Results 271 to 280 of about 2,707,814 (314)
Some of the next articles are maybe not open access.
Erasure Coding for Decentralized Coded Caching
2018 IEEE International Symposium on Information Theory (ISIT), 2018Coded caching can significantly decrease the communication load in peak hours of the network. The gain of caching is maximized in a centralized setting, where the cache content of users are opportunistically designed. In the absence of a centralized placement, users' caches are filled with randomly selected packets of the files.
Hadi Reisizadeh +2 more
openaire +1 more source
2013 IEEE International Symposium on Information Theory, 2013
In this paper, we study binary pattern erasure codes, i.e., binary codes that are resiliant to erasures from a family P of possible erasures. We give an algorithmic proof of the existence of a binary linear code with codewords of length n that is resiliant to erasures from P when P satisfies the properties: every pattern p ϵ P has size m and every ...
Sheng Lin +4 more
openaire +1 more source
In this paper, we study binary pattern erasure codes, i.e., binary codes that are resiliant to erasures from a family P of possible erasures. We give an algorithmic proof of the existence of a binary linear code with codewords of length n that is resiliant to erasures from P when P satisfies the properties: every pattern p ϵ P has size m and every ...
Sheng Lin +4 more
openaire +1 more source
Cyclic repetition erasure code
2013 3rd International Conference on Consumer Electronics, Communications and Networks, 2013Distributed storage systems introduce redundancy to provide high data reliability, a simple strategy is replication, but it has a drawback of low storage efficiency, another popular strategy is using erasure code, but the repair cost and complexity are very high.
Meng-Fei Zhang, Shu-Tao Xia
openaire +1 more source
Coupling Decentralized Key-Value Stores with Erasure Coding
ACM Symposium on Cloud Computing, 2019Modern decentralized key-value stores often replicate and distribute data via consistent hashing for availability and scalability. Compared to replication, erasure coding is a promising redundancy approach that provides availability guarantees at much ...
Liangfeng Cheng, Yuchong Hu, P. Lee
semanticscholar +1 more source
International Conference on Parallel Processing, 2019
Nowadays massive video data are stored in cloud storage systems, which are generated by various applications such as autonomous driving, news media, security monitoring, etc.
Huayi Jin +6 more
semanticscholar +1 more source
Nowadays massive video data are stored in cloud storage systems, which are generated by various applications such as autonomous driving, news media, security monitoring, etc.
Huayi Jin +6 more
semanticscholar +1 more source
Dynamic Erasure Coding Policy Allocation (DECPA) in Hadoop 3.0
International Conference on Cyber Security and Cloud Computing, 2019Erasure Code (EC) is being tipped to be the next best alternative to Replication for providing redundancy for Cloud Storage. Already major players like Microsoft and Facebook are having initial implementations using Erasure Code.
A. Chiniah, A. Mungur
semanticscholar +1 more source
High Performance Erasure Coding for Very Large Stripe Sizes
Spring Simulation Multiconference, 2019Exascale computing demands high bandwidth and low latency I/O on the computing edge. Object storage systems can provide higher bandwidth and lower latencies than tape archive.
Walker Haddock +3 more
semanticscholar +1 more source
RE-Store: Reliable and Efficient KV-Store with Erasure Coding and Replication
IEEE International Conference on Cluster Computing, 2019In-memory key/value stores (KV-stores) are a key building block for numerous applications running on a cluster. As cluster scales have grown, efficiency and availability have become increasingly critical characteristics.
Yuzhe Li +3 more
semanticscholar +1 more source
Velocity: Scalability Improvements in Block Propagation Through Rateless Erasure Coding
International Conference on Blockchain, 2019Blockchain technology and other distributed ledger systems fill an important role in resilient data storage and publication. However, their normally-decentralized methods also bring unique challenges distinct from more traditional approaches. One lies in
N. Chawla +4 more
semanticscholar +1 more source
Verifying distributed erasure-coded data
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, 2007Erasure coding can reduce the space and band width overheads of redundancy in fault-tolerant data storage and delivery systems. But it introduces the fundamental difficulty of ensuring that all erasure-coded fragments correspond to the same block of data. Without such assurance, a different block may be reconstructed from different subsets of fragments.
James Hendricks +2 more
openaire +1 more source

