An Algorithm for a Two-Disk Fault-Tolerant Array with (Prime 1) Disks
|
|
- Denis Blake
- 5 years ago
- Views:
Transcription
1 An Algorithm for a Two-Disk Fault-Tolerant Array with (Prime 1) Disks Sanjeeb Nanda and Narsingh Deo School of Computer Science University of Central Florida Orlando, Florida sanjeeb@earthlink.net, deo@cs.ucf.edu
2 Abstract In recent years commercial Redundant Arrays of Inexpensive Disks systems have gained considerable appeal due to their enhanced I/O bandwidths, capacities and economy. However, the continued demand for larger capacities at low cost, has led to the use of larger arrays with compromised disk quality. This has challenged RAID systems to offer better fault-tolerance without sacrificing performance or space. In this paper, we present an algorithm for recovery from two random disk failures in an array of (P 1) disks, where P is a prime number. The algorithm relies on exclusive-or parity bit-computed uniformly across all the disks. We give a constructive proof of the correctness of the algorithm and demonstrate the key steps with examples.
3 I. Introduction While CPU throughputs have doubled approximately every two years, enhancements to I/O bandwidth, in contrast, have been relatively conservative. In fact, I/O bottlenecks continue to restrict many applications from fully exploiting their processors. This fact motivated Patterson et al. to introduce Redundant Arrays of Inexpensive Disks (RAID) [5, 12, 13], which substitutes large expensive disks with arrays of inexpensive disks to provide greater cumulative I/O bandwidth. However, such arrays are probabilistically more susceptible to failure than their disks individually. Fortunately, several forms of RAID effectively solve this problem. Patterson originally defined RAID levels 0 through 5 [12] and the RAID Advisory Board subsequently added level 6 to the existing definitions. A RAID level 0 with N disks may partition each disk into equal sized blocks and order the blocks in a round-robin fashion. This enhances I/O throughput by permitting up to N blocks to be accessed concurrently when reading from, or writing to the array sequentially. Fig. 1 displays the order of the data blocks in a RAID level 0 with N disks and M data blocks per disk. But, RAID level 0 does not offer any redundancy. In contrast, levels 1 through 5 provide tolerance to the failure of exactly one disk in the array N N + 1 N + 2 N + 3 2N 2N + 1 2N + 2 2N + 3 3N (M 1)N + 1 (M 1)N + 2 (M 1)N + 3 MN Disk 1 Disk 2 Disk 3 Disk N Fig. 1. RAID level 0 with N disks and M blocks per disk, with the order of each block in the array indicated by an integer value. Since RAID levels 1 through 5 can recover from only one disk failure, their use is typically confined to smaller arrays where the probability of two or more disk failures is negligible. In fact, RAID levels 1 and 5 are common choices in such environments. RAID level 1 is simply a pair of disks with the data on any one
4 being mirrored on the other. Since this scheme does not use parity, it is computationally inexpensive and therefore, has relatively good I/O performance. However, its drawback is that, it consumes half the array s space for storing redundant data. In contrast, a RAID level 5 consists of at least three disks using parity to provide redundancy and various optimizations to enhance its performance [2, 6]. On the other hand, large arrays may need to tolerate two or more disk failures. A popular method that achieves this partitions an array of disks into RAID subsets each tolerant to a single disk failure and then creates another RAID level by using each aforementioned subset as a disk. In fact, practically every contemporary RAID controller offers RAID levels using this method. Some salient ones are RAID levels 10 and 50. RAID level 10 is obtained by creating a RAID level 0 using subsets that are each a RAID level 1. Similarly, RAID level 50 is obtained by creating a RAID level 0 using subsets that are each a RAID level 5. Fig. 2 displays a RAID 10 using three subsets of RAID level 1. Note that, identically ordered blocks in the array contain the same data M 2 3M 2 3M 1 3M 1 3M 3M Subset 1 (RAID 1) Subset 2 (RAID 1) Subset 3 (RAID 1) Fig. 2. A RAID level 10 with three virtual disks, each comprised of two disks, with the order of each block in the array given by an integer value. Note that, blocks in each pair of disks comprising a RAID 1 subset are identically ordered and therefore contain identical data. Although such arrays can tolerate as many disk failures as there are subsets, each failure is restricted to a unique subset. Thus, there is a compelling need for arrays that can tolerate multiple arbitrary disk failures. For most practical array sizes, the probability of occurrence of more than two simultaneous disk failures is generally small enough to be ignored, and a lesser number of failures can be tackled by the use of RAID systems resistant to two disk failures.
