2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2014
DOI: 10.1109/icassp.2014.6854848
|View full text |Cite
|
Sign up to set email alerts
|

Asymptotic analysis of failed recovery probability in a distributed wireless storage system with limited sum storage capacity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…For probabilistic access model, we present three figures to analyze the optimal storage allocation in the interval α ∈ [1,10]. In Fig.…”
Section: B Probabilistic Accessmentioning
confidence: 99%
See 1 more Smart Citation
“…For probabilistic access model, we present three figures to analyze the optimal storage allocation in the interval α ∈ [1,10]. In Fig.…”
Section: B Probabilistic Accessmentioning
confidence: 99%
“…Several studies have looked into how to allocate redundant chunks of data over the storage nodes, focusing mostly on optimizing two DSS performance metrics [7]- [10]. One of 1 pei.peng@rutgers.edu; emina.soljanin@rutgers.edu them is the probability of successful data recovery when only a subset of (possibly failed) nodes are accessed, and the other is the average download time when a set of nodes from which the file can certainly be recovered is accessed.…”
Section: Introductionmentioning
confidence: 99%
“…Since µ s (α|k) = 1 Ts(α|k) , (8) is simply inferred from (9). While the µ s (α|k) expression in (8) looks rather complicated, it is used in the following sections to simplify the service rate analysis in the form of the following corollary.…”
Section: Analysis Of µ S (α)mentioning
confidence: 99%
“…. , x N ), subject to (2), so that the probability to recover the data successfully is maximized. Assuming that the data was encoded using a maximum-distance separable (MDS) code, the data object can be recovered if the amount of data collected by the collector is above or equal to one unit.…”
Section: A System Model and State Of The Artmentioning
confidence: 99%
“…However, the problem considered in computer networks is aimed on an efficient allocation of memory volumes over the network, but without limiting the memory volume, allocated to one particular network node. For wireless DSS, the problem of limited memory has been only considered via limitation of the total amount of data, allocated to represent one information object [2]. Such an approach allows to quantify the total memory volume, occupied by a specific application in a wireless network, but doe not limit memory volume per network node.…”
Section: Introductionmentioning
confidence: 99%