functional MSR code based DSS? In this paper, we propose a coding scheme which requires the minimum download while converting an (n<sub>1</sub>, k<sub>1</sub>, B, d<sub>1</sub>, t<sub>1</sub>) functional MSR code based DSS to an (n<sub>2</sub>, k<sub>2</sub>, B, d<sub>2</sub>, t<sub>2</sub>) functional MSR code based DSS.","PeriodicalId":129376,"journal":{"name":"2015 International Symposium on Network Coding (NetCod)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124944645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploiting symmetry in computing polyhedral bounds on network coding rate regions 利用对称性计算网络编码率区域的多面体边界
2015 International Symposium on Network Coding (NetCod) Pub Date : 2015-06-22 DOI: 10.1109/NETCOD.2015.7176793
Jayant Apte, J. Walsh
{"title":"Exploiting symmetry in computing polyhedral bounds on network coding rate regions","authors":"Jayant Apte, J. Walsh","doi":"10.1109/NETCOD.2015.7176793","DOIUrl":"https://doi.org/10.1109/NETCOD.2015.7176793","url":null,"abstract":"We propose an algorithm for computing polyhedral bounds on the rate regions of multi-source multi-sink network coding instances given the knowledge of symmetries of the instance as captured by the network symmetry group. We show how the network symmetry group can be interpreted as a group of symmetries of a polyhedron, which in turn enables the use techniques for exploiting symmetry in polyhedral computation to reduce the complexity of calculating the rate region. We apply these techniques to the polyhedral projection algorithm chm to list only those facets and extreme points of a polyhedral bound on rate region that are inequivalent under the action of the network symmetry group. Additionally, a generalization of this algorithm that can exploit richer super-groups of polyhedral symmetries, the restricted affine symmetry groups, is discussed.","PeriodicalId":129376,"journal":{"name":"2015 International Symposium on Network Coding (NetCod)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117181543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Computer aided proofs for rate regions of independent distributed source coding problems 独立分布式源编码问题的率域计算机辅助证明
2015 International Symposium on Network Coding (NetCod) Pub Date : 2015-06-22 DOI: 10.1109/NETCOD.2015.7176794
Congduan Li, S. Weber, J. Walsh
{"title":"Computer aided proofs for rate regions of independent distributed source coding problems","authors":"Congduan Li, S. Weber, J. Walsh","doi":"10.1109/NETCOD.2015.7176794","DOIUrl":"https://doi.org/10.1109/NETCOD.2015.7176794","url":null,"abstract":"The rate regions of independent distributed source coding (IDSC) problems, a sub-class of the broader family of multi-source multi-sink networks, are investigated. An IDSC problem consists of multiple sources, multiple encoders, and multiple decoders, where each encoder has access to all sources, and each decoder has access to a certain subset of the encoders and demands a certain subset of the sources. Instead of manually deriving the rate region for a particular problem, computer tools are used to obtain the rate regions for hundreds of nonisomorphic (symmetry-removed) IDSC instances. A method for enumerating all non-isomorphic IDSC instances of a particular size is given. For each non-isomorphic IDSC instance, the Shannon outer bound, superposition coding inner bound, and several achievable inner bounds based on linear codes, are considered and calculated. For all of the hundreds of IDSC instances considered, vector binary inner bounds match the Shannon outer bound, and hence, exact rate regions are proven together with code constructions that achieve them.","PeriodicalId":129376,"journal":{"name":"2015 International Symposium on Network Coding (NetCod)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115335394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Benchmarking the performance of hadoop triple replication and erasure coding on a nation-wide distributed cloud 在全国分布式云上对hadoop三重复制和擦除编码的性能进行基准测试
2015 International Symposium on Network Coding (NetCod) Pub Date : 2015-06-22 DOI: 10.1109/NETCOD.2015.7176790
Lakshmi J. Mohan, Renji Luke Harold, Pablo Ignacio Serrano Caneleo, P. Udaya, A. Harwood
{"title":"Benchmarking the performance of hadoop triple replication and erasure coding on a nation-wide distributed cloud","authors":"Lakshmi J. Mohan, Renji Luke Harold, Pablo Ignacio Serrano Caneleo, P. Udaya, A. Harwood","doi":"10.1109/NETCOD.2015.7176790","DOIUrl":"https://doi.org/10.1109/NETCOD.2015.7176790","url":null,"abstract":"Large Scale distributed storage systems play a vital role in maintaining data across storage locations globally. These systems use replication as the default mechanism for providing fault-tolerance. Recently, erasure codes are being used as a viable alternative to replication, since they provide the same fault-tolerance for reduced storage overhead. However, their performance is unclear in a geographically diverse distributed storage system. This paper compares the performance of triple replication with the erasure coding (Reed-Solomon codes) used in Apache Hadoop's implementation of a distributed file system, on a cluster distributed across Australia that runs on the NeCTAR research cloud. Our results show that using erasure coding does not degrade the read performance in such a setting. We also compare the Hadoop's code with a local reconstruction code, implemented in the XORBAS version of Hadoop. These codes perform well in our clusters but the performance gain observed in our results does not conform to the results reported. Hence, we need new codes that perform better, addressing the geographical diversity issue. We believe that our framework is readily usable to test a range of novel erasure codes that are being introduced in the literature.","PeriodicalId":129376,"journal":{"name":"2015 International Symposium on Network Coding (NetCod)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Adaptive suppression of inter-packet delay variations in coded packet networks 编码分组网络中包间时延变化的自适应抑制
2015 International Symposium on Network Coding (NetCod) Pub Date : 2015-06-22 DOI: 10.1109/NETCOD.2015.7176781
Martin E. Jobst, Stephan M. Günther, Maximilian Riemensberger, G. Carle, W. Utschick
{"title":"Adaptive suppression of inter-packet delay variations in coded packet networks","authors":"Martin E. Jobst, Stephan M. Günther, Maximilian Riemensberger, G. Carle, W. Utschick","doi":"10.1109/NETCOD.2015.7176781","DOIUrl":"https://doi.org/10.1109/NETCOD.2015.7176781","url":null,"abstract":"Network coding tends to increase not only the end-to-end delay due to unavoidable buffering of packets, but it also increases the inter-packet delay variations (jitter) due to batching. While an increase in delay does not necessarily adversely affect throughput, sudden delay spikes may interfere with TCP's congestion avoidance mechanism. Such spikes are a common phenomenon in coded packet networks since packet loss may prevent the receiver from decoding a whole generation until sufficient redundant packets have arrived. After successful decoding, a burst of packets is forwarded. In this paper, we propose an adaptive queueing-based approach to minimize the inter-packet delay variation by dynamically delaying decoded packets at the receiver side depending on the current suppression queue backlog, average delay, and packet loss rate. We evaluate our approach by measuring TCP throughput on top of an RLNC system over a lossy wireless link. The TCP throughput significantly improves when our proposed method is used for interpacket delay variation suppression. The method is implemented as a lightweight library and will be made available for download under the GNU GPLv2 at [1].","PeriodicalId":129376,"journal":{"name":"2015 International Symposium on Network Coding (NetCod)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122592537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network coding for data-retrieving in cloud storage systems 云存储系统数据检索的网络编码
2015 International Symposium on Network Coding (NetCod) Pub Date : 2015-06-22 DOI: 10.1109/NETCOD.2015.7176788
Yanbo Lu, Jie Hao, Xinji Liu, Shutao Xia
