Partial Third-Party Information Exchange with Network Coding

被引:3
|
作者
Wang, Xiumin [1 ]
Yuen, Chau [2 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat, Hefei, Peoples R China
[2] Singapore Univ Technol & Design, Singapore, Singapore
关键词
Network coding; cooperative data exchange; channel state information;
D O I
10.1109/LCOMM.2013.022213.130156
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we consider the problem of exchanging channel state information in a wireless network such that a subset of the clients can obtain the complete channel state information of all the links in the network. We first derive the minimum number of required transmissions for such partial third-party information exchange problem. We then design an optimal transmission scheme by determining the number of packets that each client should send, and designing a deterministic encoding strategy such that the subset of clients can acquire complete channel state information of the network with minimal number of transmissions. Numerical results show that network coding can efficiently reduce the number of transmissions, even with only pairwise encoding.
引用
收藏
页码:757 / 760
页数:4
相关论文
共 50 条
  • [1] Minimizing Transmission Cost for Third-Party Information Exchange with Network Coding
    Wang, Xiumin
    Yuen, Chau
    Li, Tiffany Jing
    Song, Wentu
    Xu, Yinlong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (06) : 1218 - 1230
  • [2] Selecting an EDI third-party network
    Esichaikul, V
    Chaichotiranant, C
    INFORMATION SYSTEMS MANAGEMENT, 1999, 16 (01) : 26 - 31
  • [3] Using third-party purchasing to push third-party logistics
    Long, JS
    Zhao, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 400 - 404
  • [4] ASYMMETRIC INFORMATION AND THIRD-PARTY INTERVENTION IN CIVIL WARS
    Amegashie, J. Atsu
    DEFENCE AND PEACE ECONOMICS, 2014, 25 (04) : 381 - 400
  • [5] Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems
    Ahmadinejad, Seyed Hossein
    Fong, Philip W. L.
    COMPUTERS & SECURITY, 2014, 44 : 75 - 91
  • [6] Exchanging Third-Party Information with Minimum Transmission Cost
    Wang, Xiumin
    Song, Wentu
    Yuen, Chau
    Li , Jing
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012,
  • [7] Leakage of Sensitive Information to Third-Party Voice Applications
    Bispham, Mary
    Zard, Clara
    Sattar, Suliman
    Ferrer-Aran, Xavier
    Suarez-Tangil, Guillermo
    Such, Jose
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON CONVERSATIONAL USER INTERFACES, CUI 2022, 2022,
  • [8] AppMonitor: restricting information leakage to third-party applications
    Rathore, Nemi Chandra
    Tripathy, Somanath
    SOCIAL NETWORK ANALYSIS AND MINING, 2020, 10 (01)
  • [9] AppMonitor: restricting information leakage to third-party applications
    Nemi Chandra Rathore
    Somanath Tripathy
    Social Network Analysis and Mining, 2020, 10
  • [10] THIRD-PARTY EVALUATION
    ETRIS, SF
    MATERIALS RESEARCH AND STANDARDS, 1972, 12 (11): : 7 - +