A PHP Error was encountered

Severity: Warning

Message: Creating default object from empty value

Filename: gettext/gettext.inc

Line Number: 195

A PHP Error was encountered

Severity: Warning

Message: Creating default object from empty value

Filename: libraries/keyword_db.php

Line Number: 30

A PHP Error was encountered

Severity: Warning

Message: Creating default object from empty value

Filename: libraries/keyword_db.php

Line Number: 30

A PHP Error was encountered

Severity: Warning

Message: Creating default object from empty value

Filename: libraries/keyword_db.php

Line Number: 30

A PHP Error was encountered

Severity: Warning

Message: Creating default object from empty value

Filename: libraries/keyword_db.php

Line Number: 30

A PHP Error was encountered

Severity: Warning

Message: Creating default object from empty value

Filename: libraries/keyword_db.php

Line Number: 30

A PHP Error was encountered

Severity: Warning

Message: Creating default object from empty value

Filename: libraries/keyword_db.php

Line Number: 30

%Aigaion2 BibTeX export from ARNI Bibliographic Database %Saturday 27 May 2017 12:33:23 AM @INPROCEEDINGS{5206041, author = {Jafari Siavoshani, Mahdi and Keller, Lorenzo and Argyraki, Katerina and Fragouli, Christina}, keywords = {data compression, intermediate network node, linear codes, linear combination, subspace coding, vectorscompressed network coding vector}, month = {28 2009-July 3}, title = {Compressed network coding vectors}, booktitle = {Information Theory, 2009. ISIT 2009. IEEE International Symposium on}, year = {2009}, pages = {109-113}, doi = {10.1109/isit.2009.5206041}, abstract = {In networks that employ network coding, two main approaches have been proposed in the literature to allow the receivers to recover the source information: (i) use of coding vectors, that keep track of the linear combinations the received packets contain, and (ii) subspace coding, that dispenses of the need to know the linear combinations, since information is conveyed from the choice of subspaces alone. Both these approaches impose the strong requirement that all source packets get potentially combined. We here present a third approach that relaxes this assumption, and is thus not a special case from either of the previous two. This relaxation allows to employ compressed coding vectors to efficiently convey the coding coefficients, without altering the operation of intermediate network nodes. We develop optimal designs for such vectors.} }