UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 1,111
1.
  • The Capacity of Private Inf... The Capacity of Private Information Retrieval From Coded Databases
    Banawan, Karim; Ulukus, Sennur IEEE transactions on information theory, 03/2018, Volume: 64, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    We consider the problem of private information retrieval (PIR) over a distributed storage system. The storage system consists of N non-colluding databases, each storing an MDS-coded version of M ...
Full text

PDF
2.
  • Energy Cooperation Optimiza... Energy Cooperation Optimization in Microgrids With Renewable Energy Integration
    Rahbar, Katayoun; Chai, Chin Choy; Zhang, Rui IEEE transactions on smart grid, 03/2018, Volume: 9, Issue: 2
    Journal Article
    Peer reviewed

    Microgrids are key components of future smart grids, which integrate distributed renewable energy generators to efficiently serve the load locally. However, the intermittent nature of renewable ...
Full text
3.
  • Intelligent cryptography ap... Intelligent cryptography approach for secure distributed big data storage in cloud computing
    Li, Yibin; Gai, Keke; Qiu, Longfei ... Information sciences, 20/May , Volume: 387
    Journal Article
    Peer reviewed

    Implementing cloud computing empowers numerous paths for Web-based service offerings to meet diverse needs. However, the data security and privacy has become a critical issue that restricts many ...
Full text
4.
  • The Asymptotic Capacity of ... The Asymptotic Capacity of X-Secure T-Private Linear Computation With Graph Based Replicated Storage
    Jia, Haobo; Jia, Zhuqing IEEE transactions on information theory, 2024-July, Volume: 70, Issue: 7
    Journal Article
    Peer reviewed

    We consider the problem of X-secure and T-private linear computation with graph based replicated storage (GXSTPLC), which enables the user to privately retrieve a linear combination of messages from ...
Full text
5.
  • Recovery Sets of Subspaces ... Recovery Sets of Subspaces from a Simplex Code
    Chee, Yeow Meng; Etzion, Tuvi; Kiah, Han Mao ... IEEE transactions on information theory, 05/2024
    Journal Article
    Peer reviewed
    Open access

    Recovery sets for vectors and subspaces are important in the construction of distributed storage system codes. These concepts are also interesting in their own right. In this paper, we consider the ...
Full text
6.
  • Locally Repairable Codes Locally Repairable Codes
    Papailiopoulos, Dimitris S.; Dimakis, Alexandros G. IEEE transactions on information theory, 2014-Oct., 2014-10-00, 20141001, Volume: 60, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    Distributed storage systems for large-scale applications typically use replication for reliability. Recently, erasure codes were used to reduce the large storage overhead, while increasing data ...
Full text

PDF
7.
  • Secure Data Storage and Rec... Secure Data Storage and Recovery in Industrial Blockchain Network Environments
    Liang, Wei; Fan, Yongkai; Li, Kuan-Ching ... IEEE transactions on industrial informatics, 10/2020, Volume: 16, Issue: 10
    Journal Article

    The massive redundant data storage and communication in network 4.0 environments have issues of low integrity, high cost, and easy tampering. To address these issues, in this article, a secure data ...
Full text
8.
Full text

PDF
9.
  • A Family of Optimal Locally... A Family of Optimal Locally Recoverable Codes
    Tamo, Itzhak; Barg, Alexander IEEE transactions on information theory, 08/2014, Volume: 60, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    A code over a finite alphabet is called locally recoverable (LRC) if every symbol in the encoding is a function of a small number (at most r ) other symbols. We present a family of LRC codes that ...
Full text

PDF
10.
  • X-Secure T-Private Informat... X-Secure T-Private Information Retrieval From MDS Coded Storage With Byzantine and Unresponsive Servers
    Jia, Zhuqing; Jafar, Syed Ali IEEE transactions on information theory, 2020-Dec., 2020-12-00, Volume: 66, Issue: 12
    Journal Article
    Peer reviewed
    Open access

    The problem of <inline-formula> <tex-math notation="LaTeX">X </tex-math></inline-formula>-secure <inline-formula> <tex-math notation="LaTeX">T </tex-math></inline-formula>-private information ...
Full text

PDF
1 2 3 4 5
hits: 1,111

Load filters