Christina Fragouli
#173,488
Most Influential Person Now
American electrical engineer
Christina Fragouli's AcademicInfluence.com Rankings
Christina Fragouliengineering Degrees
Engineering
#7909
World Rank
#9357
Historical Rank
Electrical Engineering
#2471
World Rank
#2590
Historical Rank
Download Badge
Engineering
Christina Fragouli's Degrees
- PhD Electrical Engineering Stanford University
- Masters Electrical Engineering Stanford University
- Bachelors Electrical Engineering National Technical University of Athens
Why Is Christina Fragouli Influential?
(Suggest an Edit or Addition)According to Wikipedia, Christina Fragouli, from the University of California, Los Angeles, was named Fellow of the Institute of Electrical and Electronics Engineers in 2016 for contributions to network coding.
Christina Fragouli's Published Works
Published Works
- Multi-input multi-output fading channel tracking and equalization using Kalman estimation (2002) (480)
- Network Coding Fundamentals (2007) (369)
- A Network Coding Approach to Energy Efficient Broadcasting: From Theory to Practice (2006) (254)
- MicroCast: cooperative video streaming on smartphones (2013) (243)
- Efficient Broadcasting Using Network Coding (2008) (235)
- Information flow decomposition for network coding (2006) (225)
- Network Coding Applications (2008) (201)
- Controlled multimedia wireless link sharing via enhanced class-based queuing with channel-state-dependent packet scheduling (1998) (198)
- MicroCast: cooperative video streaming on smartphones (2012) (193)
- Wireless Network Coding: Opportunities & Challenges (2007) (186)
- Low power error control for wireless links (1997) (169)
- Training-based channel estimation for multiple-antenna broadband transmissions (2003) (141)
- Coding schemes for line networks (2005) (122)
- Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding (2005) (117)
- Transmission techniques for relay-interference networks (2008) (110)
- On Feedback for Network Coding (2007) (104)
- Turbo-encoder design for symbol-interleaved parallel concatenated trellis-coded modulation (2001) (104)
- Wireless Network Coding: Opportunities and Challenges (2007) (92)
- SenseCode: Network coding for reliable sensor networks (2013) (91)
- Delay with network coding and feedback (2009) (71)
- Approximate Capacity of a Class of Gaussian Interference-Relay Networks (2011) (70)
- An Analysis of Finite-Memory Random Linear Coding on Packet Streams (2006) (67)
- On the Benefits of Network Coding for Wireless Applications (2006) (61)
- Combinatiorial algorithms for wireless information flow (2009) (59)
- On average throughput and alphabet size in network coding (2006) (58)
- Space-time processing for broadband wireless access (2002) (57)
- A connection between network coding and convolutional codes (2004) (55)
- Pliable Index Coding (2012) (52)
- Algebraic Algorithms for Vector Network Coding (2011) (50)
- Network Coding as a Coloring Problem (2004) (50)
- A Network Coding Approach to Network Monitoring (Invited Paper) (2005) (49)
- Prefiltered space-time M-BCJR equalizer for frequency-selective channels (2002) (49)
- Turbo codes with non-uniform constellations (2001) (47)
- Compressed network coding vectors (2009) (47)
- A pliable index coding approach to data shuffling (2017) (46)
- Communication vs distributed computation: An alternative trade-off curve (2017) (45)
- Processing along the way: forwarding vs. coding (2004) (44)
- Subspace Properties of Randomized Network Coding (2007) (41)
- Semi-random interleaver design criteria (1999) (41)
- Towards Reliable Broadcasting using ACKs (2007) (40)
- Channel estimation and equalization in fading (1999) (39)
- A Network Coding Approach to Overlay Network Monitoring (2005) (37)
- On the capacity of non-coherent network coding (2009) (37)
- On Capacity of Line Networks (2007) (36)
- Reliability of Clustered vs. Declustered Replica Placement in Data Storage Systems (2011) (36)
- Noncoherent multisource network coding (2008) (35)
- MicroCast: Cooperative Video Streaming Using Cellular and Local Connections (2016) (35)
- On Locating Byzantine Attackers (2008) (35)
- On the Capacity of Noncoherent Network Coding (2011) (34)
- Decentralized network coding (2004) (34)
- Loss Tomography in General Topologies with Network Coding (2007) (33)
