2010 IEEE International Symposium on Parallel &Amp; Distributed Processing, Workshops and PHD Forum (IPDPSW) 2010
DOI: 10.1109/ipdpsw.2010.5470926
|View full text |Cite
|
Sign up to set email alerts
|

BitTorrent and fountain codes: friends or foes?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Discussion tributed across the network [44]. Shibo et al [46] propose adding redundant HMCs (Hybrid Memory Cubes) storing erasure codes to compute the data stored in HMCs currently placed in inaccessible power-down modes.…”
mentioning
confidence: 99%
“…Discussion tributed across the network [44]. Shibo et al [46] propose adding redundant HMCs (Hybrid Memory Cubes) storing erasure codes to compute the data stored in HMCs currently placed in inaccessible power-down modes.…”
mentioning
confidence: 99%
“…Erasure coding is also a scheme used for data dissemination. Spoto et al presented a BitTorrent system based on LT fountain codes [52]. In [53] ToroVerde -a push based P2P content distribution system employing fountain codes is presented.…”
Section: Erasure Codingmentioning
confidence: 99%
“…producing a greater number of independent encoded symbols) [7,8]. Reed Solomon, Tornado, Luby Transform, and Raptor codes all represent, respectively, increasingly more successful approximations of the DF paradigm and have been tested on P2P streaming platforms [9,10].…”
Section: Coding Techniques In P2p Streaming Networkmentioning
confidence: 99%