• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 22,320
Next 10 →

Table 2: Comparison of encoding times for erasure codes.

in A Digital Fountain Approach to Reliable Distribution of Bulk Data
by John W. Byers, Michael Luby, Michael Mitzenmacher, Ashutosh Rege 1998
Cited by 281

Table 2: Comparison of encoding times for erasure codes.

in A digital fountain approach to reliable distribution of bulk data
by John W. Byers, Michael Luby, Michael Mitzenmacher, Ashutosh Rege 1998
Cited by 281

Table 2: Comparison of encoding times for erasure codes.

in A digital fountain approach to reliable distribution of bulk data
by John W. Byers, Michael Luby, Michael Mitzenmacher, Ashutosh Rege 1998
Cited by 281

Table 2: Comparison of encoding times for erasure codes.

in A digital fountain approach to reliable distribution of bulk data
by John W. Byers, Michael Luby, Michael Mitzenmacher, Ashutosh Rege 1998
Cited by 281

Table 2: Comparison of encoding times for erasure codes.

in A Digital Fountain Approach to Reliable Distribution of Bulk Data
by Michael Luby, et al.

Table 2: Characteristics of Erasure Correcting Codes Discussed.

in Coding Techniques for Handling Failures in Large Disk Arrays
by Lisa Hellerstein, Garth A. Gibson, Richard M. Karp, Randy H. Katz, David A. Patterson 1994
"... In PAGE 32: ... This paper has explored the choice and implementation of redundancy codes for the practi- cal constraints of disk arrays. In Table2 , we summarize the characteristics of the main codes dis- cussed in this paper. Our codes all minimize the number of check disks that must be updated whenever an information disk is updated.... ..."
Cited by 78

Table 4.2: Comparison of normalized routing overhead for several erasure coding and simple replication based routing schemes.

in Acknowledgments
by Chen-hung Yu 2007

Table 5 2-Paths optimization based on lag-1 (with erasure code) Rate (pkts/s)

in Multi-path streaming: Optimization of load distribution
by A.L.H. Chow, L. Golubchik, J.C.S. Lui, W.-J. Lee

Table 4: The recovery accuracy of different codes for the erasure pattern in Example 1

in Numerically stable real-number codes based on random matrices
by Zizhong Chen
"... In PAGE 4: ... Table 3 shows how each of our generator matrices is generated. Table4 compares the re- covery accuracy of our codes for the example erasure in section IV with that of the existing codes. Table 4 shows our codes are able to reconstruct the origi-... In PAGE 4: ... Table 4 compares the re- covery accuracy of our codes for the example erasure in section IV with that of the existing codes. Table4 shows our codes are able to reconstruct the origi-... ..."

Table 4: The recovery accuracy of different codes for the erasure pattern in Example 1

in Numerically stable real-number codes based on random matrices
by Zizhong Chen
"... In PAGE 4: ... Table 3 shows how each of our generator matrices is generated. Table4 compares the re- covery accuracy of our codes for the example erasure in section IV with that of the existing codes. Table 4 shows our codes are able to reconstruct the origi- nal information a6... In PAGE 4: ... Table 4 compares the re- covery accuracy of our codes for the example erasure in section IV with that of the existing codes. Table4 shows our codes are able to reconstruct the origi- nal information a6... ..."
Next 10 →
Results 1 - 10 of 22,320
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University