Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,283,395 papers from all fields of science
Search
Sign In
Create Free Account
Singleton bound
Known as:
Singleton
, MDS code
, MDS
Expand
In coding theory, the Singleton bound, named after Richard Collom Singleton, is a relatively crude upper bound on the size of an arbitrary block code…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Block code
Coding theory
Concatenated error correction code
Cyclic code
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Heterogeneous Computation Assignments in Coded Elastic Computing
Nicholas Woolsey
,
Rong-Rong Chen
,
Mingyue Ji
International Symposium on Information Theory
2020
Corpus ID: 210164357
We study the optimal design of a heterogeneous coded elastic computing (CEC) network where machines have varying relative…
Expand
2020
2020
A Note on Self-Dual Generalized Reed-Solomon Codes
Weijun Fang
,
Jun Zhang
,
Shutao Xia
,
Fang-Wei Fu
arXiv.org
2020
Corpus ID: 218870335
A linear code is called an MDS self-dual code if it is both an MDS code and a self-dual code with respect to the Euclidean inner…
Expand
2013
2013
A lattice singleton bound
Srikanth B. Pai
,
B. Rajan
IEEE International Symposium on Information…
2013
Corpus ID: 16175940
The binary coding theory and subspace codes for random network coding exhibit similar structures. The method used to obtain a…
Expand
2013
2013
Enumerating Some Fractional Repetition Codes
S. Anil
,
M. Gupta
,
T. Gulliver
arXiv.org
2013
Corpus ID: 16137855
In a distributed storage systems (DSS), regenerating codes are used to optimize bandwidth in the repair process of a failed node…
Expand
2011
2011
An Efficient Rekeying Function Protocol with Multicast Key Distribution for Group Key Management in MANETs
N. Vimala
,
B. Jayaram
,
Dr. R. Balasubramanian
,
Asst.Professor
2011
Corpus ID: 10782769
Key management in the ad hoc network is a challenging issue concerning the security of the group communication. Group key…
Expand
2010
2010
Efficiently Encodable Irregular QC-LDPC Codes Constructed from Self-Reciprocal Generator Polynomials of MDS Codes
N. Kamiya
IEEE Communications Letters
2010
Corpus ID: 21591858
This letter presents a class of quasi-cyclic (QC) low-density parity-check (LDPC) codes which are efficiently encodable and have…
Expand
Highly Cited
2010
Highly Cited
2010
Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient
V. Cadambe
,
S. Jafar
,
H. Maleki
arXiv.org
2010
Corpus ID: 15251344
We consider a set up where a file of size M is stored in n distributed storage nodes, using an (n,k) minimum storage regenerating…
Expand
2008
2008
Generalized IRA Erasure Correcting Codes for Hybrid Iterative/Maximum Likelihood Decoding
E. Paolini
,
G. Liva
,
B. Matuz
,
M. Chiani
IEEE Communications Letters
2008
Corpus ID: 43059634
The design of low-density parity-check (LDPC) codes under hybrid iterative / maximum likelihood decoding is addressed for the…
Expand
2003
2003
A general encryption scheme based on MDS code
Lihao Xu
IEEE International Symposium on Information…
2003
Corpus ID: 10947055
In this paper, we propose to combine cryptographically strong random key stream generators (including those used in stream…
Expand
1991
1991
On the monotonic property of the probability of undetected error for a shortened code
T. Fujiwara
,
T. Kasami
,
Shou-ping Feng
IEEE Transactions on Information Theory
1991
Corpus ID: 13615280
The monotonic property of the probability of undetected error is considered when a shortened code of a linear code over GF(q) is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE