Optimal Construction of Regenerating Code Through Rate-Matching in Hostile Networks
نویسندگان
چکیده
منابع مشابه
fault location in power distribution networks using matching algorithm
چکیده رساله/پایان نامه : تاکنون روشهای متعددی در ارتباط با مکان یابی خطا در شبکه انتقال ارائه شده است. استفاده مستقیم از این روشها در شبکه توزیع به دلایلی همچون وجود انشعابهای متعدد، غیر یکنواختی فیدرها (خطوط کابلی، خطوط هوایی، سطح مقطع متفاوت انشعاب ها و تنه اصلی فیدر)، نامتعادلی (عدم جابجا شدگی خطوط، بارهای تکفاز و سه فاز)، ثابت نبودن بار و اندازه گیری مقادیر ولتاژ و جریان فقط در ابتدای...
Algebraic Matching of Vulnerabilities in a Low-Level Code
This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...
متن کاملLocally Repairable Regenerating Code Constructions
In this work, we give locally repairable regenerating code (LRRC) [1]–[4] constructions that can protect the file size promised by the graph analysis of the modified family helper selection (MFHS) scheme [1] at the minimum-bandwidthregenerating (MBR) point. I. RANDOM LINEAR CODE CONSTRUCTION FOR A CLASS OF (n, k, d, r) PARAMETERS In this section, we prove the existence and construction of linea...
متن کاملCode Construction for Two-Source Interference Networks
Most literature on network coding focuses on the multicast case where performance bounds and codes that achieve these bounds were found. The general case seems to be much more complicated to analyze. Koetter and Médard [1] gave an algebraic formulation of linear network codes in the general communication problem with multiple sources. However, the complexity of finding the coding coefficients o...
متن کاملCapacity Assurance in Hostile Networks
Linear network coding provides a new communication diagram to significantly increase the network capacity by allowing the relay nodes to encode the incoming messages. However, this communication diagram is fragile to communication errors and pollution attacks. How to combat errors while maintaining the network efficiency is a challenging research problem. In this dissertation, we study how to c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2017
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2017.2694441