How good is random linear coding based distributed networked storage? In NetCod, 2005. ,
Network information flow, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1204-1216, 2000. ,
DOI : 10.1109/18.850663
Raptor codes based distributed storage algorithms for wireless sensor networks, 2008 IEEE International Symposium on Information Theory, pp.2051-2055, 2008. ,
DOI : 10.1109/ISIT.2008.4595350
Fountain Codes Based Distributed Storage Algorithms for Large-Scale Wireless Sensor Networks, IPSN, pp.171-182, 2008. ,
Provable data possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315318
Digraphs: Theory, Algorithms and Applications, 2001. ,
DOI : 10.1007/978-1-84800-998-1
Total Recall: System Support for Automated Availability Management, NSDI, pp.337-350, 2004. ,
High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two, HotOS, pp.1-6, 2003. ,
An XOR-Based Erasure-Resilient Coding Scheme, 1995. ,
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs, SIGMETRICS, 2000. ,
Epidemic Live Streaming: Optimal Performance Trade-Offs, SIGMETRICS, pp.325-336, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00668529
Informed Content Delivery Across Adaptive Overlay Networks, IEEE/ACM Transactions on Networking, vol.12, issue.5, pp.767-780, 2004. ,
DOI : 10.1109/TNET.2004.836103
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.9552
A digital fountain approach to asynchronous reliable multicast, IEEE Journal on Selected Areas in Communications, vol.20, issue.8, pp.1528-1540, 2002. ,
DOI : 10.1109/JSAC.2002.803996
Informed Content Delivery Across Adaptive Overlay Networks, IEEE/ACM Transactions on Networking, vol.12, issue.5, pp.767-780, 2004. ,
DOI : 10.1109/TNET.2004.836103
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.9552
Peer-Assisted On-Demand Streaming of Stored Media Using BitTorrent-Like Protocols, IFIP/Networking, 2007. ,
DOI : 10.1109/JSAC.2003.818799
SplitStream: High-Bandwidth Multicast in Cooperative Environments, SOSP, 2003. ,
Scribe: a large-scale and decentralized application-level multicast infrastructure, IEEE Journal on Selected Areas in Communications, vol.20, issue.8, pp.1489-1499, 2002. ,
DOI : 10.1109/JSAC.2002.803069
Lt network codes: Low complexity network codes (short paper), ACM CoNEXT'09 (Student Workshop): 5th ACM International Conference on emerging Networking EXperiments and Technologies, 2009. ,
Lt network codes, IEEE ICDCS'2010: 30th International Conference on Distributed Computing Systems, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00455639
FoG: Fighting the Achilles??? Heel of Gossip Protocols with Fountain Codes, SSS'2009: 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2009. ,
DOI : 10.1007/978-3-642-05118-0_13
URL : https://hal.archives-ouvertes.fr/inria-00429998
Phosphite : Guaranteeing out-of-order download in p2p video on demand Phosphite : Incitation à la collaboration pour la vidéo la demande en p2p, P2P'2009: 9th IEEE International Conference on Peer-to-Peer Computing Algotel'2009: 11eme Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, 2009. ,
Signature for Network Coding, 2005. ,
Improving VoD Server Efficiency with BitTorrent, MM, 2007. ,
Efficient Replica Maintenance for Distributed Storage Systems, NSDI, pp.45-58, 2006. ,
Incentives build robustness in BitTorrent, P2PEcon, 2003. ,
Generating Good Degree Distributions for Sparse Parity Check Codes using Oracles, 2001. ,
Wide-area Cooperative Storage with CFS, SOSP, pp.202-215, 2001. ,
Analysis of failure correlation impact on peer-to-peer storage systems, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.184-193, 2009. ,
DOI : 10.1109/P2P.2009.5284518
URL : https://hal.archives-ouvertes.fr/inria-00485847
Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov Models, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), pp.133-144, 2006. ,
DOI : 10.1109/P2P.2006.22
Network Coding for Distributed Storage Systems, INFOCOM, pp.2000-2008, 2007. ,
Network Coding for Distributed Storage Systems, IEEE Transactions on Information Theory, vol.56, issue.9, pp.4539-4551, 2010. ,
DOI : 10.1109/TIT.2010.2054295
Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005., 2005. ,
DOI : 10.1109/IPSN.2005.1440909
Decentralized erasure codes for distributed networked storage, Joint special issue, 2006. ,
DOI : 10.1109/TIT.2006.874535
A Survey on Network Codes for Distributed Storage, Proceedings of the IEEE, vol.99, issue.3, 2010. ,
DOI : 10.1109/JPROC.2010.2096170
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems, 2008 Eighth International Conference on Peer-to-Peer Computing, 2008. ,
DOI : 10.1109/P2P.2008.9
A Pratical Study of Regenerating Codes for Peer-to-Peer Backup Systems, ICDCS, 2009. ,
Epidemic Information Dissemination in Distributed Systems, Computer, vol.37, issue.5, pp.60-67, 2004. ,
Pulp: Un protocole épidémique hybride, Algotel, 2009. ,
Low Density Parity Check Codes. Transactions of the IRE Professional Group on Information Theory, pp.21-28, 1962. ,
The Google File System, SOSP, pp.29-43, 2003. ,
Anatomy of a P2P Content Distribution System with Network Coding, IPTPS, pp.1-6, 2006. ,
Network coding for large scale content distribution, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.2235-2245, 2005. ,
DOI : 10.1109/INFCOM.2005.1498511
An Experimental Study of the Skype Peer-to-Peer VoIP System, IPTPS, 2006. ,
Relaying a Fountain Code Accross Multiple Nodes, ITW, pp.483-484, 2008. ,
Error Detecting and Error Correcting Codes, Bell System Technical Journal, vol.29, issue.2, 1950. ,
DOI : 10.1002/j.1538-7305.1950.tb00463.x
Byzantine modification detection in multicast networks using randomized network coding, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., p.143, 2003. ,
DOI : 10.1109/ISIT.2004.1365180
A Random Linear Network Coding Approach to Multicast, IEEE Transactions on Information Theory, vol.52, issue.10, pp.524413-4430, 2006. ,
DOI : 10.1109/TIT.2006.881746
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding, IEEE Journal on Selected Areas in Communications, vol.28, issue.2, pp.268-276, 2010. ,
DOI : 10.1109/JSAC.2010.100216
Resilient Network Coding in the Presence of Byzantine Adversaries, INFOCOM, pp.616-624, 2007. ,
Gossip-based peer sampling, ACM Transactions on Computer Systems, vol.25, issue.3, 2007. ,
DOI : 10.1145/1275517.1275520
The PeerSim Simulator ,
Growth Codes: Maximizing Sensor Network Data Persistence, SIGCOMM, pp.255-266, 2006. ,
Randomized rumor spreading, Proceedings 41st Annual Symposium on Foundations of Computer Science, pp.566-574, 2000. ,
DOI : 10.1109/SFCS.2000.892324
XORs in the Air: Practical Wireless Network Coding, SIGCOMM, 2006. ,
An algebraic approach to network coding, IEEE/ACM Transactions on Networking, vol.11, issue.5, pp.782-795, 2003. ,
DOI : 10.1109/TNET.2003.818197
Tree-structured Data Regeneration in Distributed Storage Systems with Regenerating Codes, 2010 Proceedings IEEE INFOCOM, 2010. ,
DOI : 10.1109/INFCOM.2010.5462122
Linear Network Coding, IEEE Transactions On Information Theory, vol.49, pp.371-381, 2003. ,
Random Linear Network Coding: A free cipher?, 2007 IEEE International Symposium on Information Theory, 2007. ,
DOI : 10.1109/ISIT.2007.4557282
Erasure code replication revisited, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., 2004. ,
DOI : 10.1109/PTP.2004.1334935
Differentiated Data Persistence with Priority Random Linear Codes, 27th International Conference on Distributed Computing Systems (ICDCS '07), 2007. ,
DOI : 10.1109/ICDCS.2007.99
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.319.4867
Locality in Distributed Graph Algorithms, SIAM Journal on Computing, vol.21, issue.1, pp.193-201, 1992. ,
DOI : 10.1137/0221015
Rescuing Tit-for-Tat with Source Coding, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007. ,
DOI : 10.1109/P2P.2007.10
Practical Loss-Resilient Codes, STOC, 1997. ,
A Content Distribution System Based on Sparse Network Coding, NetCod, 2007. ,
Information Theory, Inference, and Learning Algorithms, 2002. ,
Randomized decentralised broadcasting algorithms, INFOCOM, 2007. ,
Methods for Efficient Network Coding, Allerton, 2006. ,
A Public-Key Cryptosystem Based on Algebraic Coding Theory, JPL Deep Space Network Progress Report, pp.42-4490, 1978. ,
Digital fountains: a survey and look forward, Manufacturing Engineer, 2004. ,
DOI : 10.1109/ITW.2004.1405313
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9463
AVMON: Optimal and Scalable Discovery of Consistent Availability Monitoring Overlays for Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, vol.20, issue.4, pp.446-459, 2009. ,
DOI : 10.1109/TPDS.2008.84
Self-repairing homomorphic codes for distributed storage systems, 2011 Proceedings IEEE INFOCOM, 2010. ,
DOI : 10.1109/INFCOM.2011.5934901
A Security Protocol for Self-Organizing Data Storage, IFIPSEC, 2008. ,
DOI : 10.1007/978-0-387-09699-5_44
Anirban Mahanti, and Niklas Carlsson Analysis of BitTorrent-like Protocols for On-Demand Stored Media Streaming, SIGMETRICS, 2008. ,
A Case for Redundant Arrays of Inexpensive Disks (RAID), SIGMOD International Conference on Management of Data, 1988. ,
Is there a future for mesh-based live-video streaming ? In P2P, 2008. ,
Erasure codes for storage applications, Tutorial Slides, presented at FAST-2005: 4th Usenix Conference on File and Storage Technologies, 2005. ,
Explicit construction of optimal exact regenerating codes for distributed storage, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2009. ,
DOI : 10.1109/ALLERTON.2009.5394538
Polynomial Codes over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics (SIAM), vol.8, pp.300-304, 1960. ,
Pond: the OceanStore Prototype, FAST, 2003. ,
Effective erasure codes for reliable computer communication protocols, ACM SIGCOMM Computer Communication Review, vol.27, issue.2, 1997. ,
DOI : 10.1145/263876.263881
High Availability in DHTs: Erasure Coding vs. Replication, IPTPS, 2005. ,
DOI : 10.1007/11558989_21
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Middleware, 2001. ,
DOI : 10.1007/3-540-45518-3_18
Gossiping with Multiple Messages, INFOCOM, 2007. ,
A Large-scale Study of Failures in Highperformance-computing Systems, DSN, 2006. ,
Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), 2006. ,
DOI : 10.1109/ICDCS.2006.80
Explicit Codes Minimizing Repair Bandwidth for Distributed Storage, ITW, 2010. ,
A Mathematical Theory of Communication. The Bell System Technical Journal, pp.379-423, 1948. ,
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Raptor Codes, IEEE/ACM Transactions on Networking, vol.14, issue.6, pp.2551-2567, 2006. ,
Maximum distance<tex>q</tex>-nary codes, IEEE Transactions on Information Theory, vol.10, issue.2, pp.116-118, 1964. ,
DOI : 10.1109/TIT.1964.1053661
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, SIGCOMM, pp.149-160, 2001. ,
Exact Regeneration Codes for Distributed Storage Repair Using Interference Alignment, ISIT, 2010. ,
A recursive approach to low complexity codes, IEEE Transactions on Information Theory, vol.27, issue.5, pp.533-547, 1981. ,
DOI : 10.1109/TIT.1981.1056404
Raptor network video coding, Proceedings of the international workshop on Workshop on mobile video , MV '07, 2007. ,
DOI : 10.1145/1290050.1290056
Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications, Journal of the IEEE, vol.55, pp.109-115, 1926. ,
How Practical is Network Coding?, 200614th IEEE International Workshop on Quality of Service, 2006. ,
DOI : 10.1109/IWQOS.2006.250480
Erasure Coding Vs. Replication: A Quantitative Comparison, IPTPS, 2002. ,
DOI : 10.1007/3-540-45748-8_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.9064
Network coding for efficient communication in extreme networks, Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking , WDTN '05, 2005. ,
DOI : 10.1145/1080139.1080147
Reducing repair traffic for erasure coding-based storage via interference alignement, ISIT, 2009. ,
Secure Network Coding, ISIT, 2002. ,
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008. ,
DOI : 10.1109/INFOCOM.2008.199
CoolStreaming/DONet: A Data-Driven Overlay Network for Efficient Live Media Streaming, INFOCOM, 2005. ,