The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

João Barros: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. João Barros, Sergio D. Servetto
    On the capacity of the reachback channel in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:408-411 [Conf]
  2. João Barros, Sergio D. Servetto
    Sequencing Multiple Descriptions. [Citation Graph (0, 0)][DBLP]
    DCC, 2002, pp:448- [Conf]
  3. João Barros, Michael Tüchler
    Scalable decoding on factor trees: a practical solution for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2006, v:54, n:2, pp:284-294 [Journal]
  4. João Barros, Sergio D. Servetto
    Network information flow with correlated sources. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:1, pp:155-170 [Journal]
  5. Paulo F. Oliveira, João Barros
    Network Coding Protocols for Secret Key Distribution. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1718-1733 [Conf]
  6. João Barros, Michael Tüchler
    Estimating a Function from Noisy Sensor Data: A Factor Graph Approach. [Citation Graph (0, 0)][DBLP]
    CISS, 2007, pp:777-781 [Conf]
  7. Gerhard Maierbacher, João Barros
    Source-Optimized Clustering for Distributed Source Coding. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  8. Luís M. B. Lopes, Francisco Martins, Miguel S. Silva, João Barros
    A Formal Model for Programming Wireless Sensor Networks [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  9. Luísa Lima, Muriel Médard, João Barros
    Random Linear Network Coding: A free cipher? [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  10. Miguel S. Silva, Francisco Martins, Luis Lopes, João Barros
    A Calculus for Sensor Networks [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  11. Rui A. Costa, João Barros
    Network Information Flow in Small World Networks [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  12. Matthieu Bloch, João Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin
    Wireless Information-Theoretic Security - Part I: Theoretical Aspects [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  13. Matthieu Bloch, João Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin
    Wireless Information-Theoretic Security - Part II: Practical Implementation [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  14. João Barros, Sergio D. Servetto
    Network Information Flow with Correlated Sources [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  15. Codes for Sensors: An Algorithmic Perspective. [Citation Graph (, )][DBLP]


  16. On the Urban Connectivity of Vehicular Sensor Networks. [Citation Graph (, )][DBLP]


  17. Lightweight Security for Network Coding. [Citation Graph (, )][DBLP]


  18. Analysis of Probabilistic Flooding: How Do We Choose the Right Coin? [Citation Graph (, )][DBLP]


  19. Network Coding Meets TCP. [Citation Graph (, )][DBLP]


  20. Effective Delay Control in Online Network Coding. [Citation Graph (, )][DBLP]


  21. Large-scale simulation of V2V environments. [Citation Graph (, )][DBLP]


  22. Mobile Secret Key Distribution with Network Coding. [Citation Graph (, )][DBLP]


  23. A Cautionary View of Mobility and Connectivity Modeling in Vehicular Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  24. Vehicular Connectivity Models: From Single-Hop Links to Large-Scale Behavior. [Citation Graph (, )][DBLP]


  25. LDPC for Physical Layer Security. [Citation Graph (, )][DBLP]


  26. Strong Secrecy for Wireless Channels (Invited Talk). [Citation Graph (, )][DBLP]


  27. NECO: NEtwork COding simulator. [Citation Graph (, )][DBLP]


  28. Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis [Citation Graph (, )][DBLP]


  29. Lightweight Security for Network Coding [Citation Graph (, )][DBLP]


  30. Informed Network Coding for Minimum Decoding Delay [Citation Graph (, )][DBLP]


  31. Low-Complexity Coding and Source-Optimized Clustering for Large-Scale Sensor Networks [Citation Graph (, )][DBLP]


  32. Network Coding Security: Attacks and Countermeasures [Citation Graph (, )][DBLP]


  33. A Max-Flow Min-Cut Theorem with Applications in Small Worlds and Dual Radio Networks [Citation Graph (, )][DBLP]


  34. Network coding meets TCP [Citation Graph (, )][DBLP]


  35. An Algebraic Watchdog for Wireless Network Coding [Citation Graph (, )][DBLP]


  36. On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks [Citation Graph (, )][DBLP]


  37. Interfacing network coding with TCP: an implementation [Citation Graph (, )][DBLP]


  38. Secure Communication in Stochastic Wireless Networks [Citation Graph (, )][DBLP]


  39. Towards the Safe Programming of Wireless Sensor Networks [Citation Graph (, )][DBLP]


  40. One-Shot Capacity of Discrete Channels [Citation Graph (, )][DBLP]


  41. A Multi-hop Multi-source Algebraic Watchdog [Citation Graph (, )][DBLP]


  42. Modeling Network Coded TCP Throughput: A Simple Model and its Validation [Citation Graph (, )][DBLP]


  43. Techniques for Enhanced Physical-Layer Security [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002