T. Ho

ORCID: 0009-0009-6551-1921
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Mobile Ad Hoc Networks
  • Wireless Networks and Protocols
  • Full-Duplex Wireless Communications
  • Error Correcting Code Techniques
  • Advanced Wireless Communication Technologies
  • Advanced Wireless Communication Techniques
  • Caching and Content Delivery
  • Distributed systems and fault tolerance
  • Algorithms and Data Compression
  • Neuroscience and Neural Engineering
  • Coding theory and cryptography
  • Opportunistic and Delay-Tolerant Networks
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Data Storage Technologies
  • Ferroelectric and Negative Capacitance Devices
  • Advanced Memory and Neural Computing
  • Advanced Wireless Network Optimization

Hong Kong University of Science and Technology
2024

University of Hong Kong
2024

California Institute of Technology
2006-2010

Massachusetts Institute of Technology
2003-2007

Decision Systems (United States)
2006

University of Illinois Urbana-Champaign
2005

We present a distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks. Network nodes independently randomly select mappings from inputs onto output links over some field. show that this achieves capacity with probability exponentially approaching 1 the code length. also demonstrate performs when necessary network, generalizing error exponents Slepian-Wolf natural way. Benefits are decentralized operation...

10.1109/tit.2006.881746 article EN IEEE Transactions on Information Theory 2006-09-29

A novel randomized network coding approach for robust, distributed transmission and compression of information in networks is presented, its advantages over routing-based approaches demonstrated.

10.1109/isit.2003.1228459 article EN 2003-01-01

We consider the problem of establishing minimum-cost multicast connections over coded packet networks, i.e., networks where contents outgoing packets are arbitrary, causal functions received packets. both wireline and wireless as well static (where membership group remains constant for duration connection) dynamic changes in time, with nodes joining leaving group). For multicast, we reduce to a polynomial-time solvable optimization problem, present decentralized algorithms solving it. These...

10.1109/tit.2006.874523 article EN IEEE Transactions on Information Theory 2006-06-01

Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by malicious node can end up contaminating all reaching destination, preventing decoding. This paper introduces <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">the</i> xmlns:xlink="http://www.w3.org/1999/xlink">first</i> xmlns:xlink="http://www.w3.org/1999/xlink">distributed</i>...

10.1109/infcom.2007.78 article EN 2007-05-01

Distributed randomized network coding, a robust approach to multicasting in distributed settings, can be extended provide Byzantine modification detection without the use of cryptographic functions is presented this paper.

10.1109/isit.2004.1365180 article EN 2004-12-23

We consider energy efficient network coding design in wireless networks with multiple unicast sessions. Our approach decomposes sessions into a superposition of multicast and sessions, occurring only within each session. give an optimization that is more general than the existing poison-remedy formulation. For case wireless, we XOR achievable rate region for primary interference model. To simplify operation, oblivious backpressure algorithm which does not optimize overhearing transmissions,...

10.1109/infocom.2008.81 article EN 2008-04-01

We design codes to transmit information over a network, some subset of which is controlled by malicious adversary. The computationally unbounded, hidden adversary knows the message be transmitted, and can observe change part network being controlled. nodes do not share resources such as shared randomness or private key. first consider unicast problem in with |epsiv parallel, unit-capacity, directed edges. rate-region has two parts. If controls fraction p < 0.5 edges, maximal throughput...

10.1109/isit.2005.1523584 article EN 2005-01-01

Precise connections between algebraic network coding and flows are explained in this article. Our combinatorial formulations offer new insights, mathematical simplicity, lead to a substantially tighter upper bound on the field size required for given connection problem than that R. Koetter et al.

10.1109/isit.2003.1228458 article EN 2003-01-01

We present an information-theoretic framework for network management recovery from nonergodic link failures. Building on recent work in the field of coding, we describe input-output relations nodes terms codes. This very general concept behavior as a code provides way to quantify essential information that needed switch among different codes (behaviors) failure scenarios. compare two types schemes, receiver-based and network-wide, consider formulations quantifying management. The first is...

10.1109/tit.2005.844062 article EN IEEE Transactions on Information Theory 2005-04-01

In this paper we show how information contained in robust network codes can be used for passive inference of possible locations link failures or losses a network. For distributed randomized coding, bound the probability being able to distinguish among given set failure events, and give some experimental results one two randomly generated networks. We also required field size complexity designing code that distinguishes events

10.1109/isit.2005.1523691 article EN 2005-01-01

We consider the problem of optimally allocating a given total storage budget in distributed system. A source has data object which it can code and store over set nodes; is allowed to any amount each node, subject constraint. collector subsequently attempts recover original by accessing random fixed-size subset these nodes. Successful recovery occurs when coded this nodes at least size object. The goal determine node so that probability successful maximized. solve high regime. Our results be...

10.1109/icc.2010.5502492 article EN IEEE International Conference on Communications 2010-05-01

We investigate the problem of using several storage nodes to store a data object, subject an aggregate budget or redundancy constraint. It is challenging find optimal allocation that maximizes probability successful recovery by collector because large space possible symmetric and nonsymmetric allocations, nonconvexity problem. For special case probability-1 recovery, we show minimizes required symmetric. further explore access models, determine in high-probability regime for interest. Based...

10.1109/netcod.2009.5191399 article EN 2009-06-01

Enabled by the availability of both excitatory and inhibitory post-synaptic currents, a biological neural network is inherently capable implementing more sophisticated non-monotonic classification schemes. While such currents are readily emulated in software-based artificial using positive negative synaptic weighting factors, same not as straight forward hardware implementation. In this work, two dual-gate thin-film transistors with effectively infinite direct-current input impedance...

10.1109/tcsi.2023.3347773 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2024-01-10

We present an information theoretic framework for network management recovery from nonergodic link failures. Building on recent work in the field of coding, we describe input-output relations nodes terms codes. This very general concept behavior as a code provides fundamental way to quantify essential that needed switch among different codes (behaviors) failure scenarios. give bounds various connection problems, basic parameters such number source processes and links minimum source-receiver...

10.1109/infcom.2003.1208981 article EN 2003-01-01

We show a statistical pruning approach for maximum likelihood (ML) detection of multiple-input multiple-output (MIMO) systems. present general strategy sphere decoder (SD), which can also be applied to any tree search algorithms. Our rules are effective especially the case when SD has high complexity. Three specific given and discussed. From analyzing union bound on symbol error probability, we that diversity order deterministic is only one by fixing probability. By choosing different...

10.1109/icc.2007.905 article EN IEEE International Conference on Communications 2007-06-01

A general description of the behavior a communication network is given by codes specifying relationships between each node's observable source processes and its input output signals. In this work we focus on acyclic multicast networks, consider two formulations for quantifying management link failure recovery, in terms selecting codes.

10.1109/isit.2002.1023409 article EN 2003-06-25
Coming Soon ...