Network Coding Delay: A Brute-Force Analysis

被引:0
|
作者
Nistor, Maricica [1 ]
Barros, Joao [1 ]
Vieira, Fausto [1 ]
Vinhoza, Tiago T. V. [1 ]
Widmer, Joerg [2 ]
机构
[1] Univ Porto, Fac Engn, Dept Engn Electrotecn & Comp, Inst Telecomunicacoes, Oporto, Portugal
[2] DoCoMo Eurolabs, Munich, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Understanding the delay behavior of network coding with a fixed number of receivers, small field sizes and a limited number of encoded symbols is a key step towards its applicability in real-time communication systems with stringent delay constraints. Previous results are typically asymptotic in nature and focus mainly on the average delay performance. Seeking to characterize the complete delay distribution of random linear network coding, we present a brute-force methodology that is feasible for up to four receivers, limited field and generation sizes. The key idea is to fix the pattern of packet erasures and to try out all possible encodings for various system and channel parameters. Our findings, which are valid for both decoding delay and ordered-delivery delay, can be used to optimize network coding protocols with respect not only to their average but also to their worst-case performance.
引用
收藏
页码:39 / 43
页数:5
相关论文
共 50 条
  • [21] A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
    Byun, Hyeonsu
    Kim, Jueun
    Jeong, Yunseok
    Seok, Byoungjin
    Gong, Seonghyeon
    Lee, Changhoon
    ELECTRONICS, 2024, 13 (13)
  • [22] Privacy Against Brute-Force Inference Attacks
    Osia, Seyed Ali
    Rassouli, Borzoo
    Haddadi, Hamed
    Rabiee, Hamid R.
    Gunduz, Deniz
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 637 - 641
  • [23] LHC teams turn to brute-force hunt
    Castelvecchi, Davide
    NATURE, 2018, 560 (7718) : 293 - 294
  • [24] BRUTE-FORCE SEARCH OF FAST CONVOLUTION ALGORITHMS
    Haynal, Steve
    Haynal, Heidi
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 2586 - 2590
  • [25] SINGULAR EXTENSIONS - ADDING SELECTIVITY TO BRUTE-FORCE SEARCHING
    ANANTHARAMAN, T
    CAMPBELL, M
    HSU, FH
    ICCA JOURNAL, 1988, 11 (04): : 135 - 143
  • [26] Honey Encryption: Security Beyond the Brute-Force Bound
    Juels, Ari
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 293 - 310
  • [27] Protecting financial institutions from brute-force attacks
    Herley, Cormac
    Florencio, Dinei
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 681 - 685
  • [28] PUMP CONTROLS FINESSE BRUTE-FORCE DESIGN.
    Bagat, Arjun
    Orban, Paul
    Hydraulics and Pneumatics, 1985, 38 (05): : 53 - 56
  • [29] InfinityGauntlet: Brute-force Attack on Smartphone Fingerprint Authentication
    Chen, Yu
    Yu, Yang
    Zhai, Lidong
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2027 - 2041
  • [30] A Semi Brute-Force Search Approach for (Balanced) Clustering
    Yicheng Xu
    Vincent Chau
    Chenchen Wu
    Yong Zhang
    Vassilis Zissimopoulos
    Yifei Zou
    Algorithmica, 2024, 86 : 130 - 146