{"title":"Network coding for data-retrieving in cloud storage systems","authors":"Yanbo Lu, Jie Hao, Xinji Liu, Shutao Xia","doi":"10.1109/NETCOD.2015.7176788","DOIUrl":"https://doi.org/10.1109/NETCOD.2015.7176788","url":null,"abstract":"As the rapid growth of data, many storage systems have used erasure codes instead of replication to reduce the storage cost under the same level of reliability. Maximum-Distance- Separable (MDS) codes have been the most widely adopted, due to their optimal storage efficiency. It is well understood that the application of codes in storage systems, where the data is less frequently accessed. For the data, which is stored in cloud storage systems, is frequently accessed (or so-called “hot data”), the performance of data-retrieving is the key metric. To the best of our knowledge, there has been only a little work on the performance of data-retrieving in cloud storage systems with erasure codes. They combined queuing theory with coding theory to analyze and optimize the effect of MDS codes in the performance of data-retrieving. Their studies were based on MDS codes and they gave the solutions. In this paper, we transfer the perspective of study of based on MDS codes to that of optimizing MDS codes in order to improve the performance of data-retrieving, that is, from optimizing the system retrieving strategies to optimizing the coding schemes. We apply Network Coding to optimize the coding schemes and propose a new family of MDS codes, which reach optimal performance of data-retrieving in theory.","PeriodicalId":129376,"journal":{"name":"2015 International Symposium on Network Coding (NetCod)","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133511325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On the fundamental limits of coded caching and exact-repair regenerating codes 关于编码缓存和精确修复再生代码的基本限制
2015 International Symposium on Network Coding (NetCod) Pub Date : 2015-06-22 DOI: 10.1109/NETCOD.2015.7176789
C. Tian
{"title":"On the fundamental limits of coded caching and exact-repair regenerating codes","authors":"C. Tian","doi":"10.1109/NETCOD.2015.7176789","DOIUrl":"https://doi.org/10.1109/NETCOD.2015.7176789","url":null,"abstract":"The fundamental limits are investigated for (i) the problem of coded caching with N = 3 files and K = 3 users, and (ii) the problem of (5; 4; 4) exact-repair regenerating codes, i.e., there are n = 5 storage nodes where any k = 4 nodes can be used to recover the data, and any failed node can be repaired with d = 4 other nodes. A computational approach is adopted in this investigation which was developed by the author in an earlier work. For the first problem, an improved outer bound to the memory-delivery-rate tradeoff is obtained. For the second problem, a complete characterization of the storage-repair-bandwidth is provided. These results are part of the online collection of “Solutions of Computed Information Theoretic Limits (SCITL)”.","PeriodicalId":129376,"journal":{"name":"2015 International Symposium on Network Coding (NetCod)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124185885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A hybrid EF/DF protocol with rateless coded network code for two-way relay channel 用于双向中继信道的无速率编码网络码混合EF/DF协议
2015 International Symposium on Network Coding (NetCod) Pub Date : 2015-06-22 DOI: 10.1109/NETCOD.2015.7176796
Dai Jia, Shuang Tian, Jinhong Yuan, Zesong Fei, Jingming Kuang
{"title":"A hybrid EF/DF protocol with rateless coded network code for two-way relay channel","authors":"Dai Jia, Shuang Tian, Jinhong Yuan, Zesong Fei, Jingming Kuang","doi":"10.1109/NETCOD.2015.7176796","DOIUrl":"https://doi.org/10.1109/NETCOD.2015.7176796","url":null,"abstract":"In this paper, we investigate a rateless code design for a two-way relay channel (TWRC) where a network coding operation is employed at the relay. Rateless codes are used at both two users and the relay nodes as it can cope with various channel conditions. We propose a hybrid estimate and forward (EF)/decode and forward (DF) protocol with rateless codes for the TWRC. In the proposed scheme, the relay uses a joint belief propagation (BP) decoding process to decode the messages of two users. Depending on whether the relay recovers both users' messages, only one user's message or no users' messages, the relay will generate three different types of signals, namely, network code (NC), soft network code (SNC) or soft physical-layer network code (SPNC), respectively. We design the degree distribution of the rateless codes for the three nodes of the TWRC, to make it suitable not only for decoding at two users at high SNR, but also for decoding at the relay at low SNR. We show that the proposed hybrid EF/DF protocol with the designed rateless codes outperforms other schemes significantly in terms of bit error rate (BER) performance.","PeriodicalId":129376,"journal":{"name":"2015 International Symposium on Network Coding (NetCod)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132789865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信