- Identity Aware Sensor Networks (2009) (31)
- Federated Recommendation System via Differential Privacy (2020) (30)
- Secret message capacity of erasure broadcast channels with feedback (2011) (29)
- Wireless Network Simplification: The Gaussian \(N\) -Relay Diamond Network (2011) (29)
- Group secret key generation over broadcast erasure channels (2010) (28)
- Bottleneck discovery and overlay management in network coded peer-to-peer systems (2007) (27)
- Silence is golden and time is money: power-aware communication for sensor networks (2005) (27)
- On Maximum Likelihood Reconstruction over Multiple Deletion Channels (2018) (27)
- Broadcasting private messages securely (2012) (27)
- Symbol interleaved parallel concatenated trellis coded modulation (1999) (26)
- Active topology inference using network coding (2010) (26)
- Effect of Replica Placement on the Reliability of Large-Scale Data Storage Systems (2010) (23)
- Creating secrets out of erasures (2013) (23)
- Optimizing Quantize-Map-and-Forward relaying for Gaussian diamond networks (2012) (22)
- Network Coding: Beyond Throughput Benefits (2011) (22)
- Making recommendations bandwidth aware (2016) (22)
- Silence-Based Communication (2010) (22)
- Multicasting algorithms for deterministic networks (2010) (21)
- Pliable Index Coding: The multiple requests case (2013) (21)
- Distributed Computing Trade-offs with Random Connectivity (2018) (21)
- Quantize-map-forward (QMF) relaying: an experimental study (2013) (20)
- On the throughput improvement due to limited complexity processing at relay nodes (2005) (19)
- Adaptive multi-input multi-output fading channel equalization using Kalman estimation (2000) (19)
- Group testing for overlapping communities (2020) (19)
- Simple schedules for half-duplex networks (2012) (19)
- Group testing for connected communities (2021) (18)
- MicroPlay: a networking framework for local multiplayer games (2012) (18)
- Bit vs. symbol interleaving for parallel concatenated trellis coded modulation (2001) (18)
- Multiple source multiple destination topology inference using network coding (2009) (18)
- On average throughput and alphabet size in network coding (2005) (18)
- Secret Communication Over Broadcast Erasure Channels With State-Feedback (2014) (17)
- Private Broadcasting: An index coding approach (2017) (17)
- A polynomial-time algorithm for pliable index coding (2016) (17)
- Topology inference using network coding (2012) (17)
- Convolutional codes and matrix control theory (1999) (16)
- Reduced-complexity training schemes for multiple-antenna broadband transmissions (2002) (16)
- Finite-alphabet constant-amplitude training sequence for multiple-antenna broadband transmissions (2002) (16)
- Matryoshka: Hiding Secret Communication in Plain Sight (2016) (16)
- Creating shared secrets out of thin air (2012) (16)
- Vector network coding algorithms (2010) (16)
- Approximate Capacity of Gaussian Interference-Relay Networks with Weak Cross Links (2010) (15)
- (Secure) Linear network coding multicast (2016) (15)
- Exchanging pairwise secrets efficiently (2013) (15)
- Graph-based codes for Quantize-Map-and-Forward relaying (2011) (14)
- Secure Network Coding With Erasures and Feedback (2013) (13)
- Network Monitoring: it depends on your points of view (2007) (13)
- A Network Coding Approach to Loss Tomography (2010) (13)
- Effect of spatio-temporal channel correlation on the performance of space-time codes (2002) (13)
- On Relay Placement for Deterministic Line Networks (2010) (13)
- Symbolwise MAP for Multiple Deletion Channels (2019) (13)
- Community aware group testing (2020) (13)
- Reduced-trellis equalization using the M-BCJR algorithm (2001) (13)
- Real-time delay with network coding and feedback (2013) (13)
- On Average Throughput Benefits and Alphabet Size in Network Coding (2005) (13)
- Network Simplification: The Gaussian diamond network with multiple antennas (2011) (13)
- Code construction for multiple sources network coding (2009) (12)
- Subspace Properties of Network Coding and Their Applications (2011) (12)
- Wireless network simplification: The Gaussian N-relay diamond network (2011) (12)
- Capacity of deterministic Z-chain relay-interference network (2009) (12)
