{"id":"https://openalex.org/W2766414680","doi":"https://doi.org/10.1109/itw.2017.8277971","title":"On the duality of fractional repetition codes","display_name":"On the duality of fractional repetition codes","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2766414680","doi":"https://doi.org/10.1109/itw.2017.8277971","mag":"2766414680"},"language":"en","primary_location":{"id":"doi:10.1109/itw.2017.8277971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2017.8277971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1710.07909","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Bing Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bing Zhu","raw_affiliation_strings":["School of Electronic and Computer Engineering, Peking University"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Computer Engineering, Peking University","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kenneth W. Shum","orcid":null},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kenneth W. Shum","raw_affiliation_strings":["Institute of Network Coding, The Chinese University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, The Chinese University of Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":null,"display_name":"Hui Li","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["Future Network PKU Lab of National Major Research Infrastructure, Peking University, China","Shenzhen Key Lab of Information Theory and Future Internet Architecture, Shenzhen Eng. Lab of Converged Networks Technology"],"affiliations":[{"raw_affiliation_string":"Future Network PKU Lab of National Major Research Infrastructure, Peking University, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Shenzhen Key Lab of Information Theory and Future Internet Architecture, Shenzhen Eng. Lab of Converged Networks Technology","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.4379,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68669871,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"56","last_page":"60"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/erasure-code","display_name":"Erasure code","score":0.6554999947547913},{"id":"https://openalex.org/keywords/distributed-data-store","display_name":"Distributed data store","score":0.5640000104904175},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.5236999988555908},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5102999806404114},{"id":"https://openalex.org/keywords/duality","display_name":"Duality (order theory)","score":0.4997999966144562},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.4675999879837036},{"id":"https://openalex.org/keywords/file-size","display_name":"File size","score":0.4090999960899353},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.3882000148296356},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.3856000006198883}],"concepts":[{"id":"https://openalex.org/C137529215","wikidata":"https://www.wikidata.org/wiki/Q5385031","display_name":"Erasure code","level":3,"score":0.6554999947547913},{"id":"https://openalex.org/C24885549","wikidata":"https://www.wikidata.org/wiki/Q339678","display_name":"Distributed data store","level":2,"score":0.5640000104904175},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5383999943733215},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.5236999988555908},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5102999806404114},{"id":"https://openalex.org/C2778023678","wikidata":"https://www.wikidata.org/wiki/Q554403","display_name":"Duality (order theory)","level":2,"score":0.4997999966144562},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.4675999879837036},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.43720000982284546},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4108000099658966},{"id":"https://openalex.org/C2776029614","wikidata":"https://www.wikidata.org/wiki/Q1146367","display_name":"File size","level":2,"score":0.4090999960899353},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3882000148296356},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3856000006198883},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.36230000853538513},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.3481000065803528},{"id":"https://openalex.org/C7545210","wikidata":"https://www.wikidata.org/wiki/Q838123","display_name":"Data redundancy","level":2,"score":0.3449999988079071},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.3312999904155731},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3206999897956848},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3149999976158142},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30799999833106995},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.3046000003814697},{"id":"https://openalex.org/C73666251","wikidata":"https://www.wikidata.org/wiki/Q5310189","display_name":"Dual code","level":5,"score":0.3034999966621399},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.28790000081062317},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C529754248","wikidata":"https://www.wikidata.org/wiki/Q1054772","display_name":"Data recovery","level":2,"score":0.2709999978542328},{"id":"https://openalex.org/C128151799","wikidata":"https://www.wikidata.org/wiki/Q13563306","display_name":"Luby transform code","level":5,"score":0.2703000009059906},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.26030001044273376},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.25870001316070557},{"id":"https://openalex.org/C103093684","wikidata":"https://www.wikidata.org/wiki/Q7094069","display_name":"Online codes","level":5,"score":0.257099986076355},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.2540999948978424},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.2533999979496002},{"id":"https://openalex.org/C76132124","wikidata":"https://www.wikidata.org/wiki/Q5474786","display_name":"Fountain code","level":5,"score":0.2515999972820282}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/itw.2017.8277971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2017.8277971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1710.07909","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1710.07909","pdf_url":"https://arxiv.org/pdf/1710.07909","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1710.07909","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1710.07909","pdf_url":"https://arxiv.org/pdf/1710.07909","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1836955865","https://openalex.org/W1975500879","https://openalex.org/W2042046775","https://openalex.org/W2055114150","https://openalex.org/W2105185344","https://openalex.org/W2118917487","https://openalex.org/W2120770247","https://openalex.org/W2125240755","https://openalex.org/W2138744797","https://openalex.org/W2139848116","https://openalex.org/W2143174824","https://openalex.org/W2190219630","https://openalex.org/W2434874977","https://openalex.org/W2559793833","https://openalex.org/W2962720639","https://openalex.org/W2963347633","https://openalex.org/W2964259813","https://openalex.org/W4211147273","https://openalex.org/W6606324823"],"related_works":[],"abstract_inverted_index":{"Erasure":[0],"codes":[1],"have":[2],"emerged":[3],"as":[4],"an":[5,80],"efficient":[6],"technology":[7],"for":[8],"providing":[9],"data":[10],"redundancy":[11],"in":[12,28],"distributed":[13],"storage":[14,26,30],"systems.":[15],"However,":[16],"it":[17],"is":[18],"a":[19,90],"challenging":[20],"task":[21],"to":[22],"repair":[23,52,57],"the":[24,50,65,72,75,94],"failed":[25],"nodes":[27],"erasure-coded":[29],"systems,":[31],"which":[32,48],"requires":[33],"large":[34],"quantities":[35],"of":[36,67,79,98],"network":[37],"resources.":[38],"In":[39],"this":[40],"paper,":[41],"we":[42,88],"study":[43],"fractional":[44],"repetition":[45],"(FR)":[46],"codes,":[47,69],"enable":[49],"minimal":[51],"complexity":[53],"and":[54,70,83],"also":[55],"minimum":[56],"bandwidth":[58],"during":[59],"node":[60],"repair.":[61],"We":[62],"focus":[63],"on":[64,93],"duality":[66],"FR":[68,81,99],"investigate":[71],"relationship":[73],"between":[74],"supported":[76,95],"file":[77,96],"size":[78,97],"code":[82],"its":[84],"dual":[85,91],"code.":[86],"Furthermore,":[87],"present":[89],"bound":[92],"codes.":[100]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2017-11-10T00:00:00"}
