UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.760
1.
  • The Capacity of Private Inf... The Capacity of Private Information Retrieval From Coded Databases
    Banawan, Karim; Ulukus, Sennur IEEE transactions on information theory, 03/2018, Letnik: 64, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    We consider the problem of private information retrieval (PIR) over a distributed storage system. The storage system consists of N non-colluding databases, each storing an MDS-coded version of M ...
Celotno besedilo

PDF
2.
  • Energy Cooperation Optimiza... Energy Cooperation Optimization in Microgrids With Renewable Energy Integration
    Rahbar, Katayoun; Chai, Chin Choy; Zhang, Rui IEEE transactions on smart grid, 03/2018, Letnik: 9, Številka: 2
    Journal Article
    Recenzirano

    Microgrids are key components of future smart grids, which integrate distributed renewable energy generators to efficiently serve the load locally. However, the intermittent nature of renewable ...
Celotno besedilo
3.
  • Intelligent cryptography ap... Intelligent cryptography approach for secure distributed big data storage in cloud computing
    Li, Yibin; Gai, Keke; Qiu, Longfei ... Information sciences, 20/May , Letnik: 387
    Journal Article
    Recenzirano

    Implementing cloud computing empowers numerous paths for Web-based service offerings to meet diverse needs. However, the data security and privacy has become a critical issue that restricts many ...
Celotno besedilo
4.
  • The Asymptotic Capacity of ... The Asymptotic Capacity of X-Secure T-Private Linear Computation With Graph Based Replicated Storage
    Jia, Haobo; Jia, Zhuqing IEEE transactions on information theory, 2024-July, Letnik: 70, Številka: 7
    Journal Article
    Recenzirano

    We consider the problem of X-secure and T-private linear computation with graph based replicated storage (GXSTPLC), which enables the user to privately retrieve a linear combination of messages from ...
Celotno besedilo
5.
  • Recovery Sets of Subspaces ... Recovery Sets of Subspaces from a Simplex Code
    Chee, Yeow Meng; Etzion, Tuvi; Kiah, Han Mao ... IEEE transactions on information theory, 05/2024
    Journal Article
    Recenzirano
    Odprti dostop

    Recovery sets for vectors and subspaces are important in the construction of distributed storage system codes. These concepts are also interesting in their own right. In this paper, we consider the ...
Celotno besedilo
6.
  • Locally Repairable Codes Locally Repairable Codes
    Papailiopoulos, Dimitris S.; Dimakis, Alexandros G. IEEE transactions on information theory, 2014-Oct., 2014-10-00, 20141001, Letnik: 60, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    Distributed storage systems for large-scale applications typically use replication for reliability. Recently, erasure codes were used to reduce the large storage overhead, while increasing data ...
Celotno besedilo

PDF
7.
  • Secure Data Storage and Rec... Secure Data Storage and Recovery in Industrial Blockchain Network Environments
    Liang, Wei; Fan, Yongkai; Li, Kuan-Ching ... IEEE transactions on industrial informatics, 10/2020, Letnik: 16, Številka: 10
    Journal Article

    The massive redundant data storage and communication in network 4.0 environments have issues of low integrity, high cost, and easy tampering. To address these issues, in this article, a secure data ...
Celotno besedilo
8.
Celotno besedilo

PDF
9.
  • A Family of Optimal Locally... A Family of Optimal Locally Recoverable Codes
    Tamo, Itzhak; Barg, Alexander IEEE transactions on information theory, 08/2014, Letnik: 60, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    A code over a finite alphabet is called locally recoverable (LRC) if every symbol in the encoding is a function of a small number (at most r ) other symbols. We present a family of LRC codes that ...
Celotno besedilo

PDF
10.
  • X-Secure T-Private Informat... X-Secure T-Private Information Retrieval From MDS Coded Storage With Byzantine and Unresponsive Servers
    Jia, Zhuqing; Jafar, Syed Ali IEEE transactions on information theory, 2020-Dec., 2020-12-00, Letnik: 66, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    The problem of <inline-formula> <tex-math notation="LaTeX">X </tex-math></inline-formula>-secure <inline-formula> <tex-math notation="LaTeX">T </tex-math></inline-formula>-private information ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 1.760

Nalaganje filtrov