Erasure code ≈ Erasure code
View article
Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix-Vector Multiplication Open
Large-scale machine learning and data mining applications require computer systems to perform massive matrix-vector and matrix-matrix multiplication operations that need to be parallelized across multiple nodes. The presence of straggling …
View article
Layered Constructions for Low-Delay Streaming Codes Open
We propose a new class of error correction codes for low-delay streaming communication. We consider an online setup where a source packet arrives at the encoder every $M$ channel uses, and needs to be decoded with a maximum delay of $T$ pa…
View article
Repairing Reed-Solomon Codes With Multiple Erasures Open
Despite their exceptional error-correcting properties, Reed-Solomon (RS) codes have been overlooked in distributed storage applications due to the common belief that they have poor repair bandwidth. A naive repair approach would require fo…
View article
Linear-time maximum likelihood decoding of surface codes over the quantum erasure channel Open
Surface codes are among the best candidates to ensure the fault-tolerance of\na quantum computer. In order to avoid the accumulation of errors during a\ncomputation, it is crucial to have at our disposal a fast decoding algorithm to\nquick…
View article
Construction of Partial MDS and Sector-Disk Codes With Two Global Parity Symbols Open
Partial MDS (PMDS) codes are erasure codes combining local (row) correction with global additional correction of entries, while sector-disk (SD) codes are erasure codes that address the mixed failure mode of current redundant arrays of ind…
View article
Clay codes: moulding MDS codes to yield an MSR code Open
With increase in scale, the number of node failures in a data center increases sharply. To ensure availability of data, failure-tolerance schemes such as Reed-Solomon (RS) or more generally, Maximum Distance Separable (MDS) erasure codes a…
View article
Reed-Muller codes achieve capacity on erasure channels Open
We introduce a new approach to proving that a sequence of deterministic linear codes achieves capacity on an erasure channel under maximum a posteriori decoding. Rather than relying on the precise structure of the codes, our method exploit…
View article
Distributed Storage in Mobile Wireless Networks With Device-to-Device Communication Open
We consider the use of distributed storage (DS) to reduce the communication cost of content delivery in wireless networks. Content is stored (cached) in a number of mobile devices using an erasure correcting code. Users retrieve content fr…
View article
Cost-Effective Data Placement in Edge Storage Systems With Erasure Code Open
Edge computing, as a new computing paradigm, brings cloud computing's computing and storage capacities to network edge for providing low latency services for users. The networked edge servers in a specific area constitute edge storage syst…
View article
Parity models Open
Machine learning models are becoming the primary work-horses for many applications. Services deploy models through prediction serving systems that take in queries and return predictions by performing inference on models. Prediction serving…
View article
Maximally Recoverable Codes for Grid-like Topologies Open
The explosion in the volumes of data being stored online has resulted in distributed storage systems transitioning to erasure coding based schemes. Yet, the codes being deployed in practice are fairly short. In this work, we address what w…
View article
Reliable and Low-Latency Fronthaul for Tactile Internet Applications Open
With the emergence of Cloud-RAN as one of the dominant architectural solutions for next-generation mobile networks, the reliability and latency on the fronthaul (FH) segment become critical performance metrics for applications such as the …
View article
Practical Design Considerations for Wide Locally Recoverable Codes (LRCs) Open
Most of the data in large-scale storage clusters is erasure coded. At exascale, optimizing erasure codes for low storage overhead, efficient reconstruction, and easy deployment is of critical importance. Locally recoverable codes (LRCs) ha…
View article
Agar: A Caching System for Erasure-Coded Data Open
International audience
View article
Density Evolution for Deterministic Generalized Product Codes on the Binary Erasure Channel at High Rates Open
Generalized product codes (GPCs) are extensions of product codes (PCs), where code symbols are protected by two component codes but not necessarily arranged in a rectangular array. We consider a deterministic construction of GPCs (as oppos…
View article
SeF: A Secure Fountain Architecture for Slashing Storage Costs in Blockchains Open
