Network Coding Delay: A Brute-Force Analysis

被引:0
|
作者
Nistor, Maricica [1 ]
Barros, Joao [1 ]
Vieira, Fausto [1 ]
Vinhoza, Tiago T. V. [1 ]
Widmer, Joerg [2 ]
机构
[1] Univ Porto, Fac Engn, Dept Engn Electrotecn & Comp, Inst Telecomunicacoes, Oporto, Portugal
[2] DoCoMo Eurolabs, Munich, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Understanding the delay behavior of network coding with a fixed number of receivers, small field sizes and a limited number of encoded symbols is a key step towards its applicability in real-time communication systems with stringent delay constraints. Previous results are typically asymptotic in nature and focus mainly on the average delay performance. Seeking to characterize the complete delay distribution of random linear network coding, we present a brute-force methodology that is feasible for up to four receivers, limited field and generation sizes. The key idea is to fix the pattern of packet erasures and to try out all possible encodings for various system and channel parameters. Our findings, which are valid for both decoding delay and ordered-delivery delay, can be used to optimize network coding protocols with respect not only to their average but also to their worst-case performance.
引用
收藏
页码:39 / 43
页数:5
相关论文
共 50 条
  • [41] Local search for string problems: Brute-force is essentially optimal
    Guo, Jiong
    Hermelin, Danny
    Komusiewicz, Christian
    THEORETICAL COMPUTER SCIENCE, 2014, 525 : 30 - 41
  • [42] Towards Data-Driven Characterization of Brute-Force Attackers
    Wilkens, Florian
    Fischer, Mathias
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [43] A brute-force method for studying the chromatic properties of homeomorphic graphs
    Read, Ronald C.
    ARS COMBINATORIA, 2010, 96 : 425 - 457
  • [44] Brute-Force k-Nearest Neighbors Search on the GPU
    Li, Shengren
    Amenta, Nina
    SIMILARITY SEARCH AND APPLICATIONS, SISAP 2015, 2015, 9371 : 259 - 270
  • [45] REPRESENTATION DESIGN AND BRUTE-FORCE INDUCTION IN A BOEING MANUFACTURING DOMAIN
    RIDDLE, P
    SEGAL, R
    ETZIONI, O
    APPLIED ARTIFICIAL INTELLIGENCE, 1994, 8 (01) : 125 - 147
  • [46] Thoughtful brute-force attack of the RERS 2012 and 2013 Challenges
    Jaco van de Pol
    Theo C. Ruys
    Steven te Brinke
    International Journal on Software Tools for Technology Transfer, 2014, 16 : 481 - 491
  • [47] Research on techniques for detecting brute-force attacks on corporate email
    Liu, Xiaomei
    Hu, Xuewei
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2024, 24 (03) : 1379 - 1393
  • [48] Privacy-Preserving Outsourcing of Brute-Force Key Searches
    Karame, Ghassan O.
    Capkun, Srdjan
    Maurer, Ueli
    PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), 2011, : 101 - 112
  • [49] Brute-force analysis of insight of phase-resolved partial discharge using a CNN
    Kitani, Ryota
    Iwata, Shinya
    ELECTRICAL ENGINEERING, 2023, 105 (04) : 2373 - 2382
  • [50] Trade-off Analysis for Selective versus Brute-Force Regression Testing in FSMWeb
    Andrews, Anneliese
    Do, Hyunsook
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 184 - 192