First Page | Document Content | |
---|---|---|
![]() Date: 2004-11-17 13:32:22Luby transform code Erasure code Forward error correction Cryptographic hash function Reed–Solomon error correction Hash function Decoder Digital signature Systematic code Coding theory Error detection and correction Cryptography | Source URL: www.isoc.orgDownload Document from Source WebsiteFile Size: 206,41 KBShare Document on Facebook |
![]() | RJ10391 (A0610-035) October 24, 2006 Computer Science IBM Research Report Notes on Reliability Models for Non-MDS Erasure Codes James Lee Hafner, KK RaoDocID: 1nJWy - View Document |
![]() | 1 Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads John W. Byers Dept. of Computer ScienceDocID: 1mcco - View Document |
![]() | 1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo∗ † , Zhiying Wang∗ , and Jehoshua Bruck∗ Engineering Department, California Institute of Technology, Pasadena, CA 91125, USADocID: 1lADI - View Document |
![]() | LT Codes Michael Luby Digital Fountain, Inc. AbstractDocID: 1gozW - View Document |
![]() | Hitting Set Algorithms for Fast Data Recovery in the Face of Geographic Correlated Attacks Alon Efrat Esther EzraDocID: 1fBlw - View Document |