First Page | Document Content | |
---|---|---|
![]() Date: 2004-11-17 13:32:22Luby transform code Erasure code Forward error correction Cryptographic hash function Reed–Solomon error correction Hash function Decoder Digital signature Systematic code Coding theory Error detection and correction Cryptography | Source URL: www.isoc.orgDownload Document from Source WebsiteFile Size: 206,41 KBShare Document on Facebook |
![]() | 1 Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads John W. Byers Dept. of Computer ScienceDocID: 1mcco - View Document |
![]() | LT Codes Michael Luby Digital Fountain, Inc. AbstractDocID: 1gozW - View Document |
![]() | www.ietdl.org Published in IET Communications Received on 29th September 2013 Revised on 16th December 2013 Accepted on 26th January 2014 doi: iet-comDocID: 1gglw - View Document |
![]() | Steganography via Codes for Memory with Defective Cells Jessica Fridricha , Miroslav Goljana , and David Soukalb a Department of Electrical and Computer Engineering,DocID: 19r2S - View Document |
![]() | A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage James S. Plank University of Tennessee Jianqiang LuoDocID: 18UIB - View Document |