First Page | Document Content | |
---|---|---|
![]() Date: 2006-01-12 12:03:50Luby transform code Raptor code Packet loss Fountain code Low-density parity-check code Forward error correction Network packet Reed–Solomon error correction Block code Coding theory Information theory Information | Source URL: switzernet.comDownload Document from Source WebsiteFile Size: 232,97 KBShare Document on Facebook |
![]() | 1 Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads John W. Byers Dept. of Computer ScienceDocID: 1mcco - View Document |
![]() | LT Codes Michael Luby Digital Fountain, Inc. AbstractDocID: 1gozW - View Document |
![]() | www.ietdl.org Published in IET Communications Received on 29th September 2013 Revised on 16th December 2013 Accepted on 26th January 2014 doi: iet-comDocID: 1gglw - View Document |
![]() | Steganography via Codes for Memory with Defective Cells Jessica Fridricha , Miroslav Goljana , and David Soukalb a Department of Electrical and Computer Engineering,DocID: 19r2S - View Document |
![]() | A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage James S. Plank University of Tennessee Jianqiang LuoDocID: 18UIB - View Document |