JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY Vol. 51 No. 1 Feb : (2016) DOI: / j. issn

Size: px
Start display at page:

Download "JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY Vol. 51 No. 1 Feb : (2016) DOI: / j. issn"

Transcription

1 JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY Vo. 51 No. 1 Feb : (2016) DOI: / j. issn !"#(k + 2,k)Hadamard MSR $,, ( ,9: ; ) % &:& ' <=4 >,?@A 23(k + 2,k)Hadamard MSR. B 4CD E 2 D,FG HIJKL. M E,N 2 D O, 4E,O 4P. Q N RS?@A<=4TU$V,WXY<= 4 α D '; α / 2,C 2 D,G k + 1 D<=&C Z[F 1 D. \]A^3 E 4 HIJ_L4 2 D `a,b_c TU <=;^ E HIJ_L4 2 D 4 & & 0 4,b_c TU 1 D <=;^ E HIJ_L4 2 D 4 4 & 1,b_c TU 2 D <=. 3 4<= > A Hadamard MSR 4,_c TU <= 1 D <=. ' :' ; ; # ;MSR ; ;c ;TU!:TN ()$:A A New (k + 2,k)Hadamard Minimum Storage Regenerating Code ZHANG Sina, TANG Xiaohu, LI Jie (Schoo of Information Science and Technoogy,Southwest Jiaotong University,Chengdu ,China) Abstract:To reduce the storage capacity of nodes in distributed storage systems,a new (k + 2,k) Hadamard Minimum Storage Regenerating (MSR)code was constructed. Each coding matrix is reated to two vaues,from which the diagona eements of this coding matrix are seected. These two vaues appear in the coding matrix in a repeating pattern,but with different repeating cyces for different matrices. Based on the structure of the coding matrix,a repair strategy was constructed. The repair strategy divides symbos in the faied node into α / 2 groups with two symbos in each group,then the two symbos are recovered by downoading one symbo from each of the other k + 1 nodes. If the two vaues reated to each coding matrix are unequa,the new Hadamard MSR code can optimay repair systematic nodes. If the sum of two vaues reated to each coding matrix is nonzero and the k vaues are the same,the new Hadamard MSR code can optimay repair the first parity node. If the sum of the inverse of two vaues reated to each coding matrix is one,the new Hadamard MSR code can optimay repair the second parity node. The new code reduces the storage capacity to the bond for Hadamard MSR code. Further,it can optimay repair a systematic nodes and one parity node. Key words:distributed;storage;regenerating code;msr code;high code rate;optima;repair ' ><=[F > 4, ; a =,M a 4, OceanStore [1] Tota Reca [2] DHash + + [3]. &A \ 4_ S _ S,' 4. : : (1985 ),,!"#,!"$%&',E mai:nsz1221@ 163. com :()*(1971 ),+,,-, #./,!"$%&01,E mai:xhtang_scce@ home. swjtu. edu. cn :,()*,. 234(k + 2,k)Hadamard MSR [J].,2016,51(1): ,200.

2 1,: (k + 2,k)Hadamard MSR 189 4,G. $ V 4 ' Facebook 4 Hadoop Googe Coossus Microsoft Azure [4]. Q,W D )& M = kα 4 ; )4 n ( )& α), k _ U, MDS (maximum distance separabe)s. M,<= 4 & >,, D<=XY,&TUG ( ) & α), G k D<= G,,& T U M / k D, M D., [5][ Ac) #(minimum storage regenerating,msr),b MDS S, `. B W<= 4 & >,MTUXY<=4 M / k D, G d D(d k)_ <= G ' [6], 4 >( &TU )& dm / k(d - k + 1)< M. (n = k + 2,k) MSR : (1),^KL <=, ; (2) G MSR `, c) [7 8]. 4(n = k + 2,k) MSR [9 15]. G, [9][ 4 Hadamard MSR 4 <= <= 4 ; D > MDS. N RS Hadamard MSR _ Q 4', <= 4, <= 4, c 3S. [16]\]A(k + 2,k)Hadamard MSR 4<= > α 4 & 2 k,, [9][ 4 Hadamard MSR 4<= > α = 2 k + 1, 4 A D 3 4(k + 2,k)Hadamard MSR. 3 4<= > α A 2 k, c 3S,_c TU <=, c TU D <=, D S4 ), <= 2,GXY <=, <=`, <=4X Y, &. 4 X,! "#$014 %. 1 (k + 2,k)Hadamard MSR $# *+,-./0 M& F q ', (k + 2,k) MSR D )& M = kα 4,#; k + 2 ) & α 4. G,k 4, 2 4(S). N k + 2 '* k + 2 D <=. 4<= & <=,G <= & <=. ^W<= i (1 i k + 2) 4 D α +, % > c i )-, c i =(c i,1,c i,2,,c i,α) T, X.S, <= k _)-& <= 4, c k + 1 = c 1 + c c k, <= k _)-& <= 4(S /, c k + 2 = A 1 c 1 + A 2 c A k c k, G,A i (1 i k) α α 4E, & <= i 4 E. ^ B MSR K (k + 2,k) Hadamard MSR, E A 1,A 2,,A k & HE,G E A i (1 i k)_)-& A i = diag(a i,1,a i,2,,a i,α), G,a i, F q,1 α. (k + 2,k)Hadamard MSR 40? ) ) 1 _,M(k + 2,k)Hadamard MSR, <= 4 <= 4 `, G 4.,M <= 4, <= 4,,(k + 2,k)HadamardMSR 1 1 (k + 2,k)Hadamard MSR $#*+ Tab. 1 Structure of (k + 2,k)Hadamard MSR code <= 1 <= 2 <= k <= k + 2 <= k + 2 c i,1 c k+2,1 = k a i,1 c i,1 1 c 1,1 c 2,1 c k,1 c k + 1,1 = k 2 c 1,2 c 2,2 c k,2 c k+1,2 = k α c 1,α c 2,α c k,α c k+1,α = k c i,2 c k+2,2 = k c i,α c k+2,α = k a i,2 c i,2 a i,α c i,α

3 190 c 3 S. 1 ) 1 _,M C, (c 1,,,c k,,c k + 1,,c k + 2,) D(k + 2,k) > MDS,1 α,,(k + 2,k)Hadamard MSR _ α > MDS 4 /.,^(k + 2, k)hadamard MSR MDS S, E 4 HIJ 2 a i, 0 a i, - a j, 0,G, 1 i j k,1 α. M(k + 2,k)Hadamard MSR,XY<=4 c TU ' `34 [17]. M 4 k + 1 D<=453,XY<= ( )& α)4 TU '; α / 2 6 4,C 78 2 D,^XY<=4 s ( s)4 '& TU,& N 2 D,C D53<=[F4 ( )& 1)9 1Z:4 s #;4. 2! " #(k + 2,k)Hadamard MSR $ [9][ 4(k + 2,k)Hadamard MSR 4<= > α & 2 k + 1, [16]; & <= >, G A,?@A 234(k + 2,k)Hadamard MSR. 3 4<= > α & 2 k, A. (k + 2,k)MSR 1 E A 1,A 2,,A k ;, (k + 2,k)Hadamard MSR 4 E & H. M3(k + 2,k)Hadamard MSR, E A i (1 i k) H('4IJ a i,(1 α = 2 k + 1 )L & μ i, + 1 ) = 1(mod 2), a i, = ν i, + 1 ) = 0(mod 2, E 51! { ), (1) ) A i = diag (μ i 1,ν i 1,,μ i 1,ν i 1 2 k - i + 1 D G :μ i,ν i F q,q 2k + 3;1 2 i 2 i +4 1 %>. &$ 4\],W3 E H IJ4L < 4= )-. 1 a i, = a i, +,a j, a j, + DL μ i, DL ν i,g,1 i j k, [2 i s + 1, 2 i s + ],0 s 2 k -. > (1),< 1 a?, + 2 ) + 1 ent 2 ( + 1 ) + j - 1 1(mod 2), j = i, ) + 1 ) (mod 2), j i. i = j, + 2 ) ( + 1 = ent + 2 ) = + 1 ) + 1. i > j, + 2 ) ( + 1 =ent + 1 ) + 2 i - j + 1 ) (mod 2). i < j, X.S,@ 2s = 2 j - i φ +, 0 φ 2 k - j + 1-1,0 2 j - i - 2, b ( + 1) + m - + m 2, j - 1 b [2 i s + 1,2 i s + ], ent ent ( ( + 1 ) = φ + 1, ) = ( + 1)2 φ + + m + 1 ) = φ a i, a i,2 k DL μ i, DL ν i, G,1 i k, [1,2 k - 1 ]. b X.S,@ = s + m, 1 m,0 s 2 k -, + 1 ) = s + 1, 2 k ) ent 2 ( ) m s 2 ) s(mod 2). > (1),a i, a i,2 k - +1 DL μ i, DL ν i # M3(k + 2,k)Hadamard MSR, <=

4 1,: (k + 2,k)Hadamard MSR 191 i(1 i k)4tu W ( [2 i s + 1,2 i s + ],0 s 2 k - ) + '&,& TUB,G <= <=[F4 N 2 4. A\] E 4 HIJ4L μ i ν i (1 i k) 2B C,3(k + 2,k)Hadamard MSR _c TU <=. 7 1 ^ μ i ν i (1 i k),3(k + 2,k) Hadamard MSR _c TU <=. <= i(1 i k) 4 & c i,1, c i,2 1,,c i,2 k,& c i, c i, + ( [2 i s + 1, 2 i s + ],0 s 2 1, k - ), G <= c j, + c j, j k,j i; (2) i - <= k + 1 c k + 1, + c 1, & k + 1, + 2 i - (c i, + c j, +2 i-1)+ k j = 1,j i (c j, + c j, +2 i-1); (3) <= k + 2 c k + 2, + c k + 2, +, & (a i,c i, + a i, +2i -1c i, +2i -1)+ k j = 1,j i (a j,c j, + a j, +2i -1c j, +2i -1). (4) 1< 1 _D,a j, = a j, + 2,, (3) (4)4c E _1 (2), (3)4 1 E (4)4 1 E ; c i, c i, + 2 4$, a i, a j, + 2,B$ _. 1< 1 D,a i, a j, + 2 DL μ i, DL ν i,, μ i ν i,b_ c i, c i, + 2.,^ μ i ν i (1 i k),3(k + 2,k) Hadamard MSR _c TU <= #34-. 3(k + 2,k)Hadamard MSR \ 2 D <= _c TU, KL D c TU. ^_c TU <= k + 1,GTU W ( [1,2 k - 1 ]) 2 k '&. &T UB, <=[F4 N 2, <= k + 2 [F4b N 2 F. A\] E HIJ4L μ i ν i (1 i k) 2 B C,3 (k + 2,k) Hadamard MSR _c TU <= k ^ μ 1 + ν 1 = μ 2 + ν 2 = = μ k + ν k 0, 3(k + 2,k)Hadamard MSR _c TU < = k + 1. < = k & c k + 1,1, c k + 1,2 1,,c k + 1,2 k,& c k + 1, c k + 1,2 k - + 1( [1, 2 k - 1 ]), k D <= c i, + c i,2 k - + 1, 1 i k, (5) W (5)4 E`G, c k + 1, + c k + 1,2 k - + 1, (6) <= k + 2 c k + 2, - c k + 2,2 k - + 1, & (a 1,c k +1, - a 1,2 k - +1c k +1,2 k - +1)+ k [(a j, - a 1,)c j, + j = 1 (a 1,2 k a j,2 k - +1)c j,2 k - +1]. (7) (6) (7) ; c k + 1, c k + 1, $,^ $ _, a 1, 6 (7)4c E_, + a 1,2 k a j, + a j,2 k = a 1, + a 1,2 k - + 1, 2 j k. 1< 2 _D,a i, a i,2 k DL μ i, DL ν i, a i, + a i,2 k = μ i + ν i, HI, μ 1 + ν 1 = μ 2 + ν 2 = = μ k + ν k 0, b_ c k + 1, c k + 1, ,^ μ 1 + ν 1 = μ 2 + ν 2 = = μ k + ν k 0, 3(k + 2,k)Hadamard MSR _c TU < = k + 1. ^3(k + 2,k)Hadamard MSR _c TU <= k + 2,G' TU <= k + 1 `, ( [1,2 k - 1 ]) 2 k '&. &TUB, <=[F4 N 2 4, <= k + 1 [F4b N 2 4 F. A\] E 4 HIJ4L μ i ν i (1 i k) 2B C,3(k + 2,k)Hadamard MSR _c TU <= k ^ (1 i k),3(k + 2, k)hadamard MSR _c TU <= k + 2. < = k & c k + 2,1, c 1,,c k,& k + 2,2 k + 2,2 c k + 2, c k + 2,2 k - + 1( [1, 2 k - 1 ]), k D <= a i,c i, + a i,2 k - + 1c i,2 k - + 1, 1 i k, (8) W (8)4 E`G, c k + 2, + c k + 2,2 k - + 1, (9) <= k + 1 c k + 1, - c k + 1,2 k - + 1, & c k +2, - k [(a i, - 1)c i, + c i,2 k - +1]. (10) (9) (10) ; c k + 2, c k + 2,2 k

