2013 Information Theory and Applications Workshop (ITA) 2013
DOI: 10.1109/ita.2013.6502958
|View full text |Cite
|
Sign up to set email alerts
|

Local recovery properties of capacity achieving codes

Abstract: Abstract-A code is called locally recoverable or repairable if any symbol of a codeword can be recovered by reading only a small (constant) number of other symbols. The notion of local recoverability is important in the area of distributed storage where a most frequent error-event is a single storage node failure. A common objective is to repair the node by downloading data from as few other storage node as possible.In this paper we study the basic error-correcting properties of a locally recoverable code. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 12 publications
0
3
0
1
Order By: Relevance
“…Comparing with (7), we see that Partition codes are near-optimal in this case. Here note that, it was shown in [33] that for a random erasure channel, the Partition codes are asymptotically optimal in terms of achieving capacity.…”
Section: Conclusion: Comment Of Random Erasuresmentioning
confidence: 92%
“…Comparing with (7), we see that Partition codes are near-optimal in this case. Here note that, it was shown in [33] that for a random erasure channel, the Partition codes are asymptotically optimal in terms of achieving capacity.…”
Section: Conclusion: Comment Of Random Erasuresmentioning
confidence: 92%
“…In particular, in Sec. V, we will show that the family of Simplex codes (dual of Hamming codes) are optimal locally recoverable 1 Recent literature has extended the study of locally recoverable codes to include security constraints [21], notions of repair bandwidth [12], [13], multiple local repair alternatives [20], and probabilistic erasure models [16] (See [5] for a survey). In this work, we concern ourselves with the original notion of locality as described in [8], [18].…”
Section: A Our Contributionmentioning
confidence: 99%
“…In the language used in [18], H(I) would denote the "entropy" associated with X I . Here, the above definition is appropriate since our modeling is adversarial, i.e., we do not presuppose any distribution on the messages or the codebook (see, [16] where such assumptions have been made). However, the behavior of the function H(.)…”
Section: Remarkmentioning
confidence: 99%
“…그러한 부호를 부분접속 복구 부호(Locally repairable code, LRC) 라 하는데, 이에 대한 간단하 며 실용적인 연구가 있었으며 [11,12] 부호 파라미터와 부분성에 연구가 진행되었다 [13,14] . 또한 저장 공간과 부분성에 대한 trade-off를 주는 피라미드 부호가 제안 되었으며 [15] , 자연적으로 부분접속 복구 성질을 갖는 파운틴 부호에 대한 near-MDS 성질의 연구가 발표되 었다 [16] .…”
Section: 만약 어떤 저장소가 소실되어 새로운 저장소에 복구 해 놓아야 하는 경우 전체 데이터 심볼 수 대비 훨씬 적unclassified