<--- Back to Details
First PageDocument Content
Communication / Topology / Information / Steganalysis / Erasure code / Quantization / Reed–Solomon error correction / Luby transform code / Information theory / Coding theory / Mathematics / Steganography
Date: 2006-04-26 08:10:15
Communication
Topology
Information
Steganalysis
Erasure code
Quantization
Reed–Solomon error correction
Luby transform code
Information theory
Coding theory
Mathematics
Steganography

Writing on Wet Paper a

Add to Reading List

Source URL: www.ws.binghamton.edu

Download Document from Source Website

File Size: 121,52 KB

Share Document on Facebook

Similar Documents

Coding theory / Error detection and correction / Engineering / Reliability engineering / Computing / RAID / Systems science / Low-density parity-check code / Erasure code / ReedSolomon error correction / Failure rate / Fault tolerance

RJ10391 (A0610-035) October 24, 2006 Computer Science IBM Research Report Notes on Reliability Models for Non-MDS Erasure Codes James Lee Hafner, KK Rao

DocID: 1nJWy - View Document

Coding theory / Packet loss / Erasure code / Transmission Control Protocol / Forward error correction / Fountain code / Communications protocol / Error detection and correction / Channel / Retransmission / Luby transform code

1 Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads John W. Byers Dept. of Computer Science

DocID: 1mcco - View Document

Coding theory / Mathematics / Discrete mathematics / Erasure code / Permutation / MDS matrix / Linear subspace / Hamming code / ReedSolomon error correction

1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo∗ † , Zhiying Wang∗ , and Jehoshua Bruck∗ Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA

DocID: 1lADI - View Document

Mathematics / Fountain code / Luby transform code / Erasure code / Reed–Solomon error correction / Systematic code / Symbol / Soliton distribution / Code / Coding theory / Information theory / Discrete mathematics

LT Codes Michael Luby Digital Fountain, Inc. Abstract

DocID: 1gozW - View Document

Computational geometry / Ε-net / Connectivity / NP / Erasure code / Planar graph / NP-complete problems / Dominating set / Tutte polynomial / Graph theory / Theoretical computer science / Mathematics

Hitting Set Algorithms for Fast Data Recovery in the Face of Geographic Correlated Attacks Alon Efrat Esther Ezra

DocID: 1fBlw - View Document