5 192 51! $,^ $ _, (10)4c E, a - 1 i, + a - 1 i,2 k = 1. 1< 2 _D,a i, a i,2 k DL μ i, DL ν i, a - 1 i, + a - 1 i,2 k = HI, b_ c k + 2, c k + 2,2 k , i,,^, i i k, 3(k + 2,k)Hadamard MSR _c TU < = k "$# MDS 0: A\] E 4 HIJ4L μ i ν i (1 i k) 2B C,3(k + 2,k)Hadamard MSR 2 MDS S. 7 4 ^ μ i 0,ν i 0,μ i ν i,μ i μ j,ν i ν j (1 i j k),3(k + 2,k)Hadamard MSR MDS S. ^(k + 2,k)Hadamard MSR MDS S, E 4 HIJ 2 a i, 0 a i, - a j, 0(1 i j k,1 α). 1 (1) D,3 4 a i, L μ i J ν i,b a i, - a j, 4L 4,'*& μ i - μ j,ν i - ν j,μ i - μ j,ν i - ν j HI, ^ a i, 0 a i, - a j, 0 ;K,b μ i 0, ν i 0,μ i ν j,μ i μ j,ν i ν j.,^ μ i 0,ν i 0,μ i ν j,μ i μ j,ν i ν j (1 i j k),3(k +2,k)Hadamard MSR MDS S. AL 3(k + 2,k)Hadamard MSR M 4&. N' O,3 ^_c TU <= MDS S, μ i ν i,μ i 0,ν i 0,μ i ν j,μ i μ j,ν i ν j, 1 i j k, μ i,ν i (1 i k)& 2k D ` 4. μ 1 + ν 1 = μ 2 + ν 2 = = μ k + ν k 0 (_c TU <= k 'C ) 1 + ν = 2 + ν = = k + ν - 1 k = 1 (_c TU <=k 'C ) μ i ν i (1 i k) k ` & 0 4.,3(k + 2,k)Hadamard MSR & F q RP q 2k + 3. M& F q (q 2k + 3)',^3 KQc TU <= k + 1,μ i ν i (1 i k)_l μ i = i,ν i = q - ; ^KQc TU <= k + 2,μ i ν i (1 i k) _L μ i = 2 + t ν +(t + 1) - 1, G,1 t q * ; ; A 2 3 4(k + 2,k)Hadamard MSR,G<= > A Hadamard MSR 4. ; A<=4' TU$V,Q BTU $V,\]A3 _c TU <= <= 4 'C. : [1] RHEA S,WELLS C,EATON P,et a. Maintenance free goba data storage[j]. IEEE Internet Computing, 2001,5(5): [2] BHAGWAN R,TATI K,CHENG Y C,et a. Tota reca: System support for automated avaiabiity management[c] Symposium Networked Systems Design and Impementation. San Francisco: ACM, 2004: [3] DABEK F,LI Jinyang,SIT E,et a. Designing a DHT for ow atency and high throughput[c] Symposium Networked Systems Design and Impementation (NSDI). San Francisco:ACM,2004:85 98 [4] HUANG Cheng,SIMITCI H,XU Yi,et a. Erasure coding in windows azure storage[c] Usenix annua Technica Conference. Boston:ACM,2012: [5] DIMAKIS A G,GODFREY P B,WU Yunnan,et a. Network coding for distributed storage systems[j]. IEEE Transactions on Information Theory, 2010, 56(9): [6] R S,TUV. Q WXY E 4UY <= $ [J].,2014, 49(2): FAN Weni,LIU Zhigang. Ranking method for node importance based on efficiency matrix[j]. Journa of Southwest Jiaotong University,2014,49(2): [7] DIMAKIS A G,RAMCHANDRAN K,WU Yunnan,et a. A survey on network codes for distributed storage[j]. Proceedings of the IEEE,2011,99(3): ("# 200 $)

6 200 [11]. ": *+9LM< [D]. :!,2014. [12] Y. X678 P [J].?< P,2012,8(5): CHEN Gaofeng. Introduction to wireess communication technoogy used [J ]. Computer Knowedge and Technoogy,2012,8(5): [13],,. 45 GPRS \9 "O : * + 9 & [J]. 0 C! ", 2005,24(3): ,189. LI Xiangyuan, YANG Zhongkai, WU Hongxiu. Deveopment of gprs based ecg teemonitoring system 51 [J]. Beijing Biomedica Engineering,2005,24(3): ,189. [14]. K Z *+ GPRS PC < 89&'<. [D]. :!, [15] O0. TCP / IP \] " "[M]. : c,2003: [16] #. 45 Z Linux 9 GPRS " F*+ &'[D]. $%:$%,2011. (( )*:+, - )*:. / ) ( ) [8] &', /,,. D 9 0 ] [J]. N ( ) : &,2013, 25(1): HAO Jie,LU Yanbo,LIU Xinji,et a. Survey for regenerating codes for distributed storage[j]. Journa of Chongqing University of Posts and Teecommunications: Natura Science Edition,2013,25(1): [9] PAPAILIOPOULOS D S,DIMAKIS A G,CADAMBE V R. Repair optima erasure codes through hadamard designs[j]. IEEE Transactions on Information Theory, 2013,59(5): [10] TAMO I,WANG Zhiying,BRUCK J. Zigzag codes: MDS array codes with optima rebuiding[j]. IEEE Transactions on Information Theory,2013,59(3): [11] WANG Zhiying,TAMO I,BRUCK J. Long MDS codes for optima repair bandwidth[c] Proceedings of IEEE Internationa Symposium on Information Theory. Cambridge:IEEE,2012: [12] TAMO I,WANG Zhiying,BRUCK J. MDS array codes with optima rebuiding[c] Proceedings of IEEE Internationa Symposium on Information Theory. St. Petersburg:IEEE,2011: [13] CADAMBE V R,JAFAR S A,MALEKI H,et a. Asymptotic interference aignment for optima repair of MDS codes in distributed storage[j]. IEEE Transactions on Information Theory,2013,59(5): [14] CADAMBE V R,HUANG Cheng,LI Jin,et a. Poynomia ength MDS codes with optima repair in distributed storage[c] The 45th Asiomar Conference on Signas,Systems and Computers (ASILOMAR). Pacific Grove:IEEE,2011: [15] CADAMBE V R,HUANG Cheng,LI Jin. Permutation code:optima exact repair of a singe faied node in MDS code based distributed storage systems[c] Proceedings of IEEE Internationa Symposium on Information Theory Proceedings (ISIT ). St. Petersburg:IEEE,2011: [16] TAMO I,WANG Zhiying,BRUCK J. Access versus bandwidth in codes for storage[j]. IEEE Transactions on Information Theory,2014,60(4): [17] TANG Xiaohu, YANG Bin, LI Jie. New repair strategy of hadamard minimum storage regenerating code for distributed storage system[j / OL]. ( ) [ ]. / arxiv. org / pdf / v1. pdf. (( )*:+, - )*:. /)

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Ankit Singh Rawat CS Department Carnegie Mellon University Pittsburgh, PA 523 Email: asrawat@andrewcmuedu O Ozan Koyluoglu Department

More information

Codes between MBR and MSR Points with Exact Repair Property

Codes between MBR and MSR Points with Exact Repair Property Codes between MBR and MSR Points with Exact Repair Property 1 Toni Ernva arxiv:1312.5106v1 [cs.it] 18 Dec 2013 Abstract In this paper distributed storage systems with exact repair are studied. A construction

More information

On Locally Recoverable (LRC) Codes

On Locally Recoverable (LRC) Codes On Locally Recoverable (LRC) Codes arxiv:151206161v1 [csit] 18 Dec 2015 Mario Blaum IBM Almaden Research Center San Jose, CA 95120 Abstract We present simple constructions of optimal erasure-correcting

More information

-ИИИИИ"ИИИИИИИИИ 2017.

-ИИИИИИИИИИИИИИ 2017. -.. -ИИИИИ"ИИИИИИИИИ 2017. Ы :,. : 02.03.02 -. 43507,..,.. - 2017 .. " " 2017. 1. : «, -.» 2. : 10 2017. 3. ( ): -. 4. ( ). -. - Э. -. -. 5.. - -. 6. (, ). : ИИИИИИИИИИИИИИИИ. : ИИИИИИИИИИИИИИИИИИ..,..

More information

Coding problems for memory and storage applications

Coding problems for memory and storage applications .. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:

More information

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and

More information

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Bin Chen, Shu-Tao Xia, Jie Hao, and Fang-Wei Fu Member, IEEE 1 arxiv:160901136v1 [csit] 5 Sep 016 Abstract A code is said to be a r-local

More information

arxiv: v1 [cs.it] 5 Aug 2016

arxiv: v1 [cs.it] 5 Aug 2016 A Note on Secure Minimum Storage Regenerating Codes Ankit Singh Rawat arxiv:1608.01732v1 [cs.it] 5 Aug 2016 Computer Science Department, Carnegie Mellon University, Pittsburgh, 15213. E-mail: asrawat@andrew.cmu.edu

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes

More information

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage

More information

Secure RAID Schemes from EVENODD and STAR Codes

Secure RAID Schemes from EVENODD and STAR Codes Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity

More information

Balanced Locally Repairable Codes

Balanced Locally Repairable Codes Balanced Locally Repairable Codes Katina Kralevska, Danilo Gligoroski and Harald Øverby Department of Telematics, Faculty of Information Technology, Mathematics and Electrical Engineering, NTNU, Norwegian

More information

Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions

Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions Nihar B Shah, K V Rashmi, P Vijay Kumar, Fellow, IEEE, and Kannan Ramchandran, Fellow, IEEE Abstract

More information

Balanced Locally Repairable Codes

Balanced Locally Repairable Codes Balanced Locally Repairable Codes Katina Kralevska, Danilo Gligoroski and Harald Øverby Department of Telematics, Faculty of Information Technology, Mathematics and Electrical Engineering, NTNU, Norwegian

More information

Linear Programming Bounds for Robust Locally Repairable Storage Codes

Linear Programming Bounds for Robust Locally Repairable Storage Codes Linear Programming Bounds for Robust Locally Repairable Storage Codes M. Ali Tebbi, Terence H. Chan, Chi Wan Sung Institute for Telecommunications Research, University of South Australia Email: {ali.tebbi,

More information

Beyond the MDS Bound in Distributed Cloud Storage

Beyond the MDS Bound in Distributed Cloud Storage Beyond the MDS Bound in Distributed Cloud Storage Jian Li Tongtong Li Jian Ren Department of ECE, Michigan State University, East Lansing, MI 48824-1226 Email: {lijian6, tongli, renjian}@msuedu Abstract

More information

Can Linear Minimum Storage Regenerating Codes be Universally Secure?

Can Linear Minimum Storage Regenerating Codes be Universally Secure? Can Linear Minimum Storage Regenerating Codes be Universally Secure? Sreechakra Goparaju University of California, San Diego La Jolla, CA, USA Email: sgoparaju@ucsd.edu Salim El Rouayheb Illinois Institute

More information

Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems

Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems Viveck R Cadambe Electrical Engineering and Computer Science University of California Irvine,

More information

Distributed Data Storage Systems with. Opportunistic Repair

Distributed Data Storage Systems with. Opportunistic Repair Distributed Data Storage Systems with 1 Opportunistic Repair Vaneet Aggarwal, Chao Tian, Vinay A. Vaishampayan, and Yih-Farn R. Chen Abstract arxiv:1311.4096v2 [cs.it] 6 Nov 2014 The reliability of erasure-coded

More information

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Mehran Elyasi Department of ECE University of Minnesota melyasi@umn.edu Soheil Mohajer Department of ECE University

More information

On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage

On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage Changho Suh Kannan Ramchandran Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report

More information

Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems

Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems Yuchong Hu, Patrick P. C. Lee, and Kenneth W. Shum Institute of Network Coding, The Chinese

More information

Capacity of Clustered Distributed Storage

Capacity of Clustered Distributed Storage Capacity of Clustered Distributed Storage Jy-yong Sohn, Beongjun Choi, Sung Whan Yoon, and Jaekyun Moon School of Electrical Engineering Korea Advanced Institute of Science and Technology Daejeon,, Republic

More information

A Piggybacking Design Framework for Read- and- Download- efficient Distributed Storage Codes. K. V. Rashmi, Nihar B. Shah, Kannan Ramchandran

A Piggybacking Design Framework for Read- and- Download- efficient Distributed Storage Codes. K. V. Rashmi, Nihar B. Shah, Kannan Ramchandran A Piggybacking Design Framework for Read- and- Download- efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran Outline IntroducGon & MoGvaGon Measurements from Facebook s Warehouse

More information

Towards Green Distributed Storage Systems

Towards Green Distributed Storage Systems Towards Green Distributed Storage Systems Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener Wireless Communications and Networking Laboratory (WCAN) Electrical Engineering Department The Pennsylania

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel /33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,

More information

Rack-Aware Regenerating Codes for Data Centers

Rack-Aware Regenerating Codes for Data Centers IEEE TRANSACTIONS ON INFORMATION THEORY 1 Rack-Aware Regenerating Codes for Data Centers Hanxu Hou, Patrick P. C. Lee, Kenneth W. Shum and Yuchong Hu arxiv:1802.04031v1 [cs.it] 12 Feb 2018 Abstract Erasure

More information

Optimal binary linear locally repairable codes with disjoint repair groups

Optimal binary linear locally repairable codes with disjoint repair groups 1 Optimal binary linear locally repairable codes with disjoint repair groups Jingxue Ma and Gennian Ge arxiv:17110718v1 [csit] 20 Nov 2017 Abstract In recent years, several classes of codes are introduced

More information

On MBR codes with replication

On MBR codes with replication On MBR codes with replication M. Nikhil Krishnan and P. Vijay Kumar, Fellow, IEEE Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore. Email: nikhilkrishnan.m@gmail.com,

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences

More information

Fractional Repetition Codes For Repair In Distributed Storage Systems

Fractional Repetition Codes For Repair In Distributed Storage Systems Fractional Repetition Codes For Repair In Distributed Storage Systems 1 Salim El Rouayheb, Kannan Ramchandran Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley {salim,

More information

Optimal Locally Repairable and Secure Codes for Distributed Storage Systems

Optimal Locally Repairable and Secure Codes for Distributed Storage Systems Optimal Locally Repairable and Secure Codes for Distributed Storage Systems Ankit Singh Rawat, O. Ozan Koyluoglu, Natalia Silberstein, and Sriram Vishwanath arxiv:0.6954v [cs.it] 6 Aug 03 Abstract This

More information

Zigzag Codes: MDS Array Codes with Optimal Rebuilding

Zigzag Codes: MDS Array Codes with Optimal Rebuilding 1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo, Zhiying Wang, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical

More information

IEEE TRANSACTIONS ON INFORMATION THEORY 1

IEEE TRANSACTIONS ON INFORMATION THEORY 1 IEEE TRANSACTIONS ON INFORMATION THEORY 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Proxy-Assisted Regenerating Codes With Uncoded Repair for Distributed Storage Systems Yuchong Hu,

More information

Explicit MBR All-Symbol Locality Codes

Explicit MBR All-Symbol Locality Codes Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2

More information

Security in Locally Repairable Storage

Security in Locally Repairable Storage 1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider

More information

Cyclic Linear Binary Locally Repairable Codes

Cyclic Linear Binary Locally Repairable Codes Cyclic Linear Binary Locally Repairable Codes Pengfei Huang, Eitan Yaakobi, Hironori Uchikawa, and Paul H. Siegel Electrical and Computer Engineering Dept., University of California, San Diego, La Jolla,

More information

Maximally Recoverable Codes with Hierarchical Locality

Maximally Recoverable Codes with Hierarchical Locality Maximally Recoverable Codes with Hierarchical Locality Aaditya M Nair V Lalitha SPCRC International Institute of Information Technology Hyderabad India Email: aadityamnair@researchiiitacin lalithav@iiitacin

More information

CBFM cutted Bloom filter matrix for multi-dimensional membership query

CBFM cutted Bloom filter matrix for multi-dimensional membership query 37 3 Vol.37 No.3 2016 3 Journal on Communications March 2016 doi:10.11959/j.issn.1000-436x.2016061 CBFM 1 1,2 1 1 1. 100093 2. 100029 CBFM(cutted Bloom filter matrix) BFM(Bloom filter matrix) CBFM CBFM

More information

Private Secure Coded Computation

Private Secure Coded Computation Private Secure Coded Computation Minchul Kim and Jungwoo Lee Seoul National University Department of Electrical and Computer Engineering 08826 Seoul, Korea Email: kmc1222@cml.snu.ac.kr, junglee@snu.ac.kr

More information

Explicit Code Constructions for Distributed Storage Minimizing Repair Bandwidth

Explicit Code Constructions for Distributed Storage Minimizing Repair Bandwidth Explicit Code Constructions for Distributed Storage Minimizing Repair Bandwidth A Project Report Submitted in partial fulfilment of the requirements for the Degree of Master of Engineering in Telecommunication

More information

Product-matrix Construction

Product-matrix Construction IERG60 Coding for Distributed Storage Systems Lecture 0-9//06 Lecturer: Kenneth Shum Product-matrix Construction Scribe: Xishi Wang In previous lectures, we have discussed about the minimum storage regenerating

More information

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion

More information

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes American Journal of Mathematical and Computer Modelling 2017; 2(1): 6-12 http://www.sciencepublishinggroup.com//amcm doi: 10.1168/.amcm.20170201.12 Decoding of the Five-Error-Correcting Binary Quadratic

More information

JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY Vol. 52 No. 1 Feb. 2017!: (2017) DOI: / j. issn

JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY Vol. 52 No. 1 Feb. 2017!: (2017) DOI: / j. issn 52 1 2017 2 JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY Vol. 52 No. 1 Feb. 2017!:0258 2724(2017)01 0091 07 DOI:10. 3969 / j. issn. 0258 2724. 2017. 01. 013 CPⅢ"#$%&' () 1,2, 3, 1,2, 1,2 (1.?@A 2BC D,E 610031;2.

More information

Construction of Type-II QC LDPC Codes Based on Perfect Cyclic Difference Set

Construction of Type-II QC LDPC Codes Based on Perfect Cyclic Difference Set Chinese Journal of Electronics Vol24, No1, Jan 2015 Construction of Type-II QC LDPC Codes Based on Perfect Cyclic Difference Set ZHANG Lijun 1,LIBing 2 and CHENG Leelung 3 (1 School of Electronic and Information

More information

Piggybacked Erasure Codes for Distributed Storage Findings from the Facebook Warehouse Cluster

Piggybacked Erasure Codes for Distributed Storage Findings from the Facebook Warehouse Cluster Piggybacked Erasure Codes for Distributed Storage & Findings from the Facebook Warehouse Cluster K. V. Rashmi, Nihar Shah, D. Gu, H. Kuang, D. Borthakur, K. Ramchandran Piggybacked Erasure Codes for Distributed

More information

An Upper Bound On the Size of Locally. Recoverable Codes

An Upper Bound On the Size of Locally. Recoverable Codes An Upper Bound On the Size of Locally 1 Recoverable Codes Viveck Cadambe Member, IEEE and Arya Mazumdar Member, IEEE arxiv:1308.3200v2 [cs.it] 26 Mar 2015 Abstract In a locally recoverable or repairable

More information

Humanoid Based Intelligence Control Strategy of Plastic Cement Die Press Work-Piece Forming Process for Polymer Plastics

Humanoid Based Intelligence Control Strategy of Plastic Cement Die Press Work-Piece Forming Process for Polymer Plastics Journal of Materials Science and Chemical Engineering, 206, 4, 9-6 Published Online June 206 in SciRes. http://www.scirp.org/journal/msce http://dx.doi.org/0.4236/msce.206.46002 Humanoid Based Intelligence

More information

Published in: Proceedings of the Twenty Second Nordic Seminar on Computational Mechanics

Published in: Proceedings of the Twenty Second Nordic Seminar on Computational Mechanics Aaborg Universitet An Efficient Formuation of the Easto-pastic Constitutive Matrix on Yied Surface Corners Causen, Johan Christian; Andersen, Lars Vabbersgaard; Damkide, Lars Pubished in: Proceedings of

More information

RECURSIVE CONSTRUCTION OF (J, L) QC LDPC CODES WITH GIRTH 6. Communicated by Dianhua Wu. 1. Introduction

RECURSIVE CONSTRUCTION OF (J, L) QC LDPC CODES WITH GIRTH 6. Communicated by Dianhua Wu. 1. Introduction Transactions on Combinatorics ISSN (print: 2251-8657, ISSN (on-line: 2251-8665 Vol 5 No 2 (2016, pp 11-22 c 2016 University of Isfahan wwwcombinatoricsir wwwuiacir RECURSIVE CONSTRUCTION OF (J, L QC LDPC

More information

BDR: A Balanced Data Redistribution Scheme to Accelerate the Scaling Process of XOR-based Triple Disk Failure Tolerant Arrays

BDR: A Balanced Data Redistribution Scheme to Accelerate the Scaling Process of XOR-based Triple Disk Failure Tolerant Arrays BDR: A Balanced Data Redistribution Scheme to Accelerate the Scaling Process of XOR-based Triple Disk Failure Tolerant Arrays Yanbing Jiang 1, Chentao Wu 1, Jie Li 1,2, and Minyi Guo 1 1 Department of

More information

A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures

A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures 1 A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures arxiv:181050v1 [csit] 6 Dec 018 S B Balaji, Ganesh R Kini and

More information

Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair

Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair 1 Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair Kaveh Mahdaviani, Soheil Mohajer, and Ashish Khisti ECE Dept, University o Toronto, Toronto, ON M5S3G4, Canada ECE Dept, University o Minnesota,

More information

Coding with Constraints: Minimum Distance. Bounds and Systematic Constructions

Coding with Constraints: Minimum Distance. Bounds and Systematic Constructions Coding with Constraints: Minimum Distance 1 Bounds and Systematic Constructions Wael Halbawi, Matthew Thill & Babak Hassibi Department of Electrical Engineering arxiv:1501.07556v2 [cs.it] 19 Feb 2015 California

More information

Consolidation properties of dredger fill under surcharge preloading in coast region of Tianjin

Consolidation properties of dredger fill under surcharge preloading in coast region of Tianjin 30 2 2011 6 GLOBAL GEOLOGY Vol. 30 No. 2 Jun. 2011 1004-5589 2011 02-0289 - 07 1 1 2 3 4 4 1. 130026 2. 130026 3. 110015 4. 430074 45 cm 100% ` TU447 A doi 10. 3969 /j. issn. 1004-5589. 2011. 02. 020 Consolidation

More information

Nearly Optimal Constructions of PIR and Batch Codes

Nearly Optimal Constructions of PIR and Batch Codes arxiv:700706v [csit] 5 Jun 07 Neary Optima Constructions of PIR and Batch Codes Hia Asi Technion - Israe Institute of Technoogy Haifa 3000, Israe shea@cstechnionaci Abstract In this work we study two famiies

More information

35H MPa Hydraulic Cylinder 3.5 MPa Hydraulic Cylinder 35H-3

35H MPa Hydraulic Cylinder 3.5 MPa Hydraulic Cylinder 35H-3 - - - - ff ff - - - - - - B B BB f f f f f f f 6 96 f f f f f f f 6 f LF LZ f 6 MM f 9 P D RR DD M6 M6 M6 M. M. M. M. M. SL. E 6 6 9 ZB Z EE RC/ RC/ RC/ RC/ RC/ ZM 6 F FP 6 K KK M. M. M. M. M M M M f f

More information

Random Residue Sequences and the Number Theoretic Hilbert Transform

Random Residue Sequences and the Number Theoretic Hilbert Transform Random Residue Sequences and the Number Theoretic Hilbert Transform Vamsi Sashank Kotagiri Oklahoma State University, Stillwater Abstract This paper presents random residue sequences derived from the number

More information

Weakly Secure Regenerating Codes for Distributed Storage

Weakly Secure Regenerating Codes for Distributed Storage Weakly Secure Regenerating Codes for Distributed Storage Swanand Kadhe and Alex Sprintson 1 arxiv:1405.2894v1 [cs.it] 12 May 2014 Abstract We consider the problem of secure distributed data storage under

More information

Letting be a field, e.g., of the real numbers, the complex numbers, the rational numbers, the rational functions W(s) of a complex variable s, etc.

