2005
DOI: 10.1016/j.comcom.2004.12.023
|View full text |Cite
|
Sign up to set email alerts
|

Content-access QoS in peer-to-peer networks using a fast MDS erasure code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0
1

Year Published

2007
2007
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 18 publications
0
10
0
1
Order By: Relevance
“…Indeed, any [n, k] MDS code with block length n and k symbols of information can be successfully recovered from any subset of its entries of length k or more. This property makes MDS codes favorable FEC schemes over the erasure channels like the Internet [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, any [n, k] MDS code with block length n and k symbols of information can be successfully recovered from any subset of its entries of length k or more. This property makes MDS codes favorable FEC schemes over the erasure channels like the Internet [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…2, the average size of the Tetrys encoding window is 521.6 bundles. Following [13] and the encoding window size, we would have been able to achieve a maximum bit rate of 210KB/s on a PIII 933 Mhz, twice the bit rate assumed in our settings. Depending on the trade-off between the complexity and the cost of the feedback mechanism, we can adapt the latter (active/passive/bridged) [5] since the smaller the feedback delay, the smaller the complexity.…”
Section: O(mentioning
confidence: 99%
“…Indeed, any [N, K] MDS code can be successfully decoded from any subset of its coded symbols of size K or more. This property makes MDS codes suitable for use over the erasure channels like the Internet [1], [2], [10]. However, the practical encoding-decoding algorithms for such codes have quadratic time complexity in terms of the code block length [11].…”
Section: Introductionmentioning
confidence: 99%
“…Different erasure channel models are adopted to study the performance of end-to-end connections over the Internet [1], [2]. In such models, each packet is seen as a q = 2 b -ary symbol where b is the packet length in bits.…”
Section: Introductionmentioning
confidence: 99%