1960
DOI: 10.1137/0108018
|View full text |Cite
|
Sign up to set email alerts
|

Polynomial Codes Over Certain Finite Fields

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
1,408
0
22

Year Published

1999
1999
2017
2017

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 2,839 publications
(1,505 citation statements)
references
References 2 publications
2
1,408
0
22
Order By: Relevance
“…In general, FEC in application layer is called Application Layer FEC (AL-FEC) and a variety of FEC algorisms are used for AL-FEC such as Reed-Solomon [28], LDPC [29], LDGM [2], and Raptor Code [30]. ReedSolomon is used for many distributed storage systems such as RAID [4], Ocean Store [26], and RobuSTore [24].…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…In general, FEC in application layer is called Application Layer FEC (AL-FEC) and a variety of FEC algorisms are used for AL-FEC such as Reed-Solomon [28], LDPC [29], LDGM [2], and Raptor Code [30]. ReedSolomon is used for many distributed storage systems such as RAID [4], Ocean Store [26], and RobuSTore [24].…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Figs. [18][19][20] show that the exponential approximation is accurate, and gives a lower bound for other distributions. Using a heavy-tailed distribution the proportion of short lived nodes is high, but they have fewer children upon their departure, hence their impact is lower on E[∆].…”
Section: Performance Evaluation: Node Churnmentioning
confidence: 99%
“…For this simple example we do not need an iterative solution, but we can substitute (20) into (21), and solve for P(V 1 = 1) and P(V 2 = 1). For example, for p = 0.1 we get P(V 1 = 1) = 0.9764 and P(V 2 = 1) = 0.9714.…”
Section: Examplementioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, QR codes are readable from different angles and the data can be decoded successfully even if the code is partially covered or damaged [12]. This is because of robust error correction that is based on Reed-Solomon Codes [19]. There are four different error correction levels namely L(Low 7%), M(Medium 15%), Q(Quartile 25%) and H(High 30%) Error correction level L tolerates up to 7% unreadable modules respectively [31].…”
Section: The Qr Code Standardmentioning
confidence: 99%