- Structure of optimal schedules in diamond networks (2014) (12)
- MicroCast: Cooperative Video Streaming using Cellular and D2D Connections (2014) (12)
- Exchanging Secrets without Using Cryptography (2011) (12)
- Function Computation over Linear Channels (2010) (12)
- Efficiently finding simple schedules in Gaussian half-duplex relay line networks (2017) (12)
- Creating Secrets Out of Packet Erasures (2016) (12)
- Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications (2018) (11)
- Group secret key agreement over state-dependent wireless broadcast channels (2011) (11)
- Function computation via subspace coding (2010) (11)
- On the capacity of multisource non-coherent network coding (2009) (11)
- Silence Based Communication for Sensor Networks (2006) (11)
- Exploiting common randomness: A resource for network secrecy (2013) (11)
- Privacy in Index Coding: $k$ -Limited-Access Schemes (2018) (11)
- The benefit of being flexible in distributed computation (2017) (11)
- A simple relaying strategy for diamond networks (2014) (10)
- Triangle network secrecy (2014) (10)
- On Distributed Quantization for Classification (2019) (10)
- Network Simplification in Half-Duplex: Building on Submodularity (2016) (10)
- On degraded two message set broadcasting (2009) (10)
- Cooperative Relaying at Finite SNR—Role of Quantize-Map-and-Forward (2013) (10)
- QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying (2014) (10)
- Content-type coding (2015) (10)
- On the Complexity of Scheduling in Half-Duplex Diamond Networks (2016) (10)
- Vector Network Coding (2010) (9)
- Coding with encoding uncertainty (2013) (9)
- How to choose the number of taps in a DFE (2002) (9)
- Dynamic group testing to control and monitor disease progression in a population (2021) (9)
- Recommender Systems over Wireless: Challenges and Opportunities (2018) (9)
- Efficient subnetwork selection in relay networks (2014) (8)
- Quantization of Distributed Data for Learning (2021) (8)
- Solving Multi-Arm Bandit Using a Few Bits of Communication (2021) (8)
- Feedback-based coding algorithms for broadcast erasure channels with degraded message sets (2012) (8)
- Subtree decomposition for network coding (2004) (8)
- Minimality for punctured convolutional codes (2001) (8)
- Properties of network polynomials (2012) (8)
- Towards integrating Quantize-Map-Forward relaying into LTE (2012) (8)
- On Average Throughput Benefits for Network Coding (2004) (8)
- On Achievable Information Rates in Single-Source Non-Uniform Demand Networks (2006) (8)
- Degraded Multicasting with Network Coding over the Combination Network (2011) (8)
- LP formulations for secrecy over erasure networks with feedback (2015) (7)
- Coding across unicast sessions can increase the secure message capacity (2016) (7)
- Wireless network simplification: Beyond diamond networks (2016) (7)
- An entropy reduction approach to continual testing (2021) (7)
- Using feedback for secrecy over graphs (2013) (7)
- On the structure of approximately optimal schedules for half-duplex diamond networks (2013) (7)
- Secure Network Coding for Multiple Unicast: On the Case of Single Source (2017) (7)
- Secret message capacity of a line network (2014) (7)
- Interactions Between Learning and Broadcasting in Wireless Recommendation Systems (2019) (7)
- Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels (2017) (6)
- Secure network coding with erasures and feedback (2015) (6)
- Maximum Likelihood Estimation for Multiple-Source Loss Tomography with Network Coding (2011) (6)
- A Reinforcement Learning Approach for Scheduling in mmWave Networks (2021) (6)
- Joint identity-message coding (2010) (6)
- On (Secure) Information flow for Multiple-Unicast Sessions: Analysis with Butterfly Network (2016) (6)
- On Secure Network Coding for Two Unicast Sessions: Studying Butterflies (2016) (6)
- Untrusting network coding (2012) (5)
- Preserving privacy while broadcasting: K-limited-access schemes (2017) (5)
- Scaling Laws for Line Networks: From Zero-Error to Min-Cut Capacity (2006) (5)
- Network-Coded Broadcast: from Canonical Networks to Random Topologies (2008) (5)
- Towards unconditional tor-like anonymity (2015) (5)
- On benefits of vector network coding (2010) (5)
- Noncoherent multi-source network coding (2008) (5)
- A distortion based approach for protecting inferences (2017) (4)
- Low cost security for sensor networks (2013) (4)
- Securing broadcast against dishonest receivers (2013) (4)
- Network coding for undirected information exchange (2009) (4)
- A mobile world of security - The model (2011) (4)
- Switched local schedules for diamond networks (2014) (4)
- Broadcast erasure channel with feedback: The two multicast case — Algorithms and bounds (2013) (4)
- Demo: Microcast: cooperative video streaming on smartphones (2012) (4)
- Wireless Network Security: Building on Erasures (2015) (4)
- Network Coding Techniques for Network Monitoring: a Brief Introduction (2006) (4)
- Wireless Network Simplification: The Performance of Routing (2017) (4)
- Optimizing quantize-map-and-forward in slow fading relay networks (2012) (4)
- Distorting an Adversary's View in Cyber-Physical Systems (2018) (4)
- Joint Identity-Message Coding for Sensor Networks (2008) (3)
- Secure State-Reconstruction Over Networks Subject to Attacks (2021) (3)
- Symbol-Interleaved Serially Concatenated Turbo Codes (2002) (3)
- On the Throughput of Ad Hoc Networks using Connectivity Graphs (2004) (3)
- Distributed Rate Allocation for Network-coded Systems (2009) (3)
- Algorithms for Reconstruction Over Single and Multiple Deletion Channels (2020) (3)
- On Cascaded Channels with Finite Complexity Processing at Intermediate Nodes (2005) (3)
- A Deterministic Algorithm for Pliable Index Coding (2016) (3)
- Polynomial-time Capacity Calculation and Scheduling for Half-Duplex 1-2-1 Networks (2019) (3)
- Erased Secrets: Practical Information-Theoretic Group Secrecy (2010) (3)
- Chapter 20. Network Coding for Sensor Networks (2010) (3)
- On interactive message secrecy over erasure networks (2012) (2)
- Processing Along the Way : Forwarding vs (2004) (2)
- A Pliable Index Coding Approach to Data Shuffling (2020) (2)
- Secure Capacity Region for Erasure Broadcast Channels with Feedback (2011) (2)
- Network coding as a coloring problem (Invited paper) (2004) (2)
- Multi-terminal secrecy in a linear non-coherent packetized networks (2012) (2)
- Privacy in Index Coding: Improved Bounds and Coding Schemes (2018) (2)
- A Network Coding Approach to Network Tomography (2009) (2)
- On the capacity of an infinite cascade of channels (2005) (2)
- Degraded two-message multicast over graphs (2011) (2)
- Achievable secrecy in arbitrary erasure networks with feedback (2014) (2)
- Quantizing Signals for Linear Classification (2019) (2)
- Leveraging mm-Wave Communication for Security (2018) (2)
- Simple Relaying Strategies for Half-duplex Networks (2012) (2)
- On Secure Network Coding for Multiple Unicast Traffic (2019) (2)
- Secure Communication over 1-2-1 Networks (2018) (2)
- On Randomized Network Coding Properties and their Application (2007) (2)
- Evaluation of network coding techniques for a sniper detection application (2011) (2)
- Network-coded multihop multicast: Topology and encoding complexity (2012) (2)
- Successive Refinement of Privacy (2020) (2)
- Simplifying wireless social caching (2016) (2)
- Group Testing for Community Infections (2021) (2)
- Simplifying Wireless Social Caching via Network Coding (2016) (2)
- Using mm-Waves for Secret Key Establishment (2018) (2)
- Distortion-Based Lightweight Security for Cyber-Physical Systems (2020) (1)
- Equivalence of ML decoding to a continuous optimization problem (2020) (1)
- Space-Time Coding for Broadband Wireless Transmission (2002) (1)
- An overview of network coding for dynamically changing networks (2009) (1)
- A Note on Antenna Selection in Gaussian MIMO Channels: Capacity Guarantees and Bounds (2016) (1)
- Coding schemes for broadcast erasure channels with feedback: the two multicast case (2013) (1)
- Split to win: near-optimal sensor network synthesis via path-greedy subproblems (2021) (1)
- Consistency in the face of change: an adaptive approach to physical layer cooperation (2016) (1)
- On interactive secrecy over erasure networks (2012) (1)
- Regret vs. Bandwidth Trade-off for Recommendation Systems (2018) (1)
- On network simplification for Gaussian Half-Duplex diamond networks (2016) (1)
- Gaussian 1-2-1 Networks with Imperfect Beamforming (2020) (1)
- Topology inferene using network coding (2006) (1)
- On the Multicast Capacity of Full-Duplex 1-2-1 Networks (2019) (1)
- Differentially Private Stochastic Linear Bandits: (Almost) for Free (2022) (1)
- On optimal relay placement in directional networks (2021) (1)
- Learning in Distributed Contextual Linear Bandits Without Sharing the Context (2022) (1)
- On degraded two message set broadcast (2009) (1)
- Proactive Resilience in 1-2-1 Networks (2022) (1)
- Network Coding for Dynamically Changing Networks (2008) (1)
- A Mobile World of Security (2011) (1)
- Gomory-Hu Trees Over Wireless (2022) (1)
- Quantizing data for distributed learning (2020) (1)
- Making Recommendations Bandwidth Aware (2018) (1)
- Finite-Alphabet Constant-Amplitude Training Sequences for Multiple-Antennas (2002) (1)
- Combinatorial error detection in linear encoders (2015) (1)
- Secure Key Exchange in Wireless Networks (2011) (1)
- Network Coding for Wireless Networks (2010) (1)
- Serially concatenated coding for broadcasting S-UMTS applications (2002) (1)
- Efficient Key Exchange for Wireless Multi-hop Networks (2015) (1)
- The Approximate Capacity of Half-Duplex Line Networks (2020) (0)
- Federated Multi-Armed Bandits With Vector Rewards for Aspect-Based Recommendations (2022) (0)
- Broadcasting with real-time delay (2011) (0)
- Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications (2021) (0)
- A coding approach to localization using landmarks (2020) (0)
- Improving Group Testing via Gradient Descent (2022) (0)
- Guest Editorial Special Section on Statistical Methods for Network Security and Forensics (2008) (0)
- An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback (2016) (0)
- Foundations of Wireless Networking (Dagstuhl Seminar 17271) (2017) (0)
- Towards reliable broadcastingusing ACKs (2007) (0)
- On Secure Capacity of Multiple Unicast Traffic over Two-Layer Networks (2019) (0)
- On Feedback forNetworkCoding (2007) (0)
- Triangle Network Converse Proof (2014) (0)
- Network Coding: Beyond Throughput Benefits This paper explains how network coding is beneficial in highly dynamic networks and provides examples of how the coding can be used. (2011) (0)
- Contexts can be Cheap: Solving Stochastic Contextual Bandits with Linear Bandit Algorithms (2022) (0)
- Log-likelihood ratio (LLR) estimations for Turbo decoders with Quantize-Map-Forward (QMF) Relaying (2012) (0)
- Network Coding over Dynamically Changing Networks (2008) (0)
- On relay placemement for deterministic line network (2010) (0)
- Singleversusmultiple rounds fordistributed function computation (2007) (0)
- Efficient Beam Scheduling for Half-Duplex mmWave Relay Networks (2021) (0)
- Multipath Diversity and Robustness for Sensor Networks (2010) (0)
- HotMobile 2012 Demo : MicroCast : Cooperative Video Streaming on Smartphones (2012) (0)
- Algebraic Techniques for Linear Deterministic Networks (2012) (0)
- WirelessNetworkCoding:Opportunities & Challenges (2007) (0)
- Compression for Multi-Arm Bandits (2023) (0)
- Towards ReliableBroadcasting usingACKs (2007) (0)
- On Secure Capacity of Multiple Unicast Traffic over Separable Networks (2019) (0)
- Leveraging Millimeter Waves for Security (2018) (0)
- Review for Event Delivering Techniques in Publish/Subscribe Scheme (2016) (0)
- Half-duplex routing is NP-hard (2017) (0)
- Algebraic techniques for deterministic networks (2010) (0)
- Multilevel Secrecy over 1-2-1 Networks (2021) (0)
- On conditions for constant throughput in wireless networks (2006) (0)
- Keynote Speaker (2007) (0)
- Network synthesis for tactical environments: scenario, challenges, and opportunities (2022) (0)
- (Secure) Linear network coding multicast (2015) (0)
- A network coding approach to the shipper detection problem (2011) (0)
- Single versus multiple rounds for distributed function computation (2007) (0)
- Proactive Resilient Transmission and Scheduling Mechanisms for mmWave Networks (2022) (0)
- On Coded Broadcasting for Wireless Recommendation Systems (2021) (0)
- Learning from Distributed Users in Contextual Linear Bandits Without Sharing the Context (2022) (0)
- Can we break the dependency in distributed detection? (2022) (0)
This paper list is powered by the following services:
Other Resources About Christina Fragouli
What Schools Are Affiliated With Christina Fragouli?
Christina Fragouli is affiliated with the following schools: