First Page | Document Content | |
---|---|---|
![]() Date: 2006-04-26 08:10:15Communication Topology Information Steganalysis Erasure code Quantization Reed–Solomon error correction Luby transform code Information theory Coding theory Mathematics Steganography | Add to Reading List |
![]() | RJ10391 (A0610-035) October 24, 2006 Computer Science IBM Research Report Notes on Reliability Models for Non-MDS Erasure Codes James Lee Hafner, KK RaoDocID: 1nJWy - View Document |
![]() | 1 Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads John W. Byers Dept. of Computer ScienceDocID: 1mcco - View Document |
![]() | 1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo∗ † , Zhiying Wang∗ , and Jehoshua Bruck∗ Engineering Department, California Institute of Technology, Pasadena, CA 91125, USADocID: 1lADI - View Document |
![]() | LT Codes Michael Luby Digital Fountain, Inc. AbstractDocID: 1gozW - View Document |
![]() | Hitting Set Algorithms for Fast Data Recovery in the Face of Geographic Correlated Attacks Alon Efrat Esther EzraDocID: 1fBlw - View Document |