5 For this purpose, the RAID Advisory Board defined RAID level 6 as one that can tolerate two arbitrary disk failures. Numerous implementations of this type have been developed over the years, each with advantages and disadvantages. A well-known technique based on Reed-Solomon codes [14] has not gained much commercial favor because it uses Galois Field arithmetic to compute parities, which is computationally more expensive than using exclusive-or. Park proposed an algorithm [10] for evaluating the number of disks N and the configuration of data and parity, when given the ratio of disk space R used for storing parity. However, the solution is generally not optimal because RN is often greater than 2. The EVENODD technique proposed by Blaum et al. [1] allows non-prime values for the number of disks in the array only by artificially extending the actual size of the array to a prime number with imaginary disks containing 0 s as their contents. The latter scheme has greater computational complexity when the number of disks is non-prime and calculations to derive parity have to factor in the presence of the imaginary disks. In this paper, we present an algorithm to create an array of (P 1) disks, where P is prime, which can recover from the failure of any two arbitrary disks in the array. The algorithm generates a solution with (P 3)/2 blocks of data and one block of parity per disk, each block being of equal size. Each parity block s value is then obtained by computing the bit-wise exclusive-or of (P 3) data blocks that are specified by the algorithm. The solution is then extended for practical use by repeating the data and parity configuration of the (P 1)/2 data and parity blocks an integral number of times. The algorithm embodies numerous strengths that make it more attractive than competing techniques that provide tolerance to two arbitrary disk failures. First, the fraction of space used for storing parity in an array with (P 1) disks is 2/(P 1). This ratio is optimal because a solution to reconstruct two disk failures with a lesser value is not possible. Second, the algorithm distributes parity uniformly over all the disks, permitting data to be read from, and parity to be written to all disks concurrently. This maximizes cumulative I/O throughput to the disks. Third, the algorithm is computationally inexpensive because it calculates each parity block s value by using exclusive-or operations only. Finally, since (P 1) is even, this algorithm is well suited for many external storage enclosures that accommodate an even number of disks. Next, we shall state our algorithm and then, prove its correctness.
6 II. Algorithm To Create A 2-Disk Fault-Tolerant Array Of (P 1) Disks Let P 5 be a prime and M P = (m ij ) be a matrix with m ij = (2P i j 1) mod P, 0 i, j P 1. Let d 0, d 1, d 2, d P 2 be an array of P 1 disks, where P is prime. Each disk contains (P 3)/2 data blocks and a parity block. Each data block in disk d is assigned a unique unordered pair {x, y} as a data-block tag if m xy = m dd, and the parity block the singleton [d] as a parity-block tag, where 0 x, y P 2. The parity in the block with tag [d] is then calculated by taking the bit-wise exclusive-or of all data blocks with tags having d as an element. In other words, the data in the block with tag {x, y} is used to calculate the parities in the blocks with tags [x] and [y]. Fig. 3 displays the pseudo-code that implements the algorithm. In the pseudocode we represent the disks in an array by the variable d, and the equal sized blocks within each disk by the variable b. Fig. 4 displays the result of the algorithm applied to create a two-disk fault-tolerant array with six disks. for i 0 to (P 1) do for j i to (P 1) do m(i, j) (2P i j 1) mod P; for disk d 0 to (P 2) do { b 0; for i 0 to (P 3) do for j (i + 1) to (P 2) do if (m(i, j) = m(d, d)) then { block b in disk d is assigned data-block tag {i, j}; b b + 1; } } block b of disk d is assigned parity-block tag [d]; Fig. 3. Pseudo-code to implement the algorithm.
7 {3, 4} {0, 2} {1, 3} {2, 4} {0, 1} {0, 3} {2, 5} {4, 5} {0, 4} {1, 5} {3, 5} {1, 2} [0] [1] [2] [3] [4] [5] Fig. 4. Algorithm applied to create a six-disk system. III. Proof Of Correctness Of The Algorithm As defined earlier in our algorithm, P 5 is a prime and M P = (m ij ) is a matrix with m ij = (2P i j 1) mod P, 0 i, j P 1. Fig. 5 illustrates M 7 as an example Fig. 5. The matrix M 7. Now, we state and prove some properties needed to prove the correctness of our algorithm. Property 1 Let S(x) = {(i, j) m ij = x} and S(y) = {(i, j) m ij = y}, 0 x, y P 1. Let, r S(x) S(y) be a function, with r(i, j) = (i, k). Similarly, let c S(y) S(x) be a function, with c(i, j) = (k, j). Note that r and c are isomorphic. Thus, r represents a move from an entry with value x to an entry with value y on the same row, and c represents a move from an entry with value y to an entry with value x on the same column. Then, given
8 elements of the form (i, i) S(x) and (j, j) S(y), r (c r) ½(P 1) (i, i) = (j, j). In other words, exactly P total moves, comprised of ½(P + 1) moves of the form r interleaved with ½(P 1) moves of the form c, are required to start from m ii = x and reach m jj = y. For example in M 7, let r S(6) S(2), and c S(2) S(6). Then, exactly seven total moves comprised of r alternating with c are needed to start from the (0, 0) entry on the major diagonal, having value 6, and reach the (2, 2) entry on the major diagonal, having value 2. The sequence of coordinates traversed is as follows (0, 0), (0, 4), (3, 4), (3, 1), (6, 1), (6, 5), (2, 5), (2, 2) Proof Let, r S(x) S(y), with r(i, j) = (i, k). Since 2P i j 1 x (mod P) and 2P i k 1 y (mod P), it follows that k j = x y; hence k = j + x y. Thus, a move of the form r takes us from the (i, j) entry to the (i, j + x y) entry. Similarly, let c S(y) S(x), with c(i, k) = (l, k). Since, 2P i k 1 y (mod P) and 2P l k 1 x (mod P), it follows that l i = y x; hence l = i + y x. Thus, a move of the form c takes us from the (i, k) = (i, j + x y) entry to the (l, k) = (i + y x, j + x y) entry. Then, the composition (c r) S(x) S(x) takes us from the (i, j) entry to the (i + y x, j + x y) entry. Now, suppose we start from the (i, i) entry with m ii = x, then (c r) S(x) S(x) takes us from the (i, i) entry to the (i + y x, i + x y) entry. It is then easy to see that the (i + y x, i + x y) entry is not on the major diagonal, for else we would have i + y x i + x y (mod P), that is, 2(x y) 0 (mod P). A contradiction. Using the same argument we can show that, for any integer n 1, (c r) n S(x) S(x) will take us from the (i, i) entry to the (i + n(y x), i + n(x y)) entry, and that, the latter cannot be on the major diagonal. However, r (c r) ½(P 1) S(x) S(y) will take us from the (i, i) entry to the (i + ½(P 1)(y x), i + ½(P 1)(x y) + x y) entry. It is then easy to see that the latter is an entry on the major diagonal since, i + ½(P 1)(y x) (i + ½(P 1)(x y) + x y) = P(y x) 0. Thus, ½(P + 1) moves of the form r interleaved with ½(P 1) moves of the form c are required to start from m ii = x and reach m jj = y, for a total of exactly P moves.
