Results 1 to 10 of about 63,034 (284)
MDS Constacyclic Codes and MDS Symbol-Pair Constacyclic Codes [PDF]
Symbol-pair codes are used to protect against symbol-pair errors in high density data storage systems. One of the most important tasks in symbol-pair coding theory is to design MDS codes.
Hai Q. Dinh +3 more
doaj +2 more sources
Application of Constacyclic codes to Quantum MDS Codes [PDF]
Quantum maximal-distance-separable (MDS) codes form an important class of quantum codes. To get $q$-ary quantum MDS codes, it suffices to find linear MDS codes $C$ over $\mathbb{F}_{q^2}$ satisfying $C^{\perp_H}\subseteq C$ by the Hermitian construction ...
Chen, Bocong, Ling, San, Zhang, Guanghui
core +3 more sources
Zigzag Codes: MDS Array Codes with Optimal Rebuilding [PDF]
MDS array codes are widely used in storage systems to protect data against erasures. We address the \emph{rebuilding ratio} problem, namely, in the case of erasures, what is the fraction of the remaining information that needs to be accessed in order to ...
Itzhak Tamo +4 more
core +6 more sources
MDS Array Codes with Optimal Rebuilding [PDF]
MDS array codes are widely used in storage systems to protect data against erasures. We address the rebuilding ratio problem, namely, in the case of erasures, what is the the fraction of the remaining information that needs to be accessed in order to
Bruck, Jehoshua +2 more
core +6 more sources
Projective MDS Codes Over GF(27)
MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix.
Emad Bakr Abdulkareem Al-Zangana
doaj +1 more source
Partial MDS Codes With Regeneration [PDF]
Extended version of arXiv:2001 ...
Lukas Holzbaur +3 more
openaire +2 more sources
On the Existence of XOR-Based Codes for Private Information Retrieval with Private Side Information
We consider the problem of Private Information Retrieval with Private Side Information (PIR-PSI), wherein the privacy of the demand and the side information are jointly preserved. Although the capacity of the PIR-PSI setting is known, we observe that the
Murali Krishnan K. H., Jagadeesh Harshan
doaj +1 more source
Strongly-MDS convolutional codes [PDF]
33 ...
Gluesing-Luerssen, H +2 more
openaire +3 more sources
MDS Code Based Ultralightweight Authentication Protocol for RFID System
Privacy and security are central issues in the deployment of an RFID system. It is vulnerable to several attacks, such as replay attacks, location tracking, man-in-middle attack, de-synchronization attack, etc., due to the inherent weaknesses of ...
Pramod Kumar Maurya +2 more
doaj +1 more source
Convertible Codes: New Class of Codes for Efficient Conversion of Coded Data in Distributed Storage [PDF]
Erasure codes are typically used in large-scale distributed storage systems to provide durability of data in the face of failures. In this setting, a set of k blocks to be stored is encoded using an [n, k] code to generate n blocks that are then stored ...
Maturana, Francisco, Rashmi, K. V.
core +1 more source

