Network Coding Delay: A Brute-Force Analysis

被引:0
|
作者
Nistor, Maricica [1 ]
Barros, Joao [1 ]
Vieira, Fausto [1 ]
Vinhoza, Tiago T. V. [1 ]
Widmer, Joerg [2 ]
机构
[1] Univ Porto, Fac Engn, Dept Engn Electrotecn & Comp, Inst Telecomunicacoes, Oporto, Portugal
[2] DoCoMo Eurolabs, Munich, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Understanding the delay behavior of network coding with a fixed number of receivers, small field sizes and a limited number of encoded symbols is a key step towards its applicability in real-time communication systems with stringent delay constraints. Previous results are typically asymptotic in nature and focus mainly on the average delay performance. Seeking to characterize the complete delay distribution of random linear network coding, we present a brute-force methodology that is feasible for up to four receivers, limited field and generation sizes. The key idea is to fix the pattern of packet erasures and to try out all possible encodings for various system and channel parameters. Our findings, which are valid for both decoding delay and ordered-delivery delay, can be used to optimize network coding protocols with respect not only to their average but also to their worst-case performance.
引用
收藏
页码:39 / 43
页数:5
相关论文
共 50 条
  • [31] Honey Encryption Encryption beyond the Brute-Force Barrier
    Juels, Ari
    Ristenpart, Thomas
    IEEE SECURITY & PRIVACY, 2014, 12 (04) : 59 - 62
  • [32] Brute-Force Facial Landmark Analysis with a 140,000-Way Classifier
    Li, Mengtian
    Jeni, Laszlo
    Ramanan, Deva
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 7032 - 7040
  • [33] A Semi Brute-Force Search Approach for (Balanced) Clustering
    Xu, Yicheng
    Chau, Vincent
    Wu, Chenchen
    Zhang, Yong
    Zissimopoulos, Vassilis
    Zou, Yifei
    ALGORITHMICA, 2024, 86 (01) : 130 - 146
  • [34] A New Distributed Brute-Force Password Cracking Technique
    Tirado, Emanuel
    Turpin, Brendan
    Beltz, Cody
    Roshon, Phillip
    Judge, Rylin
    Gagneja, Kanwal
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 117 - 127
  • [35] SINGULAR EXTENSIONS - ADDING SELECTIVITY TO BRUTE-FORCE SEARCHING
    ANANTHARAMAN, T
    CAMPBELL, MS
    HSU, FH
    ARTIFICIAL INTELLIGENCE, 1990, 43 (01) : 99 - 109
  • [36] An Algorithm for String Searching Based on Brute-Force Algorithm
    Abdeen, Rawan Ali
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (07): : 24 - 27
  • [37] Hidden Markov Model Modeling of SSH Brute-Force Attacks
    Sperotto, Anna
    Sadre, Ramin
    de Boer, Pieter-Tjerk
    Pras, Aiko
    INTEGRATED MANAGEMENT OF SYSTEMS, SERVICES, PROCESSES AND PEOPLE IN IT, PROCEEDINGS, 2009, 5841 : 164 - 176
  • [38] Smart brute-force approach for distribution feeder reconfiguration problem
    Parlier, Guillaume
    Gueguen, Herve
    Hu, Feihu
    ELECTRIC POWER SYSTEMS RESEARCH, 2019, 174
  • [39] Systolic parallel architecture for brute-force autoregressive signal modeling
    Alwan, Nuha A. S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (04) : 1358 - 1366
  • [40] LHC physicists embrace brute-force approach to particle hunt
    Davide Castelvecchi
    Nature, 2018, 560 (7718) : 293 - 294