Version du 30 juin 2010Content distribution systems are developping quickly. In these systems, in addition to the traditionnal information corruptions, arises the problem of packet losses. The need of reliability in this context has lead to the emergence of erasure correcting codes. Thanks to the addition of redundant information, they are able to recover the lost information. In this thesis we address the problem of designing erasure codes having good correction capabilities while having a complexity enabling to reach high throughput. For this, we have chosen to work jointly on the codes and there implementations inside a software codec, and more specificaly on the decoding algorithms. The first part of our work shows that solutions based ...
Ces dernières années ont vu naitre un intérêt grandissant pour les décodeurs correcteurs d'erreurs o...
This work is dedicated to the design, analysis and optimization of Application-Level Forward Erasure...
Abstract—P2P computing platforms are subject to a wide range of attacks. In this paper, we propose a...
Version du 30 juin 2010Content distribution systems are developping quickly. In these systems, in ad...
This work focus on erasure codes, particularly those that of high performance, and the related decod...
This thesis is dedicated to the study of iterative decoders, both for binary and non-binary low dens...
International audienceMojette Transform (MT) based erasure correction coding possesses extremely eff...
Cette thèse se consacre à l'étude de décodeurs itératifs, pour des codes correcteurd'erreurs binaire...
In this paper low-density parity-check (LDPC) codes are designed for burst erasure channels. Firstly...
International audienceIn this paper, we show that over the binary erasure channel, Quasi-Cyclic LDPC...
In view of the future diffusion of quantum computers, many of the cryptographic systems currently in...
Les codes Low-Density Parity-Check (LDPC) sont au coeur de larecherche des codes correcteurs d'erreu...
International audienceThis paper presents new FEC codes for the erasure channel, LDPC-Band, that hav...
Reliably transmitting information over a transmission channel is a recurrent problem in Informatic S...
This work is dedicated to the design, analysis and optimization of Application-Level Forward Erasure...
Ces dernières années ont vu naitre un intérêt grandissant pour les décodeurs correcteurs d'erreurs o...
This work is dedicated to the design, analysis and optimization of Application-Level Forward Erasure...
Abstract—P2P computing platforms are subject to a wide range of attacks. In this paper, we propose a...
Version du 30 juin 2010Content distribution systems are developping quickly. In these systems, in ad...
This work focus on erasure codes, particularly those that of high performance, and the related decod...
This thesis is dedicated to the study of iterative decoders, both for binary and non-binary low dens...
International audienceMojette Transform (MT) based erasure correction coding possesses extremely eff...
Cette thèse se consacre à l'étude de décodeurs itératifs, pour des codes correcteurd'erreurs binaire...
In this paper low-density parity-check (LDPC) codes are designed for burst erasure channels. Firstly...
International audienceIn this paper, we show that over the binary erasure channel, Quasi-Cyclic LDPC...
In view of the future diffusion of quantum computers, many of the cryptographic systems currently in...
Les codes Low-Density Parity-Check (LDPC) sont au coeur de larecherche des codes correcteurs d'erreu...
International audienceThis paper presents new FEC codes for the erasure channel, LDPC-Band, that hav...
Reliably transmitting information over a transmission channel is a recurrent problem in Informatic S...
This work is dedicated to the design, analysis and optimization of Application-Level Forward Erasure...
Ces dernières années ont vu naitre un intérêt grandissant pour les décodeurs correcteurs d'erreurs o...
This work is dedicated to the design, analysis and optimization of Application-Level Forward Erasure...
Abstract—P2P computing platforms are subject to a wide range of attacks. In this paper, we propose a...