Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Erasure code

Known as: Erasure correcting code, Erasure codes, Erasure (disambiguation) 
In information theory, an erasure code is a forward error correction (FEC) code for the binary erasure channel, which transforms a message of k… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Distributed storage systems for large clusters typically use replication to provide reliability. Recently, erasure codes have… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Windows Azure Storage (WAS) is a cloud storage system that provides customers the ability to store seemingly limitless amounts of… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 6
Is this relevant?
Highly Cited
2012
Highly Cited
2012
To reduce storage overhead, cloud file systems are transitioning from replication to erasure codes. This process has revealed new… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Peer-to-peer distributed storage systems provide reliable access to data through redundancy spread over nodes across the Internet… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this correspondence, we consider the problem of constructing an erasure code for storage over a network when the data sources… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
High availability in peer-to-peer DHTs requires data redundancy. This paper compares two popular redundancy schemes: replication… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The quality of peer-to-peer content distribution can suffer when malicious participants intentionally corrupt content. Some… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Peer-to-peer systems are positioned to take advantage of gains in network bandwidth, storage capacity, and computational… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
  • M. Luby
  • The 43rd Annual IEEE Symposium on Foundations of…
  • 2002
  • Corpus ID: 1861068
We introduce LT codes, the first rateless erasure codes that are very efficient as the data length grows. 
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Reliable communication protocols require that all the intended recipients of a message receive the message intact. Automatic… Expand
  • figure 1
  • figure 2
  • table 1
Is this relevant?