Full nodes, which synchronize the entire blockchain history and independently validate all the blocks, form the backbone of any blockchain network by playing a vital role in ensuring security properties. On the other hand, a user running a…
View article
Decentralized Transaction Mechanism Based on Smart Contract in Distributed Data Storage Open
Distributed data storage has received more attention due to its advantages in reliability, availability and scalability, and it brings both opportunities and challenges for distributed data storage transaction. The traditional transaction …
View article
Pangolin: A Fault-Tolerant Persistent Memory Programming Library Open
Non-volatile main memory (NVMM) allows programmers to build complex, persistent, pointer-based data structures that can offer substantial performance gains over conventional approaches to managing persistent state. This programming model r…
View article
Packet Layer Erasure Coding in Interplanetary Links: The LTP Erasure Coding Link Service Adapter Open
Interplanetary Networks are affected by long propagation delays, intermittent connectivity, possible packet losses due to residual errors, and other impairments. To cope with these challenges, the Delay-/Disruption-Tolerant Networking (DTN…
View article
Rateless codes for near-perfect load balancing in distributed matrix-vector multiplication Open
Large-scale machine learning and data mining applications require computer systems to perform massive matrix-vector and matrix-matrix multiplication operations that need to be parallelized across multiple nodes. The presence of straggling …
View article
Overview of current techniques in remote data auditing Open
The emergence of cloud computing brings the infinite imagination space, both in individual and organizations, due to its unprecedented advantages in the IT history: on-demand self-service, ubiquitous network access, location independent re…
View article
An Erasure-Coded Storage System for Edge Computing Open
Emerging computing paradigm edge computing expects to store and process data at the network edge with reduced latency and improved network bandwidth. To the best of our knowledge, key performance issues such as coding performance of erasur…
View article
Reducing the Bandwidth of Block Propagation in Bitcoin Network With Erasure Coding Open
With the popularity of Bitcoin, there is a greater demand for the scalability of the Bitcoin blockchain, which is susceptible to the efficiency of block propagation. In the Bitcoin blockchain, efficient block propagation approach can reduc…
View article
Transfer Learning based Failure Prediction for Minority Disks in Large Data Centers of Heterogeneous Disk Systems Open
The storage system in large scale data centers is typically built upon thousands or even millions of disks, where disk failures constantly happen. A disk failure could lead to serious data loss and thus system unavailability or even catast…
View article
A Hybrid ARQ scheme combining erasure codes and selective retransmissions for reliable data transfer in underwater acoustic sensor networks Open
In this paper, we investigate a hybrid automatic repeat request (ARQ) scheme for reliable data transfer in multi-hop underwater acoustic sensor networks (UASNs). The proposed scheme combines Reed-Solomon-based packet level erasure coding a…
View article
Low-Latency and Energy-Efficient Data Preservation Mechanism in Low-Duty-Cycle Sensor Networks Open
Similar to traditional wireless sensor networks (WSN), the nodes only have limited memory and energy in low-duty-cycle sensor networks (LDC-WSN). However, different from WSN, the nodes in LDC-WSN often sleep most of their time to preserve …
View article
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure Open
This article tackles the problem of designing efficient binary-level verification for a subset of information flow properties encompassing constant-time and secret-erasure . These properties are crucial for cryptographic implementations bu…
View article
Permutation-based Decoding of Reed-Muller Codes in Binary Erasure Channel Open
In this paper, we consider the problem of decoding Reed-Muller (RM) codes in binary erasure channel. We propose a novel algorithm, which exploits several techniques, such as list recursive (successive cancellation) decoding based on Plotki…
View article
Hybris Open
Besides well-known benefits, commodity cloud storage also raises concerns that include security, reliability, and consistency. We present Hybris key-value store, the first robust hybrid cloud storage system, aiming at addressing these conc…
View article
Age-Critical Long Erasure Coding-CCSDS File Delivery Protocol for Dual-Hop S-IoT Open
The upcoming satellite Internet of Things (S-IoT) can provide status updates relaying for ground user equipment (UE). However, the S-IoT cannot utilize conventional hybrid automatic retransmission request (HARQ) for reliable transmission d…