International Journal of Soft Computing
Year:
2018
Volume:
13
Issue:
1
Page No.
25 - 30
References
Adya, A., W.J. Bolosky, M. Castro, G. Cermak and G. Cermak
et al., 2002. Farsite: Federated, available and reliable storage for an incompletely trusted environment. Proceedings of the 5th symposium on Operating systems design and implementation, Volume, 36, December 9-11, 2002, Boston, Massachusetts, USA., pp: 1-14.
Bellorado, J. and A. Kavcic, 2010. Low-complexity soft-decoding algorithms for reed-solomon codes-Part I: An algebraic soft-in hard-out chase decoder. IEEE. Trans. Inf. Theory, 56: 945-959.
CrossRef | Direct Link | Druschel, P. and A. Rowstron, 2001. PAST: A large-scale, persistent peer-to-peer storage utility. Proceedings of the 8th Workshop on Hot Topics in Operating Systems, May 20-22, 2001, IEEE, Elmau, Germany, ISBN:0-7695-1040-X, pp: 75-80.
Garcia-Herrero, F., J. Valls and P.K. Meher, 2011. High-speed RS (255, 239) decoder based on LCC decoding. Circuits Syst. Signal Process., 30: 1643-1669.
CrossRef | Direct Link | Haeberlen, A., A. Mislove and P. Druschel, 2005. Glacier: Highly durable, decentralized storage despite massive correlated failures. Proceedings of the 2nd Conference on Symposium on Networked Systems Design and Implementation Volume 2, May 2-4, 2005, USENIX Association, Berkeley, California, USA., pp: 143-158.
Jiang, J. and K.R. Narayanan, 2008. Algebraic soft-decision decoding of reed-solomon codes using bit-level soft information. IEEE. Trans. Inf. Theory, 54: 3907-3928.
CrossRef | Direct Link | Kubiatowicz, J., D. Bindel, Y. Chen, S. Czerwinski, P. Eaton and D. Geels, 2000. Oceanstore: An architecture for global-scale persistent storage. ACM Sigplan Notices, 28: 190-201.
CrossRef | Mallikharjuna, K.R. and K. Anuradha, 2015. An efficient method for software reliability growth model selection using modified particle swarm optimization technique. Intl. Rev. Comput. Software, 10: 1169-1178.
Direct Link | Mallikharjuna, R.K. and A. Kodali, 2017. An efficient method for enhancing reliability and selection of software reliability growth model through optimization techniques. J. Software, 12: 1-8.
Direct Link | Rao, K.M. and K. Anuradha, 2016. Performance evaluation of software reliability growth models using optimization techniques. Intl. J. Comput. Sci. Inf. Secur., 14: 355-362.
Direct Link | Shao, J. and Z. Cao, 2009. CCA-secure proxy re-encryption without pairings. Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography, Vol. 5443, March 18-20, 2009, Springer, Irvine, California, USA., pp: 357-376.
Tang, Q., 2008. Type-based proxy re-encryption and its construction. Proceedings of the 9th International Conference on Cryptology in India Vol. 8, December 14-17, 2008, Springer, Kharagpur, India, pp: 130-144.
Zhang, W., H. Wang and B. Pan, 2013. Reduced-complexity LCC reed-solomon decoder based on unified syndrome computation. IEEE. Trans. Very Large Scale Integr. Syst., 21: 974-978.
CrossRef | Direct Link |