Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 2,765
1.
  • A Memory-Disaggregated Radi... A Memory-Disaggregated Radix Tree
    Luo, Xuchuan; Zuo, Pengfei; Shen, Jiacheng ... ACM transactions on storage, 08/2024, Volume: 20, Issue: 3
    Journal Article
    Peer reviewed

    Disaggregated memory (DM) is an increasingly prevalent architecture with high resource utilization. It separates computing and memory resources into two pools and interconnects them with fast ...
Full text
Available for: NUK, UL
2.
  • The Capacity of Private Inf... The Capacity of Private Information Retrieval From Coded Databases
    Banawan, Karim; Ulukus, Sennur IEEE transactions on information theory, 03/2018, Volume: 64, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    We consider the problem of private information retrieval (PIR) over a distributed storage system. The storage system consists of N non-colluding databases, each storing an MDS-coded version of M ...
Full text
Available for: IJS, NUK, UL

PDF
3.
  • Energy Cooperation Optimiza... Energy Cooperation Optimization in Microgrids With Renewable Energy Integration
    Rahbar, Katayoun; Chai, Chin Choy; Zhang, Rui IEEE transactions on smart grid, 03/2018, Volume: 9, Issue: 2
    Journal Article
    Peer reviewed

    Microgrids are key components of future smart grids, which integrate distributed renewable energy generators to efficiently serve the load locally. However, the intermittent nature of renewable ...
Full text
Available for: IJS, NUK, UL
4.
  • Intelligent cryptography ap... Intelligent cryptography approach for secure distributed big data storage in cloud computing
    Li, Yibin; Gai, Keke; Qiu, Longfei ... Information sciences, 20/May , Volume: 387
    Journal Article
    Peer reviewed

    Implementing cloud computing empowers numerous paths for Web-based service offerings to meet diverse needs. However, the data security and privacy has become a critical issue that restricts many ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
5.
  • The Asymptotic Capacity of ... The Asymptotic Capacity of X-Secure T-Private Linear Computation With Graph Based Replicated Storage
    Jia, Haobo; Jia, Zhuqing IEEE transactions on information theory, 2024-July, Volume: 70, Issue: 7
    Journal Article
    Peer reviewed

    We consider the problem of X-secure and T-private linear computation with graph based replicated storage (GXSTPLC), which enables the user to privately retrieve a linear combination of messages from ...
Full text
Available for: IJS, NUK, UL
6.
  • Recovery Sets of Subspaces ... Recovery Sets of Subspaces from a Simplex Code
    Chee, Yeow Meng; Etzion, Tuvi; Kiah, Han Mao ... IEEE transactions on information theory, 05/2024
    Journal Article
    Peer reviewed
    Open access

    Recovery sets for vectors and subspaces are important in the construction of distributed storage system codes. These concepts are also interesting in their own right. In this paper, we consider the ...
Full text
Available for: IJS, NUK, UL
7.
  • Locally Repairable Codes Locally Repairable Codes
    Papailiopoulos, Dimitris S.; Dimakis, Alexandros G. IEEE transactions on information theory, 2014-Oct., 2014-10-00, 20141001, Volume: 60, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    Distributed storage systems for large-scale applications typically use replication for reliability. Recently, erasure codes were used to reduce the large storage overhead, while increasing data ...
Full text
Available for: IJS, NUK, UL

PDF
8.
  • Secure Data Storage and Rec... Secure Data Storage and Recovery in Industrial Blockchain Network Environments
    Liang, Wei; Fan, Yongkai; Li, Kuan-Ching ... IEEE transactions on industrial informatics, 10/2020, Volume: 16, Issue: 10
    Journal Article

    The massive redundant data storage and communication in network 4.0 environments have issues of low integrity, high cost, and easy tampering. To address these issues, in this article, a secure data ...
Full text
Available for: IJS, NUK, UL
9.
Full text
Available for: UL

PDF
10.
  • A Family of Optimal Locally... A Family of Optimal Locally Recoverable Codes
    Tamo, Itzhak; Barg, Alexander IEEE transactions on information theory, 08/2014, Volume: 60, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    A code over a finite alphabet is called locally recoverable (LRC) if every symbol in the encoding is a function of a small number (at most r ) other symbols. We present a family of LRC codes that ...
Full text
Available for: IJS, NUK, UL

PDF
1 2 3 4 5
hits: 2,765

Load filters