2014 International Symposium on Network Coding (NetCod) 2014
DOI: 10.1109/netcod.2014.6892124
|View full text |Cite
|
Sign up to set email alerts
|

Panda: A protocol-assisted network decoding algorithm

Abstract: With random linear network coding, mixed packets contain in their headers information about the coding operations performed on the original packets to allow their recovery by the receiver. This introduces an overhead that could be significant if the packet size is relatively small w.r.t. the size of the generation. In this paper, we propose to remove the part of the added header related to the network coding coefficients and to consider network decoding as a source separation problem. This problem is addressed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…ICA can still be used over a finite field F q [18,19] by minimizing the marginal entropy of the estimated sources. In previous work, we have proposed different techniques that exploit ICA over finite fields in the context of NC: in [20], network-coded packets without encoding vectors are decoded using entropy minimization jointly with channel encoding, while in [21], we exploit the redundancy introduced by communication protocols to assist the receiver in decoding, via the solution of a maximum a posteriori (MAP) estimation problem.…”
Section: Related Workmentioning
confidence: 99%
“…ICA can still be used over a finite field F q [18,19] by minimizing the marginal entropy of the estimated sources. In previous work, we have proposed different techniques that exploit ICA over finite fields in the context of NC: in [20], network-coded packets without encoding vectors are decoded using entropy minimization jointly with channel encoding, while in [21], we exploit the redundancy introduced by communication protocols to assist the receiver in decoding, via the solution of a maximum a posteriori (MAP) estimation problem.…”
Section: Related Workmentioning
confidence: 99%