Letting be a field, e.g., of the real numbers, the complex numbers, the rational numbers, the rational functions W(s) of a complex variable s, etc. 1 Polynomial Matrices 1.1 Polynomials Letting be a field, e.g., of the real numbers, the complex numbers, the rational numbers, the rational functions W(s) of a complex variable s, etc., n ws ( ) as a

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

The MDS Queue: Analysing the Latency Performance of Erasure Codes

The MDS Queue: Analysing the Latency Performance of Erasure Codes The MDS Queue: Analysing the Latency Performance of Erasure Codes Nihar B. Shah, Kangwook Lee, Kannan Ramchandran Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum

More information

Matrix Algebra. Matrix Algebra. Chapter 8 - S&B

Matrix Algebra. Matrix Algebra. Chapter 8 - S&B Chapter 8 - S&B Algebraic operations Matrix: The size of a matrix is indicated by the number of its rows and the number of its columns. A matrix with k rows and n columns is called a k n matrix. The number

More information

Cooperative Repair of Multiple Node Failures in Distributed Storage Systems

Cooperative Repair of Multiple Node Failures in Distributed Storage Systems Cooperative Repair of Multiple Node Failures in Distributed Storage Systems Kenneth W. Shum Institute of Network Coding The Chinese University of Hong Kong Junyu Chen Department of Information Engineering

More information

Some Classes of Invertible Matrices in GF(2)

Some Classes of Invertible Matrices in GF(2) Some Classes of Invertible Matrices in GF() James S. Plank Adam L. Buchsbaum Technical Report UT-CS-07-599 Department of Electrical Engineering and Computer Science University of Tennessee August 16, 007

More information

Update-Efficient Error-Correcting. Product-Matrix Codes

Update-Efficient Error-Correcting. Product-Matrix Codes Update-Efficient Error-Correcting 1 Product-Matrix Codes Yunghsiang S Han, Fellow, IEEE, Hung-Ta Pai, Senior Member IEEE, Rong Zheng, Senior Member IEEE, Pramod K Varshney, Fellow, IEEE arxiv:13014620v2

More information

Characteristic Numbers of Matrix Lie Algebras

Characteristic Numbers of Matrix Lie Algebras Commun. Theor. Phys. (Beijing China) 49 (8) pp. 845 85 c Chinese Physical Society Vol. 49 No. 4 April 15 8 Characteristic Numbers of Matrix Lie Algebras ZHANG Yu-Feng 1 and FAN En-Gui 1 Mathematical School

More information

Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads

Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads 1 Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads Rawad Bitar, Student Member, IEEE and Salim El Rouayheb, Member, IEEE Abstract We study the communication efficient secret

More information

arxiv: v1 [cs.it] 18 Jun 2011

arxiv: v1 [cs.it] 18 Jun 2011 On the Locality of Codeword Symbols arxiv:1106.3625v1 [cs.it] 18 Jun 2011 Parikshit Gopalan Microsoft Research parik@microsoft.com Cheng Huang Microsoft Research chengh@microsoft.com Sergey Yekhanin Microsoft

More information

Distributed storage systems from combinatorial designs

Distributed storage systems from combinatorial designs Distributed storage systems from combinatorial designs Aditya Ramamoorthy November 20, 2014 Department of Electrical and Computer Engineering, Iowa State University, Joint work with Oktay Olmez (Ankara

More information

Complete and Partial Separability Conditions of Mixed State for a Quantum Network of Any Nodes

Complete and Partial Separability Conditions of Mixed State for a Quantum Network of Any Nodes Commun. Theor. Phys. (Beijing, China) 4 (004) pp. 351 360 c International Academic Publishers Vol. 4, No. 3, September 15, 004 Complete and Partial Separability Conditions of Mixed State for a Quantum

More information

Distributed Storage Systems with Secure and Exact Repair - New Results

Distributed Storage Systems with Secure and Exact Repair - New Results Distributed torage ystems with ecure and Exact Repair - New Results Ravi Tandon, aidhiraj Amuru, T Charles Clancy, and R Michael Buehrer Bradley Department of Electrical and Computer Engineering Hume Center

More information

Binary MDS Array Codes with Optimal Repair

Binary MDS Array Codes with Optimal Repair IEEE TRANSACTIONS ON INFORMATION THEORY 1 Binary MDS Array Codes with Optimal Repair Hanxu Hou, Member, IEEE, Patric P. C. Lee, Senior Member, IEEE Abstract arxiv:1809.04380v1 [cs.it] 12 Sep 2018 Consider

More information

AN EVENT-TRIGGERED TRANSMISSION POLICY FOR NETWORKED L 2 -GAIN CONTROL

AN EVENT-TRIGGERED TRANSMISSION POLICY FOR NETWORKED L 2 -GAIN CONTROL 4 Journal of Marine Science and echnology, Vol. 3, No., pp. 4-9 () DOI:.69/JMS-3-3-3 AN EVEN-RIGGERED RANSMISSION POLICY FOR NEWORKED L -GAIN CONROL Jenq-Lang Wu, Yuan-Chang Chang, Xin-Hong Chen, and su-ian

More information

Prolongation structure for nonlinear integrable couplings of a KdV soliton hierarchy

Prolongation structure for nonlinear integrable couplings of a KdV soliton hierarchy Prolongation structure for nonlinear integrable couplings of a KdV soliton hierarchy Yu Fa-Jun School of Mathematics and Systematic Sciences, Shenyang Normal University, Shenyang 110034, China Received

More information

Deleting a marked state in quantum database in a duality computing mode

Deleting a marked state in quantum database in a duality computing mode Article Quantum Information August 013 Vol. 58 o. 4: 97 931 doi: 10.1007/s11434-013-595-9 Deleting a marked state in quantum database in a duality computing mode LIU Yang 1, 1 School of uclear Science

More information

Private Information Retrieval from Coded Databases

Private Information Retrieval from Coded Databases Private Information Retrieval from Coded Databases arim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 kbanawan@umdedu ulukus@umdedu

More information

IBM Research Report. Notes on Reliability Models for Non-MDS Erasure Codes

IBM Research Report. Notes on Reliability Models for Non-MDS Erasure Codes RJ10391 (A0610-035) October 24, 2006 Computer Science IBM Research Report Notes on Reliability Models for Non-MDS Erasure Codes James Lee Hafner, KK Rao IBM Research Division Almaden Research Center 650

More information

Maximizing Data Locality in Distributed Systems

Maximizing Data Locality in Distributed Systems Maximizing Data Locality in Distributed Systems Fan Chung a, Ronald Graham a, Ranjita Bhagwan b,, Stefan Savage a, Geoffrey M. Voelker a a Department of Computer Science and Engineering University of California,

More information

Compressed Sensing and Linear Codes over Real Numbers

Compressed Sensing and Linear Codes over Real Numbers Compressed Sensing and Linear Codes over Real Numbers Henry D. Pfister (joint with Fan Zhang) Texas A&M University College Station Information Theory and Applications Workshop UC San Diego January 31st,

More information

Cauchy MDS Array Codes With Efficient Decoding Method

Cauchy MDS Array Codes With Efficient Decoding Method IEEE TRANSACTIONS ON COMMUNICATIONS Cauchy MDS Array Codes With Efficient Decoding Method Hanxu Hou and Yunghsiang S Han, Fellow, IEEE Abstract arxiv:609968v [csit] 30 Nov 206 Array codes have been widely

More information

Explicit Criterion to Determine the Number of Positive Roots of a Polynomial 1)

Explicit Criterion to Determine the Number of Positive Roots of a Polynomial 1) MM Research Preprints, 134 145 No. 15, April 1997. Beijing Explicit Criterion to Determine the Number of Positive Roots of a Polynomial 1) Lu Yang and Bican Xia 2) Abstract. In a recent article, a complete

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

LDPC Code Design for Distributed Storage: Balancing Repair Bandwidth, Reliability and Storage Overhead

LDPC Code Design for Distributed Storage: Balancing Repair Bandwidth, Reliability and Storage Overhead LDPC Code Design for Distributed Storage: 1 Balancing Repair Bandwidth, Reliability and Storage Overhead arxiv:1710.05615v1 [cs.dc] 16 Oct 2017 Hyegyeong Park, Student Member, IEEE, Dongwon Lee, and Jaekyun

More information

THE IC-BASED DETECTION ALGORITHM IN THE UPLINK LARGE-SCALE MIMO SYSTEM. Received November 2016; revised March 2017

THE IC-BASED DETECTION ALGORITHM IN THE UPLINK LARGE-SCALE MIMO SYSTEM. Received November 2016; revised March 2017 International Journal of Innovative Computing, Information and Control ICIC International c 017 ISSN 1349-4198 Volume 13, Number 4, August 017 pp. 1399 1406 THE IC-BASED DETECTION ALGORITHM IN THE UPLINK

More information

Exact Low-rank Matrix Recovery via Nonconvex M p -Minimization

Exact Low-rank Matrix Recovery via Nonconvex M p -Minimization Exact Low-rank Matrix Recovery via Nonconvex M p -Minimization Lingchen Kong and Naihua Xiu Department of Applied Mathematics, Beijing Jiaotong University, Beijing, 100044, People s Republic of China E-mail:

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

New quaternary sequences of even length with optimal auto-correlation

New quaternary sequences of even length with optimal auto-correlation . RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2018, Vol. 61 022308:1 022308:13 doi: 10.1007/s11432-016-9087-2 New quaternary sequences of even length with optimal auto-correlation Wei SU

More information

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Pravin Salunkhe, Prof D.P Rathod Department of Electrical Engineering, Veermata Jijabai

More information

Linear Programming Bounds for Distributed Storage Codes

Linear Programming Bounds for Distributed Storage Codes 1 Linear Programming Bounds for Distributed Storage Codes Ali Tebbi, Terence H. Chan, Chi Wan Sung Department of Electronic Engineering, City University of Hong Kong arxiv:1710.04361v1 [cs.it] 12 Oct 2017

More information

IBM Research Report. Construction of PMDS and SD Codes Extending RAID 5

IBM Research Report. Construction of PMDS and SD Codes Extending RAID 5 RJ10504 (ALM1303-010) March 15, 2013 Computer Science IBM Research Report Construction of PMDS and SD Codes Extending RAID 5 Mario Blaum IBM Research Division Almaden Research Center 650 Harry Road San

More information

GPS 10, GPS , GPS. (J PL ) Zumbeger. mm, cm ; ( Global RT K) [3 ]

GPS 10, GPS , GPS. (J PL ) Zumbeger. mm, cm ; ( Global RT K) [3 ] 27 3 Vol. 27 No. 3 2002 6 Geomatics and Information Science of Wuhan University J une 2002 :1000-050X(2002) 03-0234-07 :A GPS 1 2 (1,,430072) (2 GPS,129,430079) : ; IGS IGS,,, 15min, X Y Z 20cm : GPS ;;

More information

Convergence analysis for a class of LDPC convolutional codes on the erasure channel

Convergence analysis for a class of LDPC convolutional codes on the erasure channel Convergence analysis for a class of LDPC convolutional codes on the erasure channel Sridharan, Arvind; Lentmaier, Michael; Costello Jr., Daniel J.; Zigangirov, Kamil Published in: [Host publication title

More information

MC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005

MC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005 On the Adaptivity in Down- and Upink MC- Systems Ivan Cosovic German Aerospace Center (DLR) Institute of Comm. and Navigation Oberpfaffenhofen, Germany Stefan Kaiser DoCoMo Euro-Labs Wireess Soution Laboratory

More information

Synchronizing Edits in Distributed Storage Networks

Synchronizing Edits in Distributed Storage Networks Synchronizing Edits in Distributed Storage Networks Salim El Rouayheb, Sreechakra Goparaju, Han Mao Kiah, Olgica Milenkovic Department of Electrical and Computer Engineering, Illinois Institute of Technology,

More information

. a m1 a mn. a 1 a 2 a = a n

. a m1 a mn. a 1 a 2 a = a n Biostat 140655, 2008: Matrix Algebra Review 1 Definition: An m n matrix, A m n, is a rectangular array of real numbers with m rows and n columns Element in the i th row and the j th column is denoted by

More information