Muriel Médard

ORCID: 0000-0003-4059-407X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Full-Duplex Wireless Communications
  • Advanced MIMO Systems Optimization
  • Mobile Ad Hoc Networks
  • Error Correcting Code Techniques
  • Advanced Wireless Communication Techniques
  • Wireless Networks and Protocols
  • Advanced Wireless Network Optimization
  • Advanced Wireless Communication Technologies
  • Caching and Content Delivery
  • Coding theory and cryptography
  • Wireless Communication Networks Research
  • Cellular Automata and Applications
  • Advanced Optical Network Technologies
  • Advanced Data Storage Technologies
  • Optical Network Technologies
  • Privacy-Preserving Technologies in Data
  • Algorithms and Data Compression
  • Advanced Photonic Communication Systems
  • DNA and Biological Computing
  • Distributed systems and fault tolerance
  • Energy Harvesting in Wireless Networks
  • Cryptography and Data Security
  • Interconnection Networks and Systems

Cambridge Electronics (United States)
2011-2025

Massachusetts Institute of Technology
2016-2025

IIT@MIT
2012-2024

Moscow Institute of Thermal Technology
2011-2023

University of Lisbon
2019-2023

Instituto Politécnico de Lisboa
2023

Software (Spain)
2023

Instituto Superior Técnico
2023

Aalto University
2022

KTH Royal Institute of Technology
2022

We present a distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks. Network nodes independently randomly select mappings from inputs onto output links over some field. show that this achieves capacity with probability exponentially approaching 1 the code length. also demonstrate performs when necessary network, generalizing error exponents Slepian-Wolf natural way. Benefits are decentralized operation...

10.1109/tit.2006.881746 article EN IEEE Transactions on Information Theory 2006-09-29

We take a new look at the issue of network capacity. It is shown that coding an essential ingredient in achieving capacity network. Building on recent work by Li et al.(see Proc. 2001 IEEE Int. Symp. Information Theory, p.102), who examined multicast networks, we extend framework to arbitrary networks and robust networking. For which are restricted using linear codes, find necessary sufficient conditions for feasibility any given set connections over also consider problem recovery nonergodic...

10.1109/tnet.2003.818197 article EN IEEE/ACM Transactions on Networking 2003-10-01

<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources increase the information content of each transmission. We show that intelligently mixing increases network throughput. Our design is rooted in theory coding. Prior work on coding mainly theoretical and focuses multicast traffic. aims...

10.1109/tnet.2008.923722 article EN IEEE/ACM Transactions on Networking 2008-06-01

A novel randomized network coding approach for robust, distributed transmission and compression of information in networks is presented, its advantages over routing-based approaches demonstrated.

10.1109/isit.2003.1228459 article EN 2003-01-01

We present a model for time-varying communication single-access and multiple-access channels without feedback. consider the difference between mutual information when receiver knows channel perfectly only has an estimate of channel. relate variance measurement error at to upper lower bounds this in information. illustrate use our on modeled by Gauss-Markov process, measured pilot tone. rate time variation loss due imperfect knowledge

10.1109/18.841172 article EN IEEE Transactions on Information Theory 2000-05-01

This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources increase the information content of each transmission. We show that intelligently mixing increases network throughput. Our design is rooted in theory coding. Prior work on coding mainly theoretical and focuses multicast traffic. aims bridge with practice; it addresses common case unicast traffic, dynamic potentially bursty flows,...

10.1145/1151659.1159942 article EN ACM SIGCOMM Computer Communication Review 2006-08-11

Just recently, the concept of augmented and virtual reality (AR/VR) over wireless has taken entire 5G ecosystem by storm, spurring an unprecedented interest from academia, industry, others. However, success immersive VR experience hinges on solving a plethora grand challenges cutting across multiple disciplines. This article underscores importance technology as disruptive use case (and beyond) harnessing latest development storage/ memory, fog/edge computing, computer vision, artificial...

10.1109/mcom.2017.1601089 article EN IEEE Communications Magazine 2017-01-01

This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources increase the information content of each transmission. We show that intelligently mixing increases network throughput. Our design is rooted in theory coding. Prior work on coding mainly theoretical and focuses multicast traffic. aims bridge with practice; it addresses common case unicast traffic, dynamic potentially bursty flows,...

10.1145/1159913.1159942 article EN 2006-08-11

We consider the problem of establishing minimum-cost multicast connections over coded packet networks, i.e., networks where contents outgoing packets are arbitrary, causal functions received packets. both wireline and wireless as well static (where membership group remains constant for duration connection) dynamic changes in time, with nodes joining leaving group). For multicast, we reduce to a polynomial-time solvable optimization problem, present decentralized algorithms solving it. These...

10.1109/tit.2006.874523 article EN IEEE Transactions on Information Theory 2006-06-01

Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by malicious node can end up contaminating all reaching destination, preventing decoding. This paper introduces <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">the</i> xmlns:xlink="http://www.w3.org/1999/xlink">first</i> xmlns:xlink="http://www.w3.org/1999/xlink">distributed</i>...

10.1109/infcom.2007.78 article EN 2007-05-01

It is our great pleasure to welcome you ACM CoNEXT 2010, the 6th International COnference on emerging Networking EXperiments and Technologies. The conference hosted by Drexel University held in City of Brotherly Love, Philadelphia. We hope that vibe city combination with an outstanding technical social program will lead stimulating discussions exchange ideas among attending members world-spanning community. This year's edition continues tradition foster scientific technological...

10.23919/mixdes49814.2020.9155800 article EN 2020-06-01

The theory of network coding promises significant benefits in performance, especially lossy networks and multicast multipath scenarios. To realize these practice, we need to understand how across packets interacts with the acknowledgment (ACK)-based flow control mechanism that forms a central part today's Internet protocols such as transmission protocol (TCP). Current approaches rateless codes batch-based are not compatible TCP's retransmission sliding-window mechanisms. In this paper,...

10.1109/jproc.2010.2093850 article EN Proceedings of the IEEE 2011-01-13

We focus on the privacy-utility trade-off encountered by users who wish to disclose some information an analyst, that is correlated with their private data, in hope of receiving utility. rely a general privacy statistical inference framework, under which data transformed before it disclosed, according probabilistic mapping. show when log-loss introduced this framework both metric and distortion metric, leakage utility constraint can be reduced mutual between disclosed non-private...

10.1109/itw.2014.6970882 article EN 2022 IEEE Information Theory Workshop (ITW) 2014-11-01

We introduce a new algorithm for realizing maximum likelihood (ML) decoding arbitrary codebooks in discrete channels with or without memory, which the receiver rank-orders noise sequences from most likely to least likely. Subtracting received signal that order, first instance results member of codebook is ML decoding. name this GRAND Guessing Random Additive Noise Decoding. establish capacity-achieving when used random codebooks. For rates below capacity, we identify error exponents, and...

10.1109/tit.2019.2896110 article EN publisher-specific-oa IEEE Transactions on Information Theory 2019-01-31

We present a new algorithm which creates redundant trees on arbitrary node-redundant or link-redundant networks. These are such that any node is connected to the common root of by at least one in case link failure. Our scheme provides rapid preplanned recovery communications with great flexibility topology design. Unlike previous algorithms, our can establish two failing network. In failure link, superset previously known trees.

10.1109/90.803380 article EN IEEE/ACM Transactions on Networking 1999-01-01

The problem of simultaneously disseminating k messages in a large network n nodes, decentralized and distributed manner, where nodes only have knowledge about their own contents, is studied. In every discrete time-step, each node selects communication partner randomly, uniformly among all one message can be transmitted. goal to disseminate rapidly, with high probability, nodes. It shown that random linear coding (RLC) based protocol disseminates time ck+/spl Oscr/(/spl radic/kln(k)ln(n)),...

10.1109/tit.2006.874532 article EN IEEE Transactions on Information Theory 2006-06-01

Distributed randomized network coding, a robust approach to multicasting in distributed settings, can be extended provide Byzantine modification detection without the use of cryptographic functions is presented this paper.

10.1109/isit.2004.1365180 article EN 2004-12-23

This paper describes MIXIT, a system that improves the throughput of wireless mesh networks. MIXIT exploits basic property networks: even when no node receives packet correctly, any given bit is likely to be received by some correctly. Instead insisting on forwarding only correct packets, routers use physical layer hints make their best guess about which bits in corrupted are and forward them destination. Even though this approach inevitably lets erroneous through, we find it can achieve...

10.1145/1402946.1403004 article EN ACM SIGCOMM Computer Communication Review 2008-08-17

We present decentralized algorithms that compute minimum-cost subgraphs for establishing multicast connections in networks use coding. These algorithms, coupled with existing schemes constructing network codes, constitute a fully approach achieving multicast. Our is sharp contrast to the prevailing based on approximation directed Steiner tree problem, which suboptimal and generally assumes centralized computation full knowledge. also give extensions beyond basic problem of fixed-rate...

10.1109/infcom.2005.1498443 article EN 2005-08-24

A new coding and queue management algorithm is proposed for communication networks that employ linear network coding. The has the feature encoding process truly online, as opposed to a block-by-block approach. setup assumes packet erasure broadcast channel with stochastic arrivals full feedback, but scheme potentially applicable more general lossy link-by-link feedback. guarantees physical size at sender tracks backlog in degrees of freedom (also called virtual size). notion node "seeing"...

10.1109/isit.2008.4595268 preprint EN 2008-07-01

In this article we present CodeCast, a network-coding-based ad hoc multicast protocol. CodeCast is especially well-suited for multimedia applications with low-loss, low-latency constraints such as audio/video streaming. The key ingredient of random network coding, which transparently implements both localized loss recovery and path diversity very low overhead. Simulation results show that in typical setting, yields nearly 100 percent delivery ratio, compared to 94 ratio by traditional...

10.1109/wc-m.2006.250362 article EN IEEE Wireless Communications 2006-10-01

We propose a mechanism that incorporates network coding into TCP with only minor changes to the protocol stack, thereby allowing incremental deployment. In our scheme, source transmits random linear combinations of packets currently in congestion window. At heart scheme is new interpretation ACKs - sink acknowledges every degree freedom (i.e., combination reveals one unit information) even if it does not reveal an original packet immediately. Such enable TCP-like sliding-window approach...

10.1109/infcom.2009.5061931 preprint EN 2009-04-01
Coming Soon ...