2,245 Hits in 5.4 sec

A Novel Decoding Method for the Erasure Codes

Dan Tang, Hongliang Cai, Zhili Zhou
2021 Security and Communication Networks  
The erasure codes are widely used in the distributed storage with low redundancy compared to the replication method.  ...  However, the current research studies about the erasure codes mainly focus on the encoding methods, while there are few studies on the decoding methods.  ...  □ The Proposed Decoding Method for the Erasure Codes In this paper, we will propose a novel decoding method mainly for the erasure codes in the storage system, such as RS code and array codes. e proposed  ... 
doi:10.1155/2021/8755697 fatcat:o63idr4ukbgazomjmrltntu7k4

Numerically Stable Real Number Codes Based on Random Matrices [chapter]

Zizhong Chen, Jack Dongarra
2005 Lecture Notes in Computer Science  
However, most real-number and complex-number codes in literature are quite suspect in their numerical stability.  ...  Error correction codes defined over realnumber and complex-number fields have been studied and recognized as useful in many applications.  ...  Actually, for any burst erasures of ¾¼ elements in Ý, none of the above codes could reconstruct an acceptable Ü. V.  ... 
doi:10.1007/11428831_15 fatcat:2fd77rqjsjbnxbb4g75ld2cmc4

On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes [article]

Mingqiang Li
2013 arXiv   pre-print
For an IDA that adopts an arbitrary non-systematic erasure code, its confidentiality may fall into weak confidentiality.  ...  Information Dispersal Algorithms (IDAs) have been widely applied to reliable and secure storage and transmission of data files in distributed systems.  ...  code. The reliability of an IDA is clear: no more than n − m lost pieces of the n pieces F 1 , F 2 , · · · , F n will not result in data loss.  ... 
arXiv:1206.4123v2 fatcat:lbamrnmlevbkflis3x4vhaykfe

Compressive Oversampling for Robust Data Transmission in Sensor Networks

Zainul Charbiwala, Supriyo Chakraborty, Sadaf Zahedi, Ting He, Chatschik Bisdikian, Younghun Kim, Mani B. Srivastava
2010 2010 Proceedings IEEE INFOCOM  
In this paper, we propose that if CS is employed for source compression, then CS can further be exploited as an application layer erasure coding strategy for recovering missing data.  ...  We show that CS erasure encoding (CSEC) with random sampling is efficient for handling missing data in erasure channels, paralleling the performance of BCH codes, with the added benefit of graceful degradation  ...  This is in contrast to traditional erasure coding schemes that necessitate that the matrix Ω C be invertible for any reconstruction to occur.  ... 
doi:10.1109/infcom.2010.5461926 dblp:conf/infocom/CharbiwalaCZKHBS10 fatcat:flvnpznun5cs3lw5q4npxzbffm

Lmi Based Design Of Optimal Precoder For Mimo Channels With Erasures

Dimuthu Jayasingha, Jingxin Zhang
2012 Zenodo  
Publication in the conference proceedings of EUSIPCO, Bucharest, Romania, 2012  ...  The optimal correlating transform coding for a 2 × 2 coder for a quantized source is presented in [3, 4] .  ...  Multiple description coding (MDC) has proven to be an effective method to recover the source signal after multiple erasures [3] .  ... 
doi:10.5281/zenodo.43045 fatcat:7ftiojxjorhmpc3zmuxpbdjnxy

RSECB: A Reed Solomon Erasure Coding System for Hadoop Clusters

P. Joseph Sylvan
2018 International Journal for Research in Applied Science and Engineering Technology  
In this paper we propose a coding technique known as Reed Solomon Erasure Coding using Backblaze method (RSECB) for Hadoop data archival system for Hadoop clusters where RS (m+n; m) codes are employed  ...  RSECB-Pipeline uses multiple data nodes in a Hadoop cluster for forming data archival pipeline. RSECB-Pipeline conveys the merged single key-value pair to a successive node's local key-value store.  ...  use of Reed Solomon Erasure Coding using Backblaze method of matrix inversion.  ... 
doi:10.22214/ijraset.2018.3615 fatcat:hu6e5jvlmzazbbtxsidbo7k4p4

An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage

Wenfeng Wang, Peiwu Li, Longzhe Han, Shuqiang Huang, Kefu Xu, Changgui Yu, Jin'e Lei
2014 Mathematical Problems in Engineering  
To address the problem of data leakage caused by unreliable service providers and external cyber attacks, an enhanced erasure code-based security mechanism is proposed and elaborated in terms of four aspects  ...  The key design issues, including data division, construction of generator matrix, data encoding, fragment naming, and data decoding, are also described in detail.  ...  Erasure Code-Based Security Mechanism for Cloud Storage Reed-Solomon Erasure Code.  ... 
doi:10.1155/2014/293214 fatcat:cht3tx37pjf5ngehn7lrwq2equ

Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud

Bhargavi Patel
2019 Zenodo  
By applying the erasure code if in any case user data is loss, will be reconstructed which provide more security than existing system.  ...  The user data may be loss in any reasons and user may not have any copy of data. The Existing system not focus on data loss. So in proposed work focus on availability of data by erasure code.  ...  In proposed work the erasure code are used for availability of data in case of failure. A Reed-Solomon erasure code adds redundancy to the system to tolerate failures.  ... 
doi:10.5281/zenodo.3591017 fatcat:ytcz3bornrghtoowsjojjhm2oi

