default search action
Tracey Ho
Person information
- affiliation: California Institute of Technology, Pasadena, Computer Science and Electrical Engineering
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j24]Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding. IEEE Trans. Inf. Theory 64(6): 4496-4512 (2018) - 2016
- [i35]Shirin Jalali, Michelle Effros, Tracey Ho:
On the Impact of a Single Edge on the Network Coding Capacity. CoRR abs/1607.06793 (2016) - 2015
- [j23]Virgil Griffith, Tracey Ho:
Quantifying Redundant Information in Predicting a Target Random Variable. Entropy 17(7): 4644-4653 (2015) - [c86]Yunkai Wei, Yuming Mao, Supeng Leng, Tracey Ho:
Priority-Based Real-Time Stream Coding under Burst Erasures. GLOBECOM 2015: 1-7 - [c85]Edmund M. Yeh, Tracey Ho, Ying Cui, Michael Burd, Ran Liu, Derek Leong:
VIP: Joint traffic engineering and caching in Named Data Networks. ICNC 2015: 695-699 - 2014
- [j22]Andrew Newell, Hongyi Yao, Alex Ryker, Tracey Ho, Cristina Nita-Rotaru:
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols. ACM Comput. Surv. 47(2): 24:1-24:34 (2014) - [j21]Xiaoli Xu, Yong Zeng, Yong Liang Guan, Tracey Ho:
An Achievable Region for Double-Unicast Networks With Linear Network Coding. IEEE Trans. Commun. 62(10): 3621-3630 (2014) - [j20]Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle Effros:
On the Delay Advantage of Coding in Packet Erasure Networks. IEEE Trans. Inf. Theory 60(5): 2868-2883 (2014) - [j19]Cristina Carbunaru, Yong Meng Teo, Ben Leong, Tracey Ho:
Modeling Flash Crowd Performance in Peer-to-Peer File Distribution. IEEE Trans. Parallel Distributed Syst. 25(10): 2617-2626 (2014) - [c84]Edmund M. Yeh, Tracey Ho, Ying Cui, Michael Burd, Ran Liu, Derek Leong:
VIP: a framework for joint dynamic forwarding and caching in named data networks. ICN 2014: 117-126 - [c83]Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
Single-source/sink network error correction is as hard as multiple-unicast. Allerton 2014: 423-430 - [c82]Anoosheh Heidarzadeh, Shiyu Zhao, Tracey Ho, Michelle Effros:
Efficient pooling against strategic adversary with applications in anonymous and reliable networking. Allerton 2014: 1317-1324 - [c81]Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
Reverse edge cut-set bounds for secure network coding. ISIT 2014: 106-110 - [c80]Wael Halbawi, Tracey Ho, Hongyi Yao, Iwan M. Duursma:
Distributed reed-solomon codes for simple multiple access networks. ISIT 2014: 651-655 - [c79]Parham Noorzad, Michelle Effros, Michael Langberg, Tracey Ho:
On the power of cooperation: Can a little help a lot? ISIT 2014: 3132-3136 - [c78]Wael Halbawi, Tracey Ho, Iwan M. Duursma:
Distributed gabidulin codes for multiple-source network error correction. NetCod 2014: 1-6 - [i34]Parham Noorzad, Michelle Effros, Michael Langberg, Tracey Ho:
On the Power of Cooperation: Can a Little Help a Lot? (Extended Version). CoRR abs/1401.6498 (2014) - [i33]Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
Reverse Edge Cut-Set Bounds for Secure Network Coding. CoRR abs/1401.7085 (2014) - [i32]Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast. CoRR abs/1410.1905 (2014) - [i31]Virgil Griffith, Tracey Ho:
Quantifying Redundant Information in Predicting a Target Random Variable. CoRR abs/1411.4732 (2014) - 2013
- [j18]Tao Cui, Tracey Ho, Jörg Kliewer:
On Secure Network Coding With Nonuniform or Restricted Wiretap Sets. IEEE Trans. Inf. Theory 59(1): 166-176 (2013) - [c77]Zhao Li, Tracey Ho, Derek Leong, Hongyi Yao:
Distributed storage allocation for heterogeneous systems. Allerton 2013: 320-326 - [c76]Yunkai Wei, Tracey Ho:
On prioritized coding for real-time streaming under packet erasures. Allerton 2013: 327-334 - [c75]Hari Ravi, Anoosheh Heidarzadeh, Tracey Ho:
Practical improvements to bus-based strategies for reliable anonymous networking. GlobalSIP 2013: 265-268 - [c74]Wentao Huang, Tracey Ho, Hongyi Yao, Sidharth Jaggi:
Rateless resilient network coding against byzantine adversaries. INFOCOM 2013: 265-269 - [c73]Yi-Hsuan Kao, Alexandros G. Dimakis, Derek Leong, Tracey Ho:
Distributed storage allocations and a hypergraph conjecture of Erdős. ISIT 2013: 902-906 - [c72]Derek Leong, Asma Qureshi, Tracey Ho:
On coding for real-time streaming under packet erasures. ISIT 2013: 1012-1016 - [c71]Batuhan Karagöz, Semih Yavuz, Tracey Ho, Michelle Effros:
Capacity region of multi-resolution streaming in peer-to-peer networks. ITW 2013: 1-5 - [c70]Pak Hou Che, Minghua Chen, Tracey Ho, Sidharth Jaggi, Michael Langberg:
Routing for security in networks with adversarial nodes. NetCod 2013: 1-6 - [c69]Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
On secure network coding with uniform wiretap sets. NetCod 2013: 1-6 - [i30]Wentao Huang, Tracey Ho, Hongyi Yao, Sidharth Jaggi:
Rateless Resilient Network Coding Against Byzantine Adversaries. CoRR abs/1301.2860 (2013) - [i29]Pak Hou Che, Minghua Chen, Tracey Ho, Sidharth Jaggi, Michael Langberg:
Routing for Security in Networks with Adversarial Nodes. CoRR abs/1303.0141 (2013) - [i28]Batuhan Karagöz, Semih Yavuz, Tracey Ho, Michelle Effros:
Multi-Resolution Video Streaming in Peer-to-peer Networks. CoRR abs/1304.1858 (2013) - [i27]Wael Halbawi, Tracey Ho, Hongyi Yao, Iwan M. Duursma:
Distributed Reed-Solomon Codes for Simple Multiple Access Networks. CoRR abs/1310.5187 (2013) - [i26]Edmund M. Yeh, Tracey Ho, Michael Burd, Ying Cui, Derek Leong:
VIP: A Framework for Joint Dynamic Forwarding and Caching in Named Data Networks. CoRR abs/1310.5569 (2013) - [i25]Yanbo Yang, Tracey Ho, Wentao Huang:
Network error correction with limited feedback capacity. CoRR abs/1312.3823 (2013) - 2012
- [j17]Tao Cui, Lijun Chen, Tracey Ho:
Distributed Distortion Optimization for Correlated Sources with Network Coding. IEEE Trans. Commun. 60(5): 1336-1344 (2012) - [j16]Tao Cui, Jörg Kliewer, Tracey Ho:
Communication Protocols for N-way All-Cast Relay Networks. IEEE Trans. Commun. 60(11): 3239-3251 (2012) - [j15]Derek Leong, Alexandros G. Dimakis, Tracey Ho:
Distributed Storage Allocations. IEEE Trans. Inf. Theory 58(7): 4733-4752 (2012) - [j14]Lijun Chen, Tracey Ho, Mung Chiang, Steven H. Low, John C. Doyle:
Congestion Control for Multicast Flows With Network Coding. IEEE Trans. Inf. Theory 58(9): 5908-5921 (2012) - [c68]Christopher S. Chang, Tracey Ho, Michelle Effros:
Peer-to-peer anonymous networking using coding. Allerton Conference 2012: 525-532 - [c67]Theodoros K. Dikaliotis, Hongyi Yao, Tracey Ho, Michelle Effros, Jörg Kliewer:
Network equivalence in the presence of an eavesdropper. Allerton Conference 2012: 960-967 - [c66]Derek Leong, Tracey Ho:
Erasure coding for real-time streaming. ISIT 2012: 289-293 - [c65]Ömer Faruk Tekin, Tracey Ho, Hongyi Yao, Sidharth Jaggi:
On erasure correction coding for streaming. ITA 2012: 221-226 - [i24]Xiaoli Xu, Yong Zeng, Yong Liang Guan, Tracey Ho:
Detailed Steps of the Fourier-Motzkin Elimination. CoRR abs/1207.1512 (2012) - [i23]Xiaoli Xu, Yong Zeng, Yong Liang Guan, Tracey Ho:
On the Capacity Region of Two-User Linear Deterministic Interference Channel and Its Application to Multi-Session Network Coding. CoRR abs/1207.1986 (2012) - [i22]Derek Leong, Tracey Ho:
Erasure Coding for Real-Time Streaming. CoRR abs/1207.3582 (2012) - [i21]Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:
On secure network coding with uniform wiretap sets. CoRR abs/1208.4390 (2012) - [i20]Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle Effros:
On the Delay Advantage of Coding in Packet Erasure Networks. CoRR abs/1211.3174 (2012) - [i19]Theodoros K. Dikaliotis, Hongyi Yao, Tracey Ho, Michelle Effros, Jörg Kliewer:
Network Equivalence in the Presence of an Eavesdropper. CoRR abs/1211.4081 (2012) - [i18]Shirin Jalali, Tracey Ho:
On Capacity Region of Wiretap Networks. CoRR abs/1212.3859 (2012) - 2011
- [j13]Theodoros K. Dikaliotis, Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Hongyi Yao, Michelle Effros, Jörg Kliewer, Elona Erez:
Multiple-Access Network Information-Flow and Correction Codes. IEEE Trans. Inf. Theory 57(2): 1067-1079 (2011) - [j12]Sukwon Kim, Tracey Ho, Michelle Effros, Amir Salman Avestimehr:
Network Error Correction With Unequal Link Capacities. IEEE Trans. Inf. Theory 57(2): 1144-1164 (2011) - [c64]Hongyi Yao, Tracey Ho, Cristina Nita-Rotaru:
Key agreement for wireless networks in the presence of active adversaries. ACSCC 2011: 792-796 - [c63]Ömer Faruk Tekin, Svitlana Vyetrenko, Tracey Ho, Hongyi Yao:
Erasure correction for nested receivers. Allerton 2011: 1454-1461 - [c62]Hongyi Yao, Tracey Ho:
Privacy preserving data aggregating with multiple access channel. Allerton 2011: 1809-1815 - [c61]Hongyi Yao, Tracey Ho:
Error Estimating Codes with Constant Overhead: A Random Walk Approach. ICC 2011: 1-5 - [c60]Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lingxiao Xia:
Universal and robust distributed network codes. INFOCOM 2011: 766-774 - [c59]Hongyi Yao, Tracey Ho, Michelle Effros:
On the equivalence of Shannon capacity and stable capacity in networks with memoryless channels. ISIT 2011: 503-507 - [c58]Mayank Bakshi, Michelle Effros, Tracey Ho:
On equivalence for networks of noisy channels under byzantine attacks. ISIT 2011: 973-977 - [c57]Derek Leong, Alexandros G. Dimakis, Tracey Ho:
Distributed storage allocations for optimal delay. ISIT 2011: 1447-1451 - [c56]Tracey Ho, Sukwon Kim, Yanbo Yang, Michelle Effros, Amir Salman Avestimehr:
On network error correction with limited feedback capacity. ITA 2011: 160-162 - [c55]Shirin Jalali, Michelle Effros, Tracey Ho:
On the impact of a single edge on the network coding capacity. ITA 2011: 196-200 - [i17]Theodoros K. Dikaliotis, Hongyi Yao, Amir Salman Avestimehr, Sidharth Jaggi, Tracey Ho:
Low-Complexity Near-Optimal Codes for Gaussian Relay Networks. CoRR abs/1102.5138 (2011) - [i16]Derek Leong, Alexandros G. Dimakis, Tracey Ho:
Distributed Storage Allocations for Optimal Delay. CoRR abs/1106.2581 (2011) - 2010
- [j11]Li Zhang, Tao Cui, Tracey Ho, Xian-Da Zhang:
Power scheduling of distributed estimation in sensor networks with repetition coding. Signal Process. 90(3): 946-951 (2010) - [j10]Tao Cui, Lijun Chen, Tracey Ho:
On distributed scheduling in wireless networks exploiting broadcast and network coding. IEEE Trans. Commun. 58(4): 1223-1234 (2010) - [c54]Tracey Ho, Michelle Effros, Shirin Jalali:
On equivalence between network topologies. Allerton 2010: 391-398 - [c53]Svitlana Vyetrenko, Tracey Ho, Theodoros K. Dikaliotis:
Outer bounds on the error correction capacity region for non-multicast networks. Allerton 2010: 867-874 - [c52]Derek Leong, Alexandros G. Dimakis, Tracey Ho:
Symmetric Allocations for Distributed Storage. GLOBECOM 2010: 1-6 - [c51]Derek Leong, Alexandros G. Dimakis, Tracey Ho:
Distributed Storage Allocation for High Reliability. ICC 2010: 1-6 - [c50]Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho:
Security in distributed storage systems by communicating a logarithmic number of bits. ISIT 2010: 1948-1952 - [c49]Sukwon Kim, Tracey Ho, Michelle Effros, Amir Salman Avestimehr:
New results on network error correction: Capacities and upper bounds. ITA 2010: 184-193 - [c48]Tao Cui, Tracey Ho, Jörg Kliewer:
Achievable strategies for general secure network coding. ITA 2010: 223-228 - [c47]Tao Cui, Tracey Ho, Jörg Kliewer:
On secure network coding with unequal link capacities and restricted wiretapping sets. ITW 2010: 1-5 - [c46]Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle Effros:
On the delay advantage of coding in packet erasure networks. ITW 2010: 1-5 - [c45]Hongyi Yao, Theodoros K. Dikaliotis, Sidharth Jaggi, Tracey Ho:
Multi-source operator channels: Efficient capacity-achieving codes. ITW 2010: 1-5 - [c44]Ben Leong, Youming Wang, Su Wen, Cristina Carbunaru, Yong Meng Teo, Christopher S. Chang, Tracey Ho:
Improving peer-to-peer file distribution: winner doesn't have to take all. ApSys 2010: 55-60 - [i15]Hongyi Yao, Theodoros K. Dikaliotis, Sidharth Jaggi, Tracey Ho:
Multiple Access Network Information-flow And Correction codes. CoRR abs/1001.2603 (2010) - [i14]Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho:
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits. CoRR abs/1005.0426 (2010) - [i13]Derek Leong, Alexandros G. Dimakis, Tracey Ho:
Symmetric Allocations for Distributed Storage. CoRR abs/1007.5044 (2010) - [i12]Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lingxiao Xia:
Universal and Robust Distributed Network Codes. CoRR abs/1008.0045 (2010) - [i11]Michelle Effros, Tracey Ho, Shirin Jalali:
On Equivalence Between Network Topologies. CoRR abs/1010.0654 (2010) - [i10]Sukwon Kim, Tracey Ho, Michelle Effros, Amir Salman Avestimehr:
Network error correction with unequal link capacities. CoRR abs/1011.3870 (2010) - [i9]Derek Leong, Alexandros G. Dimakis, Tracey Ho:
Distributed Storage Allocations. CoRR abs/1011.5287 (2010) - [i8]Theodoros K. Dikaliotis, Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Hongyi Yao, Michelle Effros, Jörg Kliewer, Elona Erez:
Multiple-access Network Information-flow and Correction Codes. CoRR abs/1012.0112 (2010)
2000 – 2009
- 2009
- [j9]Tao Cui, Tracey Ho, Jörg Kliewer:
Memoryless relay strategies for two-way relay channels. IEEE Trans. Commun. 57(10): 3132-3143 (2009) - [j8]Tracey Ho, Harish Viswanathan:
Dynamic Algorithms for Multicast With Intra-Session Network Coding. IEEE Trans. Inf. Theory 55(2): 797-815 (2009) - [j7]Tao Cui, Feifei Gao, Tracey Ho, Arumugam Nallanathan:
Distributed Space-Time Coding for Two-Way Wireless Relay Networks. IEEE Trans. Signal Process. 57(2): 658-671 (2009) - [c43]Sukwon Kim, Tracey Ho, Michelle Effros, Salman Avestimehr:
Network error correction with unequal link capacities. Allerton 2009: 1387-1394 - [c42]Derek Leong, Tracey Ho, Rebecca Cathey:
Optimal content delivery with network coding. CISS 2009: 414-419 - [c41]Li Zhang, Tao Cui, Tracey Ho, Xian-Da Zhang:
Optimal quantization in energy-constrained sensor networks under imperfect transmission. CISS 2009: 613-617 - [c40]Li Zhang, Xian-Da Zhang, Tracey Ho, Theodoros K. Dikaliotis:
Progressive distributed estimation over noisy channels in wireless sensor networks. ICASSP 2009: 2221-2224 - [c39]Svitlana Vyetrenko, Tracey Ho, Elona Erez:
On noncoherent correction of network errors and erasures with random locations. ISIT 2009: 996-1000 - [c38]Svitlana Vyetrenko, Tracey Ho, Michelle Effros, Jörg Kliewer, Elona Erez:
Rate rRegions for coherent and noncoherent multisource network error correction. ISIT 2009: 1001-1005 - [c37]Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle Effros:
On the delay of network coding over line networks. ISIT 2009: 1408-1412 - [c36]Tao Cui, Tracey Ho:
On multiple access random medium access control. ISIT 2009: 1869-1873 - [c35]Tao Cui, Tracey Ho, Jörg Kliewer:
Achievable rate and optimal physical layer rate allocation in interference-free wireless networks. ISIT 2009: 2674-2678 - [c34]Amir Salman Avestimehr, Tracey Ho:
Approximate capacity of the symmetric half-duplex Gaussian butterfly network. ITW 2009: 311-315 - [i7]Tao Cui, Tracey Ho, Jörg Kliewer:
Achievable Rate and Optimal Physical Layer Rate Allocation in Interference-Free Wireless Networks. CoRR abs/0905.2718 (2009) - [i6]Daniel Cullina, Alexandros G. Dimakis, Tracey Ho:
Searching for Minimum Storage Regenerating Codes. CoRR abs/0910.2245 (2009) - [i5]Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle Effros:
On the Delay of Network Coding over Line Networks. CoRR abs/0910.3975 (2009) - [i4]Tao Cui, Tracey Ho, Jörg Kliewer:
On Secure Network Coding Over Networks With Unequal Link Capacities. CoRR abs/0911.0467 (2009) - 2008
- [b2]Tracey Ho, Desmond S. Lun:
Network Coding - an Introduction. Cambridge University Press 2008, ISBN 978-0-521-87310-9, pp. I-XI, 1-170 - [j6]Anthony Ephremides, Sidharth Jaggi, Tracey Ho, Brooke Shrader, Sae-Young Chung:
Network coding. J. Commun. Networks 10(4): 367-370 (2008) - [j5]Sidharth Jaggi, Michael Langberg, Sachin Katti, Tracey Ho, Dina Katabi, Muriel Médard, Michelle Effros:
Resilient Network Coding in the Presence of Byzantine Adversaries. IEEE Trans. Inf. Theory 54(6): 2596-2603 (2008) - [j4]Tracey Ho, Ben Leong, Ralf Koetter, Muriel Médard, Michelle Effros, David R. Karger:
Byzantine Modification Detection in Multicast Networks With Random Network Coding. IEEE Trans. Inf. Theory 54(6): 2798-2803 (2008) - [c33]Christopher S. Chang, Tracey Ho, Michelle Effros:
On robust network coding subgraph construction under uncertainty. ACSCC 2008: 2211-2215 - [c32]Sukwon Kim, Tracey Ho, Michelle Effros:
Network coding with periodic recomputation for minimum energy multicasting in mobile ad-hoc networks. Allerton 2008: 154-161 - [c31]Sukwon Kim, Michelle Effros, Tracey Ho:
Distributed design of network codes for wireless multiple unicasts. Allerton 2008: 324-331 - [c30]Elona Erez, Michelle Effros, Tracey Ho:
Network codes with deadlines. Allerton 2008: 339-346 - [c29]Tao Cui, Tracey Ho, Jörg Kliewer:
Space-Time Communication Protocols for N-Way Relay Networks. GLOBECOM 2008: 1037-1041 - [c28]Tao Cui, Feifei Gao, Tracey Ho, Arumugam Nallanathan:
Distributed Space-Time coding for Two-Way Wireless Relay Networks. ICC 2008: 3888-3892 - [c27]Tao Cui, Lijun Chen, Tracey Ho:
Energy Efficient Opportunistic Network Coding for Wireless Networks. INFOCOM 2008: 361-365 - 2007
- [c26]Tao Cui, Tracey Ho, Lijun Chen:
Distributed minimum cost multicasting with lossless source coding and network coding. CDC 2007: 506-511 - [c25]Tao Cui, Lijun Chen, Tracey Ho:
Distributed optimization in wireless networks using broadcast advantage. CDC 2007: 5839-5844 - [c24]Tao Cui, Lijun Chen, Tracey Ho:
Optimization based rate control for multicast with network coding: A multipath formulation. CDC 2007: 6041-6046 - [c23]Mortada Mehyar, Wei-Hsin Gu, Steven H. Low, Michelle Effros, Tracey Ho:
Optimal Strategies for Efficient Peer-to-Peer File Sharing. ICASSP (4) 2007: 1337-1340 - [c22]Tao Cui, Tracey Ho, Chintha Tellambura:
Statistical Pruning for Near Maximum Likelihood Detection of MIMO Systems. ICC 2007: 5462-5467 - [c21]Sidharth Jaggi, Michael Langberg, Sachin Katti, Tracey Ho, Dina Katabi, Muriel Médard:
Resilient Network Coding in the Presence of Byzantine Adversaries. INFOCOM 2007: 616-624 - [c20]Lijun Chen, Tracey Ho, Steven H. Low, Mung Chiang, John C. Doyle:
Optimization Based Rate Control for Multicast with Network Coding. INFOCOM 2007: 1163-1171 - [c19]Wei-Hsin Gu, Ralf Koetter, Michelle Effros, Tracey Ho:
On Source Coding with Coded Side Information for a Binary Source with Binary Side Information. ISIT 2007: 1456-1460 - [c18]Tao Cui, Tracey Ho, Lijun Chen:
On Distributed Distortion Optimization for Correlated Sources. ISIT 2007: 2731-2735 - [c17]Tao Cui, Tracey Ho:
Minimum Cost Integral Network Coding. ISIT 2007: 2736-2740 - [c16]Jörg Kliewer, Theodoros K. Dikaliotis, Tracey Ho:
On the Performance of Joint and Separate Channel and Network Coding in Wireless Fading Networks. ITW 2007: 1-5 - [c15]Tao Cui, Lijun Chen, Tracey Ho, Steven H. Low, Lachlan L. H. Andrew:
Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks. MASS 2007: 1-11 - [c14]Shreeshankar Bodas, Jared Grubb, Sriram Sridharan, Tracey Ho, Sriram Vishwanath:
Network With Costs: Timing and Flow Decomposition. WiOpt 2007: 1-8 - 2006
- [j3]Desmond S. Lun, Niranjan Ratnakar, Muriel Médard, Ralf Koetter, David R. Karger, Tracey Ho, Ebad Ahmed, Fang Zhao:
Minimum-cost multicast over coded packet networks. IEEE Trans. Inf. Theory 52(6): 2608-2623 (2006) - [j2]Tracey Ho, Muriel Médard, Ralf Koetter, David R. Karger, Michelle Effros, Jun Shi, Ben Leong:
A Random Linear Network Coding Approach to Multicast. IEEE Trans. Inf. Theory 52(10): 4413-4430 (2006) - [c13]Tao Cui, Tracey Ho, Chintha Tellambura:
Heuristic Tree Search for Detection and Decoding of Uncoded and Linear Block Coded Communication Systems. ICC 2006: 391-396 - [c12]Tao Cui, Tracey Ho, Chintha Tellambura:
Polynomial Moment Relaxation for MIMO Detection. ICC 2006: 3129-3134 - [c11]Jia-qi Jin, Tracey Ho, Harish Viswanathan:
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks. ISIT 2006: 197-201 - [c10]Tao Cui, Tracey Ho, Chintha Tellambura:
Linear Programming Detection and Decoding for MIMO Systems. ISIT 2006: 1783-1787 - [c9]Michelle Effros, Tracey Ho, Sukwon Kim:
A Tiling Approach to Network Code Design for Wireless Networks. ITW 2006: 62-66 - [i3]Siddharth Ray, Michelle Effros, Muriel Médard, Ralf Koetter, Tracey Ho, David R. Karger, Jinane Abounadi:
On Separation, Randomness and Linearity for Network Codes over Finite Fields. CoRR abs/cs/0603022 (2006) - [i2]Tracey Ho:
Polynomial-time algorithms for coding across multiple unicasts. CoRR abs/cs/0604096 (2006) - 2005
- [j1]Tracey Ho, Muriel Médard, Ralf Koetter:
An information-theoretic view of network management. IEEE Trans. Inf. Theory 51(4): 1295-1312 (2005) - [c8]Sidharth Jaggi, Michael Langberg, Tracey Ho, Michelle Effros:
Correction of adversarial errors in networks. ISIT 2005: 1455-1459 - [c7]Tracey Ho, Ben Leong, Yu-Han Chang, Yonggang Wen, Ralf Kötter:
Network monitoring in multicast networks using network coding. ISIT 2005: 1977-1981 - [i1]Desmond S. Lun, Niranjan Ratnakar, Muriel Médard, Ralf Koetter, David R. Karger, Tracey Ho, Ebad Ahmed, Fang Zhao:
Minimum-Cost Multicast over Coded Packet Networks. CoRR abs/cs/0503064 (2005) - 2004
- [b1]Tracey Ho:
Networking from a network coding perspective. Massachusetts Institute of Technology, Cambridge, MA, USA, 2004 - [c6]Yu-Han Chang, Tracey Ho, Leslie Pack Kaelbling:
Multi-Agent Learning in Mobilized Ad-Hoc Networks. AAAI Technical Report (2) 2004: 81-88 - [c5]Yu-Han Chang, Tracey Ho, Leslie Pack Kaelbling:
Mobilized Ad-Hoc Networks: A Reinforcement Learning Approach. ICAC 2004: 240-247 - [c4]Tracey Ho, Ben Leong, Ralf Koetter, Muriel Médard, Michelle Effros, David R. Karger:
Byzantine modification detection in multicast networks using randomized network coding. ISIT 2004: 144 - 2003
- [c3]Michelle Effros, Muriel Médard, Tracey Ho, Siddharth Ray, David R. Karger, Ralf Koetter, Babak Hassibi:
Linear Network Codes: A Unified Framework for Source, Channel, and Network Coding. Advances in Network Information Theory 2003: 197-216 - [c2]Tracey Ho, Muriel Médard, Ralf Koetter:
An information theoretic view of network management. INFOCOM 2003: 1456-1466 - [c1]Yu-Han Chang, Tracey Ho, Leslie Pack Kaelbling:
All learning is Local: Multi-agent Learning in Global Reward Games. NIPS 2003: 807-814
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint