共 30 条
[1]
Acharya J, 2019, PR MACH LEARN RES, V97
[2]
Straggler Mitigation at Scale
[J].
IEEE-ACM TRANSACTIONS ON NETWORKING,
2019, 27 (06)
:2266-2279
[3]
Alistarh D, 2017, ADV NEUR IN, V30
[4]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[5]
Cormen T. H., 2001, INTRO ALGORITHMS
[6]
Dutta S, 2018, PR MACH LEARN RES, V84
[7]
On the Locality of Codeword Symbols
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
2012, 58 (11)
:6925-6934
[8]
Halbawi W, 2018, IEEE INT SYMP INFO, P2027, DOI 10.1109/ISIT.2018.8437467
[9]
Pyramid codes: Flexible schemes to trade space for access efficiency in reliable data storage systems
[J].
SIXTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS,
2007,
:79-+
[10]
Kadhe S, 2016, IEEE INT SYMP INFO, P435, DOI 10.1109/ISIT.2016.7541336