9 Let d 0, d 1, d 2, d P 2 be an array of (P 1) disks with data-block tags. A sequence of data-block tags {{u 0, v 0 }, {u 1, v 1 }, {u 2, v 2 }, {u K, v K }} from both disks is called a path if {u i, v i } {u i + 1, v i + 1 } = 1, where 0 i < K, and K P 4. Such a path is a cycle if {u k, v k } {u 0, v 0 } = 1. Property 2 Proof No pair of disks in d 0, d 1, d 2, d P 2 can have a cycle of data-block tags. Suppose to the contrary that a pair of disks d x and d y has a cycle C = {{u 0, v 0 }, {u 1, v 1 }, {u 2, v 2 }, {u K, v K }} of data-block tags, K P 4. Note that, each tag {u i, v i } in the sequence is obtained from the coordinates of an entry in M P with value m xx or m yy. Furthermore, if a tag in C corresponds to the coordinates of an entry with value m xx then its preceding and succeeding tags in C correspond to the coordinates of an entry with value m yy. Thus, the cycle C describes a sequence of alternating horizontal and vertical moves in M P that starts, without loss of generality, at an entry with value m xx and moves horizontally to an entry with value m yy, followed by a vertical move to an entry with value m xx, and so on, until we arrive back at the starting entry with value m xx with a vertical move. Let S (x) = {(i, j) m ij = m xx } and Let S (y) = {(i, j) m ij = m yy }. Let, r S (x) S (y) be a function with r(i, j) = (i, k), and let c S (y) S (x) be a function with c(i, j) = (k, j). Then, using arguments from the proof of Property 1, we can show that, (c r) n S (x) S (x) takes us from the (i, j) entry to the (i + n(y x), j + n(x y)) entry, for any integer n 1. Hence, the presence of C implies that, i + n(y x) i (mod P), and j + n(x y) j (mod P). Since x y, n must equal P. This is a contradiction, since K P 4; and therefore, n (P 3)/2. A path of data-block tags T = {{u 0, v 0 }, {u 1, v 1 }, {u K, v K }} in a pair of disks d x and d y is a maximal path if there does not exist any tag {u, v} in d x or d y such that, {u, v} T, and either {u 0, v 0 } {u, v} = 1 or {u K, v K } {u, v} = 1. Then, we observe that every data block tag in disks d x and d y must lie on a maximal path. Let us now prove the following theorem. Theorem The array of disks d 0, d 1, d 2, d P 2 can tolerate two disk failures.
10 Proof Assume disks d x and d y have failed, where x, y {0, 1, P 2}. Let T = {{u 0, v 0 }, {u 1, v 1 }, {u K, v K }} be a maximal path of data-block tags in d x and d y, K P 4 Assume without loss of generality that {u 0, v 0 } {u 1, v 1 } = {v 0 } and {u K 1, v K 1 } {u K, v K } = {u K }. Then, the parity-block tags [u 0 ] or [v K ] cannot both lie on the failed disks. Suppose to the contrary that parity-block tags [u 0 ] and [v K ] both lie on the failed disks. Then, the tag [u 0 ] must lie on the same disk as the data-block tag {u K, v K }, and [v K ] must lie on the same disk as the data-block tag {u 0, v 0 }, because by construction, a data block on a disk does not contribute to the parity in that disk s parity block. Now, the sequence of tags [u 0 ], {u 0, v 0 }, {u 1, v 1 }, {u K, v K }, [v K ] corresponds to the sequence of coordinates in M P starting with (u 0, u 0 ) followed by coordinates (u 0, v 0 ), (u 1, v 1 ), (u K, v K ), and ending with the (v K, v K ). A traversal through the aforementioned sequence of coordinates would require exactly P moves, by Property 1. This is a contradiction for K P 4, and therefore the sequence [u 0 ], {u 0, v 0 }, {u 1, v 1 }, {u K, v K }, [v K ] contains at most P 1 tags describing P 2 moves. Hence, the tags [u 0 ] or [v K ] cannot both lie on the failed disks. Suppose [u 0 ] does not lie on a failed disk. Then, we can reconstruct the failed disks starting with the data block with tag {u 0, v 0 } using its parity in parity block with tag [u 0 ] and the remaining data blocks contributing to that parity, none of which can be on disk d x or d y for the following reason. If there is a data block on disks d x or d y different from the one with tag {u 0, v 0 } contributing to the parity in the parity block with tag [u 0 ], then that data block would have a tag of the form {u 0, v} or {v, u 0 } and could be added to the maximal path T if it is not already in T. This would be a contradiction for T is maximal. On the other hand, if {u 0, v} or {v, u 0 } is already in T, then T would form a cycle. This too would be a contradiction, for by Property 2 no path in disks d x and d y can have a cycle. Once the data block with tag {u 0, v 0 } has been reconstructed, we can next reconstruct the data block with tag {u 1, v 1 } by observing that {u 0, v 0 } {u 1, v 1 } = {v 0 } and therefore, all the remaining data blocks contributing to the parity in the parity block with tag [v 0 ] are intact or have been reconstructed. In this manner we can iteratively reconstruct all data blocks whose tags occur in the maximal path T. Furthermore, since each data block tag lies on some maximal path, we can reconstruct all corresponding data blocks. Thereafter, the reconstruction of the blocks containing parity is trivial.
11 References [1] M. Blaum, J. Brady, J. Bruck, and J. Menon, EVENODD An efficient scheme for tolerating double disk failures in RAID architectures, IEEE Transactions on Computers, vol. 44, no. 2, pp , [2] P. M. Chen and E. K. Lee, Striping in a RAID level 5 disk array, Proceedings of the 1995 ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems, pp , [3] P. M. Chen and D. A. Patterson, Maximizing performance in a striped disk array, Proceedings of the 17 th IEEE Annual International Symposium on Computer Architecture, pp , [4] J. N. Gray, et al., Parity striping of disk arrays Low cost reliable storage with acceptable throughput, Proceedings of the 16 th International Conference on Very Large Data Bases, pp , [5] R. H. Katz, D. A. Patterson and G. A. Gibson, Disk system architectures for high performance computing, Proceedings of the IEEE, vol. 77, no. 12, pp , Dec [6] E. K. Lee and R. H. Katz, The Performance of Parity Placements in Disk Arrays, IEEE Transactions on Computers, vol. 42, no. 6, pp , Jun [7] W. Litwin and T. Schwarz, Lh*rs A high availability scalable data structure using Reed Solomon codes, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp ACM Press, [8] R. R. Muntz, and J. C. S. Lui, Performance analysis of disk arrays under failure, Proceedings of the 16 th International Conference on Very Large Data Bases, pp , [9] S. W. Ng, Improving disk performance via latency reduction, IEEE Transactions on Computers, vol. 40, no. 1, pp , [10] C.-I. Park, Efficient placement of parity and data to tolerate two disk failures in disk array systems, IEEE Transactions on Parallel and Distributed Systems, pp , [11] C.-I. Park and T.-Y. Choe, Striping in Disk Array RM2 Enabling the tolerance of double disk failures, Supercomputing
12 [12] D. A. Patterson, G. A. Gibson, and R. H. Katz, A case for redundant arrays of inexpensive disks, Proceedings of the ACM SIGMOD, pp , Jun [13] D. A. Patterson, P. M. Chen, G. Gibson, and R. H. Katz, Introduction to redundant arrays of inexpensive disks, Proceedings of the IEEE COMP- CON, pp , Spring [14] J. S. Plank, A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems, Software - Practice and Experience, vol. 27, no. 9, pp , [15] P. Scheuermann, G. Weikum and P. Zabback, Data partitioning and load balancing in parallel disk systems, VLDB Journal, vol. 7, no. 1, pp , [16] H. Simitci and D. A. Reed, Adaptive disk striping for parallel input/output, Proceedings of the Seventh NASA Goddard Conference on Mass Storage Systems, IEEE Computer Society Press, pp , [17] P. Triantafillou and C. Faloutsos, Overlay striping and optimal parallel I/O for modern applications, Parallel Computing, vol. 24, no. 1, pp , 1998.
Secure RAID Schemes from EVENODD and STAR Codes
Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity
More informationSector-Disk Codes and Partial MDS Codes with up to Three Global Parities
Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum
More information416 Distributed Systems
416 Distributed Systems RAID, Feb 26 2018 Thanks to Greg Ganger and Remzi Arapaci-Dusseau for slides Outline Using multiple disks Why have multiple disks? problem and approaches RAID levels and performance
More informationRAID+: Deterministic and Balanced Data Distribution for Large Disk Enclosures
RAID+: Deterministic and Balanced Data Distribution for Large Disk Enclosures Guangyan Zhang, Zican Huang, Xiaosong Ma SonglinYang, Zhufan Wang, Weimin Zheng Tsinghua University Qatar Computing Research
More informationA Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes
A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences
More informationUltimate Codes: Near-Optimal MDS Array Codes for RAID-6
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Technical reports Computer Science and Engineering, Department of Summer 014 Ultimate Codes: Near-Optimal MDS Array
More informationCauchy MDS Array Codes With Efficient Decoding Method
IEEE TRANSACTIONS ON COMMUNICATIONS Cauchy MDS Array Codes With Efficient Decoding Method Hanxu Hou and Yunghsiang S Han, Fellow, IEEE Abstract arxiv:609968v [csit] 30 Nov 206 Array codes have been widely
More informationIBM Research Report. Construction of PMDS and SD Codes Extending RAID 5
RJ10504 (ALM1303-010) March 15, 2013 Computer Science IBM Research Report Construction of PMDS and SD Codes Extending RAID 5 Mario Blaum IBM Research Division Almaden Research Center 650 Harry Road San
More informationS-Code: Lowest Density MDS Array Codes for RAID-6
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Technical reports Computer Science and Engineering, Department of Summer 2014 S-Code: Lowest Density MDS Array Codes
More informationRedundant Array of Independent Disks
Redundant Array of Independent Disks Yashwant K. Malaiya 1 Redundant Array of Independent Disks (RAID) Enables greater levels of performance and/or reliability How? By concurrent use of two or more hard
More informationOn Locally Recoverable (LRC) Codes
On Locally Recoverable (LRC) Codes arxiv:151206161v1 [csit] 18 Dec 2015 Mario Blaum IBM Almaden Research Center San Jose, CA 95120 Abstract We present simple constructions of optimal erasure-correcting
More informationSome Classes of Invertible Matrices in GF(2)
Some Classes of Invertible Matrices in GF() James S. Plank Adam L. Buchsbaum Technical Report UT-CS-07-599 Department of Electrical Engineering and Computer Science University of Tennessee August 16, 007
More informationCoping with disk crashes
Lecture 04.03 Coping with disk crashes By Marina Barsky Winter 2016, University of Toronto Disk failure types Intermittent failure Disk crash the entire disk becomes unreadable, suddenly and permanently
More informationRedundant Array of Independent Disks
Redundant Array of Independent Disks Yashwant K. Malaiya 1 Redundant Array of Independent Disks (RAID) Enables greater levels of performance and/or reliability How? By concurrent use of two or more hard
More informationIBM Research Report. Notes on Reliability Models for Non-MDS Erasure Codes
RJ10391 (A0610-035) October 24, 2006 Computer Science IBM Research Report Notes on Reliability Models for Non-MDS Erasure Codes James Lee Hafner, KK Rao IBM Research Division Almaden Research Center 650
More informationDistributed storage systems from combinatorial designs
Distributed storage systems from combinatorial designs Aditya Ramamoorthy November 20, 2014 Department of Electrical and Computer Engineering, Iowa State University, Joint work with Oktay Olmez (Ankara
More informationMinimum Repair Bandwidth for Exact Regeneration in Distributed Storage
1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,
More informationA New Minimum Density RAID-6 Code with a Word Size of Eight. James S. Plank
A New Minimum Density RAID-6 Code with a Word Size of Eight James S. Plank Department of Electrical Engineering and Computer Science University of Tennessee Knoxville, TN 37996 plank@cs.utk.edu Appearing
More informationProbabilistic Systems Analysis Spring 2018 Lecture 6. Random Variables: Probability Mass Function and Expectation
EE 178 Probabilistic Systems Analysis Spring 2018 Lecture 6 Random Variables: Probability Mass Function and Expectation Probability Mass Function When we introduce the basic probability model in Note 1,
More informationBinary MDS Array Codes with Optimal Repair
IEEE TRANSACTIONS ON INFORMATION THEORY 1 Binary MDS Array Codes with Optimal Repair Hanxu Hou, Member, IEEE, Patric P. C. Lee, Senior Member, IEEE Abstract arxiv:1809.04380v1 [cs.it] 12 Sep 2018 Consider
More informationA New Minimum Density RAID-6 Code with a Word Size of Eight. James S. Plank
A New Minimum Density RAID-6 Code with a Word Size of Eight James S. Plank plank@cs.utk.edu Technical Report CS-08-612 Department of Electrical Engineering and Computer Science University of Tennessee
More informationPermutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems
Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems Viveck R Cadambe Electrical Engineering and Computer Science University of California Irvine,
More informationOn Two Class-Constrained Versions of the Multiple Knapsack Problem
On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic
More informationOptimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction
Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes
More informationDistributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient
Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and
More informationCoding for loss tolerant systems
Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon
More informationMaximally Recoverable Codes with Hierarchical Locality
Maximally Recoverable Codes with Hierarchical Locality Aaditya M Nair V Lalitha SPCRC International Institute of Information Technology Hyderabad India Email: aadityamnair@researchiiitacin lalithav@iiitacin
More informationTransposition Mechanism for Sparse Matrices on Vector Processors
Transposition Mechanism for Sparse Matrices on Vector Processors Pyrrhos Stathis Stamatis Vassiliadis Sorin Cotofana Electrical Engineering Department, Delft University of Technology, Delft, The Netherlands
More informationFAULT TOLERANT SYSTEMS
ﻋﻨﻮان درس ﻧﺎم اﺳﺘﺎد 1394-95 ﻧﺎم درس ﻧﺎم رﺷﺘﻪ ﻧﺎم ﮔﺮاﯾﺶ ﻧﺎم ﻣﻮﻟﻒ ﻧﺎم ﮐﺎرﺷﻨﺎس درس FAULT TOLERANT SYSTEMS Part 8 RAID Systems Chapter 3 Information Redundancy RAID - Redundant Arrays of Inexpensive (Independent
More informationCSE 4201, Ch. 6. Storage Systems. Hennessy and Patterson
CSE 4201, Ch. 6 Storage Systems Hennessy and Patterson Challenge to the Disk The graveyard is full of suitors Ever heard of Bubble Memory? There are some technologies that refuse to die (silicon, copper...).
More informationError Detection, Correction and Erasure Codes for Implementation in a Cluster File-system
Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system Steve Baker December 6, 2011 Abstract. The evaluation of various error detection and correction algorithms and
More informationMatrix Assembly in FEA
Matrix Assembly in FEA 1 In Chapter 2, we spoke about how the global matrix equations are assembled in the finite element method. We now want to revisit that discussion and add some details. For example,
More informationZigzag Codes: MDS Array Codes with Optimal Rebuilding
1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo, Zhiying Wang, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical
More informationIBM Research Report. R5X0: An Efficient High Distance Parity-Based Code with Optimal Update Complexity
RJ 0322 (A0408-005) August 9, 2004 Computer Science IBM Research Report R5X0: An Efficient High Distance Parity-Based Code with Optimal Update Complexity Jeff R. Hartline Department of Computer Science
More informationInformation redundancy
Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant
More informationProgressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes
Progressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes Li Chen ( 陈立 ), PhD, MIEEE Associate Professor, School of Information Science and Technology Sun Yat-sen University, China Joint work
More informationCORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO
CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected
More information2012 IEEE International Symposium on Information Theory Proceedings
Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical
More informationCodes for Partially Stuck-at Memory Cells
1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il
More informationProgress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes
Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Ankit Singh Rawat CS Department Carnegie Mellon University Pittsburgh, PA 523 Email: asrawat@andrewcmuedu O Ozan Koyluoglu Department
More informationBDR: A Balanced Data Redistribution Scheme to Accelerate the Scaling Process of XOR-based Triple Disk Failure Tolerant Arrays
BDR: A Balanced Data Redistribution Scheme to Accelerate the Scaling Process of XOR-based Triple Disk Failure Tolerant Arrays Yanbing Jiang 1, Chentao Wu 1, Jie Li 1,2, and Minyi Guo 1 1 Department of
More informationCommunication Efficient Secret Sharing
1 Communication Efficient Secret Sharing Wentao Huang, Michael Langberg, Senior Member, IEEE, Joerg Kliewer, Senior Member, IEEE, and Jehoshua Bruck, Fellow, IEEE Abstract A secret sharing scheme is a
More informationLDPC Code Design for Distributed Storage: Balancing Repair Bandwidth, Reliability and Storage Overhead
LDPC Code Design for Distributed Storage: 1 Balancing Repair Bandwidth, Reliability and Storage Overhead arxiv:1710.05615v1 [cs.dc] 16 Oct 2017 Hyegyeong Park, Student Member, IEEE, Dongwon Lee, and Jaekyun
More informationLowest Density MDS Array Codes for Reliable Smart Meter Networks
Lowest Density MDS Array Codes for Reliable Smart Meter Networks Magnus Sandell, Senior Member, IEEE, and Filippo Tosato, Member, IEEE 1 arxiv:1310.3695v2 [cs.it] 6 Nov 2013 Abstract In this paper we introduce
More informationSecurity in Locally Repairable Storage
1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider
More informationRegenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems
Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage
More informationLinear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach
Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Mehran Elyasi Department of ECE University of Minnesota melyasi@umn.edu Soheil Mohajer Department of ECE University
More informationLinear Programming Bounds for Robust Locally Repairable Storage Codes
Linear Programming Bounds for Robust Locally Repairable Storage Codes M. Ali Tebbi, Terence H. Chan, Chi Wan Sung Institute for Telecommunications Research, University of South Australia Email: {ali.tebbi,
More informationLinear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channels
1 Linear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channels Shunsuke Horii, Toshiyasu Matsushima, and Shigeichi Hirasawa arxiv:1508.01640v2 [cs.it] 29 Sep 2015 Abstract In this paper,
More informationIEEE TRANSACTIONS ON INFORMATION THEORY 1
IEEE TRANSACTIONS ON INFORMATION THEORY 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Proxy-Assisted Regenerating Codes With Uncoded Repair for Distributed Storage Systems Yuchong Hu,
More informationBalanced Locally Repairable Codes
Balanced Locally Repairable Codes Katina Kralevska, Danilo Gligoroski and Harald Øverby Department of Telematics, Faculty of Information Technology, Mathematics and Electrical Engineering, NTNU, Norwegian
More information14.1 Finding frequent elements in stream
Chapter 14 Streaming Data Model 14.1 Finding frequent elements in stream A very useful statistics for many applications is to keep track of elements that occur more frequently. It can come in many flavours
More informationBalanced Locally Repairable Codes
Balanced Locally Repairable Codes Katina Kralevska, Danilo Gligoroski and Harald Øverby Department of Telematics, Faculty of Information Technology, Mathematics and Electrical Engineering, NTNU, Norwegian
More informationFault Tolerance Technique in Huffman Coding applies to Baseline JPEG
Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Cung Nguyen and Robert G. Redinbo Department of Electrical and Computer Engineering University of California, Davis, CA email: cunguyen,
