|
[1]FC code, https://en.wikipedia.org/wiki/Fountain_code [2]M. Luby, "LT codes," The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings., Vancouver, BC, 2002, pp. 271-280. [3]E. Kurniawan, S. Sun and K. Yen, "Transmission strategy of fountain code in cooperative networks with multiple relay nodes," 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, Tokyo, 2009, pp. 1108-1112. [4]H. Kushwaha, Y. Xing, R. Chandramouli and H. Heffes, "Reliable Multimedia Transmission Over Cognitive Radio Networks Using Fountain Codes," in Proceedings of the IEEE, vol. 96, no. 1, pp. 155-165, Jan. 2008. [5]Zhang Yan, Feng Xin, Jia Zhicheng, Tang Hongmei, “The Application of Fountain Code in Image Wireless Transmission,” Procedia Engineering, Vol. 29, PP. 3322-3326, 2012 [6]A. G. Dimakis, V. Prabhakaran and K. Ramchandran, "Distributed Fountain Codes for Networked Storage," 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, Toulouse, 2006, pp. V-V. [7]S. A. Aly, Z. Kong and E. Soljanin, "Fountain Codes Based Distributed Storage Algorithms for Large-Scale Wireless Sensor Networks," 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), St. Louis, MO, 2008, pp. 171-182. [8]J. Janet, S. Balakrishnan and K. Somasekhara, "Fountain code based cloud storage mechanism for optimal file retrieval delay," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-4. [9]Suayb S. Arslan, “Incremental redundancy, fountain codes and advanced topics,” arXiv:1402.6016, 2014. [10]Z. Zhiliang, L. Sha, Z. Jiawei, Z. Yuli and Y. Hai, "Performance Analysis of LT Codes with Different Degree Distribution," 2012 Fifth International Workshop on Chaos-fractals Theories and Applications, Dalian, 2012, pp. 142-146. [11]H. Zhu, G. Zhang and Guangxia Li, "A novel degree distribution algorithm of LT codes," 2008 11th IEEE International Conference on Communication Technology, Hangzhou, 2008, pp. 221-224. [12]Yuli Zhao, Francis C. M. Lau, “Scale-free Luby transform codes”, International Journal of Bifurcation and Chaos, Vol. 22, No. 4, 2012. [13]J. Shen, T. Zhou, C. Lai, J. Li and X. Li, "Hierarchical Trust Level Evaluation for Pervasive Social Networking," in IEEE Access, vol. 5, pp. 1178-1187, 2017. [14]OPEC, https://en.wikipedia.org/wiki/OPEC [15]D. Niyato and E. Hossain, "Competitive Pricing for Spectrum Sharing in Cognitive Radio Networks: Dynamic Game, Inefficiency of Nash Equilibrium, and Collusion," in IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 192-202, Jan. 2008. [16]Lost Circles, https://lostcircles.com/ [17]Stanford Large Network Dataset Collection, https://snap.stanford.edu/index.html [18]B. Zhang, R. Yong, M. Li, J. Pan and J. Huang, "A Hybrid Trust Evaluation Framework for E-Commerce in Online Social Network: A Factor Enrichment Perspective," in IEEE Access, vol. 5, pp. 7080-7096, 2017.
|