Efficient updates in highly available distributed random access memory

D. Cieslicki, S. Schackeler, T. Schwarz
2006 12th International Conference on Parallel and Distributed Systems - (ICPADS'06)  
Erasure codes provide space-optimal data redundancy to protect this type of storage from node unavailability.  ...  The technique significantly improves on previous work in update speed and also allows for serializable updates to a bucket that is in the process of being recovered.  ...  Related Work Using erasure codes for redundancy is a standard method in disk based storage. RAID Level 5 uses the m+1 simple parity code and RAID Level 6 a number of two-erasures correcting codes.  ... 
doi:10.1109/icpads.2006.41 dblp:conf/icpads/CieslickiSS06 fatcat:e2ioshrwlzhp7bp25r7aja3c6q

Joint Source-Channel Coding Based on Cosine-Modulated Filter Banks for Erasure-Resilient Signal Transmission

Slavica Marinkovic, Christine Guillemot
2005 EURASIP Journal on Advances in Signal Processing  
In particular, for paraunitary filter banks, we show that the signal reconstruction methods derived from the filter bank theory and from coding theory are equivalent, even in the presence of quantization  ...  Perfect reconstruction (PR) for the CMFB-based OFBs with erasures is proven for the case of erasure patterns for which PR depends only on the general structure of the code and not on the prototype filters  ...  As both methods are equivalent, in the sequel, we consider only reconstruction based on the parapseudoinverse of the analysis matrix after erasures.  ... 
doi:10.1155/asp.2005.510 fatcat:ssv27stnxvajnhirrdjf4iohey

Aggrecode: Constructing route intersection for data reconstruction in erasure coded storage

Jing Zhang, Xiangke Liao, Shanshan Li, Yu Hua, Xue Liu, Bin Lin
2014 IEEE INFOCOM 2014 - IEEE Conference on Computer Communications  
In this paper, we propose an erasure coded storage system for data reconstruction, which uses the practical network topology to minimize the reconstruction transmission costs.  ...  Node failures often occur in large-scale data centers today. Erasure coded storage system provides high data reliability via data reconstruction.  ...  ACKNOWLEDGMENT We would like to thank the anonymous reviewers for their comments. This paper is supported in part by National Nature  ... 
doi:10.1109/infocom.2014.6848156 dblp:conf/infocom/ZhangLLHLL14 fatcat:zzczwpujirffzesgczieuhm2uu

Blockchain Data Sharing Query Scheme based on Threshold Secret Sharing

Lu Chen, Xin Zhang, Zhixin Sun, Yuling Chen
2022 Security and Communication Networks  
At the same time, the Blakley space plane equation coefficient matrix is used to segment the data to be uploaded to the blockchain.  ...  It solves the problem that the data cannot be directly stored in the block due to their large size. It facilitates data uploading to the blockchain.  ...  For the n × t-order erasure code matrix, when (n − t) pieces of data are lost or tampered with, the original data can still be recovered through the erasure code decoding mechanism.  ... 
doi:10.1155/2022/8996815 fatcat:xpzyp3cxdjcxxpkxio4li3skwe

A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems

Alessandro Duminuco, Ernst Biersack
2009 2009 29th IEEE International Conference on Distributed Computing Systems  
For erasure codes, generating a new piece requires the transmission of k pieces over the network, resulting in a k times higher reconstruction traffic as compared to replication.  ...  In distributed storage systems, erasure codes represent an attractive solution to add redundancy to stored data while limiting the storage overhead.  ...  A more complex method is represented by erasure codes: the data are processed in order to produce k + h pieces such that any k of them are sufficient to reconstruct the original file, then these pieces  ... 
doi:10.1109/icdcs.2009.14 dblp:conf/icdcs/DuminucoB09 fatcat:wyoluswqfvgn3ap27fy25vmxba

The CORE Storage Primitive: Cross-Object Redundancy for Efficient Data Repair & Access in Erasure Coded Storage [article]

Kyumars Sheykh Esmaili, Lluis Pamies-Juarez, Anwitaman Datta
2013 arXiv   pre-print
However, traditional erasure codes are inefficient on reading stored data in degraded environments (when nodes might be unavailable), and on replenishing lost data (vital for long term resilience).  ...  Erasure codes are an integral part of many distributed storage systems aimed at Big Data, since they provide high fault-tolerance for low overheads.  ...  Two recent academic prototypes -NCFS [28] and NCCloud [29] likewise explore the feasibility of applying network coding techniques for repairing lost data.  ... 
arXiv:1302.5192v4 fatcat:rwljkazcc5azfi7khqpsy7vc5i

Multiple Description Image Coder Using Correlating Transforms

Gianmarco Romano, Pierluigi Salvo Rossi, Francesco Palmieri
2004 Zenodo  
Publication in the conference proceedings of EUSIPCO, Viena, Austria, 2004  ...  TRANSFORM CODING WITH ERASURES Let's start considering the coding-decoding cascade model shown in Figure 1 .  ...  In this article a new compression scheme for images is proposed as a modification of widely adopted methods based on Discrete Cosine Transform (DCT).  ... 
doi:10.5281/zenodo.38579 fatcat:cy4khvg7crgpfbqujpkbusnbeq
« Previous Showing results 1 — 15 out of 2,245 results