More informationDistributed Data Storage Systems with. Opportunistic Repair
Distributed Data Storage Systems with 1 Opportunistic Repair Vaneet Aggarwal, Chao Tian, Vinay A. Vaishampayan, and Yih-Farn R. Chen Abstract arxiv:1311.4096v2 [cs.it] 6 Nov 2014 The reliability of erasure-coded
More informationNEC PerforCache. Influence on M-Series Disk Array Behavior and Performance. Version 1.0
NEC PerforCache Influence on M-Series Disk Array Behavior and Performance. Version 1.0 Preface This document describes L2 (Level 2) Cache Technology which is a feature of NEC M-Series Disk Array implemented
More informationFault Tolerate Linear Algebra: Survive Fail-Stop Failures without Checkpointing
20 Years of Innovative Computing Knoxville, Tennessee March 26 th, 200 Fault Tolerate Linear Algebra: Survive Fail-Stop Failures without Checkpointing Zizhong (Jeffrey) Chen zchen@mines.edu Colorado School
More informationReport on PIR with Low Storage Overhead
Report on PIR with Low Storage Overhead Ehsan Ebrahimi Targhi University of Tartu December 15, 2015 Abstract Private information retrieval (PIR) protocol, introduced in 1995 by Chor, Goldreich, Kushilevitz
More informationEfficient random number generation on FPGA-s
Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 313 320 doi: 10.14794/ICAI.9.2014.1.313 Efficient random number generation
More informationPowerApps Optimal Power Flow Formulation
PowerApps Optimal Power Flow Formulation Page1 Table of Contents 1 OPF Problem Statement... 3 1.1 Vector u... 3 1.1.1 Costs Associated with Vector [u] for Economic Dispatch... 4 1.1.2 Costs Associated
More informationGF(2 m ) arithmetic: summary
GF(2 m ) arithmetic: summary EE 387, Notes 18, Handout #32 Addition/subtraction: bitwise XOR (m gates/ops) Multiplication: bit serial (shift and add) bit parallel (combinational) subfield representation
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationIn-Memory Computing of Akers Logic Array
In-Memory Computing of Akers Logic Array Eitan Yaakobi Electrical Engineering California Institute of Technology Pasadena, CA 91125 yaakobi@caltechedu Anxiao (Andrew) Jiang Computer Science and Engineering
More informationan author's https://oatao.univ-toulouse.fr/18723 http://dx.doi.org/10.1109/isit.2017.8006599 Detchart, Jonathan and Lacan, Jérôme Polynomial Ring Transforms for Efficient XOR-based Erasure Coding. (2017)
More informationCOMPUTER SCIENCE TRIPOS
CST0.2017.2.1 COMPUTER SCIENCE TRIPOS Part IA Thursday 8 June 2017 1.30 to 4.30 COMPUTER SCIENCE Paper 2 Answer one question from each of Sections A, B and C, and two questions from Section D. Submit the
More informationThe E8 Lattice and Error Correction in Multi-Level Flash Memory
The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M Kurkoski University of Electro-Communications Tokyo, Japan kurkoski@iceuecacjp Abstract A construction using the E8 lattice and Reed-Solomon
More informationRegular Sparse Crossbar Concentrators
Regular Sparse Crossbar Concentrators Weiming Guo and A. Yavuz Oruç Electrical Engineering Department College Park, MD 20742 ABSTRACT A bipartite concentrator is a single stage sparse crossbar switching
More informationReed-Solomon codes. Chapter Linear codes over finite fields
Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime
More informationScheduling periodic Tasks on Multiple Periodic Resources
Scheduling periodic Tasks on Multiple Periodic Resources Xiayu Hua, Zheng Li, Hao Wu, Shangping Ren* Department of Computer Science Illinois Institute of Technology Chicago, IL 60616, USA {xhua, zli80,
More informationA HIGH-SPEED PROCESSOR FOR RECTANGULAR-TO-POLAR CONVERSION WITH APPLICATIONS IN DIGITAL COMMUNICATIONS *
Copyright IEEE 999: Published in the Proceedings of Globecom 999, Rio de Janeiro, Dec 5-9, 999 A HIGH-SPEED PROCESSOR FOR RECTAGULAR-TO-POLAR COVERSIO WITH APPLICATIOS I DIGITAL COMMUICATIOS * Dengwei
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationCoding problems for memory and storage applications
.. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:
More informationTransforming FSMs for Synthesis by Fault Tolerant Nano-PLAs
Transforming FSMs for Synthesis by Fault Tolerant Nano-PLAs Ilya Levin, Osnat Keren Tel Aviv University, Israel; Bar Ilan University, Israel ilia1@post.tau.ac.il, kereno@eng.biu.ac.il Abstract The paper
More information2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51
2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 Star Joins A common structure for data mining of commercial data is the star join. For example, a chain store like Walmart keeps a fact table whose tuples each
More informationChapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding
Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols
More informationFrequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography
Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Selçuk Baktır, Berk Sunar {selcuk,sunar}@wpi.edu Department of Electrical & Computer Engineering Worcester Polytechnic Institute
More informationA Tale of Two Erasure Codes in HDFS
A Tale of Two Erasure Codes in HDFS Dynamo Mingyuan Xia *, Mohit Saxena +, Mario Blaum +, and David A. Pease + * McGill University, + IBM Research Almaden FAST 15 何军权 2015-04-30 1 Outline Introduction
More informationWhen MTTDLs Are Not Good Enough: Providing Better Estimates of Disk Array Reliability
When MTTDLs Are Not Good Enough: Providing Better Estimates of Disk Array Reliability Jehan-François Pâris Dept. of Computer cience University of Houston Houston, TX 770-00 paris@cs.uh.edu Thomas J. E.
More informationHW2 Solutions Problem 1: 2.22 Find the sign and inverse of the permutation shown in the book (and below).
Teddy Einstein Math 430 HW Solutions Problem 1:. Find the sign and inverse of the permutation shown in the book (and below). Proof. Its disjoint cycle decomposition is: (19)(8)(37)(46) which immediately
More informationConstructions of Optimal Cyclic (r, δ) Locally Repairable Codes
Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Bin Chen, Shu-Tao Xia, Jie Hao, and Fang-Wei Fu Member, IEEE 1 arxiv:160901136v1 [csit] 5 Sep 016 Abstract A code is said to be a r-local
More informationExact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel
Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Brian M. Kurkoski, Paul H. Siegel, and Jack K. Wolf Department of Electrical and Computer Engineering
More informationOn Encoding Symbol Degrees of Array BP-XOR Codes
On Encoding Symbol Degrees of Array BP-XOR Codes Maura B. Paterson Dept. Economics, Math. & Statistics Birkbeck University of London Email: m.paterson@bbk.ac.uk Douglas R. Stinson David R. Cheriton School
More informationEDF Feasibility and Hardware Accelerators
EDF Feasibility and Hardware Accelerators Andrew Morton University of Waterloo, Waterloo, Canada, arrmorton@uwaterloo.ca Wayne M. Loucks University of Waterloo, Waterloo, Canada, wmloucks@pads.uwaterloo.ca
More informationAn average case analysis of a dierential attack. on a class of SP-networks. Distributed Systems Technology Centre, and
An average case analysis of a dierential attack on a class of SP-networks Luke O'Connor Distributed Systems Technology Centre, and Information Security Research Center, QUT Brisbane, Australia Abstract
More informationchapter 12 MORE MATRIX ALGEBRA 12.1 Systems of Linear Equations GOALS
chapter MORE MATRIX ALGEBRA GOALS In Chapter we studied matrix operations and the algebra of sets and logic. We also made note of the strong resemblance of matrix algebra to elementary algebra. The reader
More informationReliability Modeling of Cloud-RAID-6 Storage System
International Journal of Future Computer and Communication, Vol., No. 6, December 5 Reliability Modeling of Cloud-RAID-6 Storage System Qisi Liu and Liudong Xing Abstract Cloud storage is a crucial component
More informationPolynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication
1 Polynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication Qian Yu, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern
More informationAnalysis and Construction of Galois Fields for Efficient Storage Reliability
Analysis and Construction of Galois Fields for Efficient Storage Reliability Technical Report UCSC-SSRC-07-09 Kevin M. Greenan (kmgreen@cs.ucsc.edu) Ethan L. Miller (elm@cs.ucsc.edu) Thomas J. E. Schwarz,
More informationCommunication Efficient Secret Sharing
Communication Efficient Secret Sharing 1 Wentao Huang, Michael Langberg, senior member, IEEE, Joerg Kliewer, senior member, IEEE, and Jehoshua Bruck, Fellow, IEEE arxiv:1505.07515v2 [cs.it] 1 Apr 2016
More informationSolution of Linear Systems
Solution of Linear Systems Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico May 12, 2016 CPD (DEI / IST) Parallel and Distributed Computing
More informationBinary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction
BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The
More informationElliptic Curve Cryptography and Security of Embedded Devices
Elliptic Curve Cryptography and Security of Embedded Devices Ph.D. Defense Vincent Verneuil Institut de Mathématiques de Bordeaux Inside Secure June 13th, 2012 V. Verneuil - Elliptic Curve Cryptography
More informationSOLUTIONS FOR 2012 APMO PROBLEMS
Problem. SOLUTIONS FOR 0 APMO PROBLEMS Solution: Let us denote by XY Z the area of the triangle XY Z. Let x = P AB, y = P BC and z = P CA. From y : z = BCP : ACP = BF : AF = BP F : AP F = x : follows that
More informationProving Correctness of a Controller Algorithm for the RAID. Level 5 System. Mandana Vaziri-Farahani
Proving Correctness of a Controller Algorithm for the RAID Level 5 System by andana Vaziri-Farahani Submitted to the Department of Electrical Engineering and Computer Science in partial fulllment of the
More informationNew Minimal Weight Representations for Left-to-Right Window Methods
New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo
More informationError-Correcting Schemes with Dynamic Thresholds in Nonvolatile Memories
2 IEEE International Symposium on Information Theory Proceedings Error-Correcting Schemes with Dynamic Thresholds in Nonvolatile Memories Hongchao Zhou Electrical Engineering Department California Institute
More informationDistributed Storage Systems with Secure and Exact Repair - New Results
Distributed torage ystems with ecure and Exact Repair - New Results Ravi Tandon, aidhiraj Amuru, T Charles Clancy, and R Michael Buehrer Bradley Department of Electrical and Computer Engineering Hume Center
More informationGrothendieck s Inequality
Grothendieck s Inequality Leqi Zhu 1 Introduction Let A = (A ij ) R m n be an m n matrix. Then A defines a linear operator between normed spaces (R m, p ) and (R n, q ), for 1 p, q. The (p q)-norm of A
More informationRESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE
RESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE Yuan-chun Zhao a, b, Cheng-ming Li b a. Shandong University of Science and Technology, Qingdao 266510 b. Chinese Academy of
More informationA Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo 3rd Biennial Canadian Discrete
More information