<--- Back to Details
First PageDocument Content
Information / RAID / Network coding / Reed–Solomon error correction / Peer-to-peer / Resource Interchange File Format / Azure Services Platform / Coding theory / Computing / Erasure code
Date: 2012-01-21 23:00:40
Information
RAID
Network coding
Reed–Solomon error correction
Peer-to-peer
Resource Interchange File Format
Azure Services Platform
Coding theory
Computing
Erasure code

NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds Yuchong Hu† , Henry C. H. Chen† , Patrick P. C. Lee† , Yang Tang‡ † The Chinese University of Hong Kong, ‡ Columbia University ychu

Add to Reading List

Source URL: www.cse.cuhk.edu.hk

Download Document from Source Website

File Size: 159,80 KB

Share Document on Facebook

Similar Documents

RJ10391 (A0610-035) October 24, 2006 Computer Science IBM Research Report Notes on Reliability Models for Non-MDS Erasure Codes James Lee Hafner, KK Rao

RJ10391 (A0610-035) October 24, 2006 Computer Science IBM Research Report Notes on Reliability Models for Non-MDS Erasure Codes James Lee Hafner, KK Rao

DocID: 1nJWy - View Document

1  Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads John W. Byers Dept. of Computer Science

1 Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads John W. Byers Dept. of Computer Science

DocID: 1mcco - View Document

1  Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo∗ † , Zhiying Wang∗ , and Jehoshua Bruck∗ Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA

1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo∗ † , Zhiying Wang∗ , and Jehoshua Bruck∗ Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA

DocID: 1lADI - View Document

LT Codes Michael Luby Digital Fountain, Inc.   Abstract

LT Codes Michael Luby Digital Fountain, Inc. Abstract

DocID: 1gozW - View Document

Hitting Set Algorithms for Fast Data Recovery in the Face of Geographic Correlated Attacks Alon Efrat  Esther Ezra

Hitting Set Algorithms for Fast Data Recovery in the Face of Geographic Correlated Attacks Alon Efrat Esther Ezra

DocID: 1fBlw - View Document