|
[1] M. Blum and S. Micali, “How to generate cryptographically strong sequences of pseudo-random bits,” SIAM Journal on Computing, 13(4):850—864, November 1984. [2] P. M. Chen, E. K. Lee, G. A. Gibson, R. H. Katz, and D. A. Patterson, “RAID: High Performance Reliable Secondary Storage,” ACM Computing Surveys, 26(2):145—185, 1994. [3] P. Elias, “List decoding for noisy channels,” Institute of Radio Engineers, 94—104, 1957. [4] G. D. Forney, “Generalized Minimum Distance Decoding,” IEEE Trans. Inform. Theory, 12:125—131, 1966. [5] O. Goldreich and L. A. Levin, “A hard-core predicate for all one-way functions,” Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, 25—32, May 1989. [6] V. Guruswami and M. Sudan, “Improved decoding of Reed-Solomon and algebraic-geometric codes,” IEEE Transactions on Information Theory, 45:1757—1767, September 1999. [7] V. Guruswami and M. Sudan, “List decoding algorithms for certain concatenated codes,” Proceedings of the 32nd annual ACM symposium on Theory of computing, 181—190, May 2000. [8] R. Impagliazzo, “Personal Communication,” July 1997. [9] R. Impagliazzo and L.A. Zuckerman, “How to Recycle Random Bits,” 30th FOCS, 248—253, 1989. [10] S. M. Johnson, “A new upper bound for error-correcting codes,” IEEE Trans. on Info. Theory, 8:203—207, 1962. [11] E. Kaltofen, “A Polynomial-Time Reduction from Bivariate to Univariate Integral Polynomial Factorization,” In 23rd Annual Symposium on Foundations of Computer Science, 57—64, 1982. [12] R. Koetter and A. Vardy, “Algebraic soft-decision decoding of Reed-Solomon codes” IEEE Transactions on Information Theory, August 31 2001 [13] N. Nisan and A. Ta-Shma, “Extracting randomness: A survey and new constructions,” Journal of Computer and System Sciences, 58(1):148—173, 1999. [14] N. Nisan and A. Wigderson, “Hardness vs randomness,” Journal of Computer and System Science, 49:149—167, 1994. [15] N. Nisan and D. Zuckerman, “More deterministic simulation in logspace,” In Proceedings of the 25th Annual ACM Symposium on the Theory Computing, 235—244, 1993. [16] D. A. Patterson, G. Gibson, and R. H. Katz, “A case for redundant arrays of inexpensive disks (RAID),” ACM SIGMOD International Conference on Management of Data, 109—116, June 1988. [17] J. S. Plank, “A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems,” Software, Practice and Experience, 27(9):995— 1012, September 1997. [18] R. Raz, O. Reingold, and S. Vadhan, “Extracting all the randomness and reducing the error in Trevisan’s extractors,” Proceedings of the 31st Annual ACM Symposium on Theory of Computing, 149—158, 1999. [19] M. Santha and U. Vazirani, “Generating quasi-random sequences from slightly random sources,” Journal of Comput. System Science, 75—87, 1986. [20] A. Srinivasan and D. Zuckerman, “Computing with very weak random sources,” Proceedings of the 35th Annual IEEE Symposium on the Foundations of Computer Science, 1994. [21] M. Sudan, “Algorithmic issues in coding theory,” In 17th Conference on Foundations of Software Technology and Theoretical Computer Science, 1997. [22] M. Sudan, “Decoding of Reed-Solomon codes beyond the error correction bound,” Journal of Complexity, 13(1):180—193, 1997. [23] M. Sudan, “List decoding: Algorithms and applications,” SIGACT News, 31:16—27, 2000. [24] A. Ta-Shma and D. Zuckerman, “Extractor Codes,” Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, 193—199, July 2001. [25] A. Ta-Shma, C. Umans, and D. Zuckerman, “Loss-less Condensers, Unbalanced Expanders, and Extractors,” Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, 2001. [26] L. Trevisan, “Extractors and pseudorandom generators,” Journal of the ACM, 48(4):860—879, July 2001. [27] L. R. Welch and E. R. Berlekamp, “Error correction for algebraic block codes,” US patent, Number 4, 633, 470, 1986. [28] X-W. Wu and P.H. Siegel, “Ecient root-nding algorithm with application to list decoding of algebraic-geometric codes,” IEEE Trans. Inform. Theory, 47:2579—2587, September 2001. [29] X. Yu, B. Gum, Y. Chen, R. Y. Wang, K. Li, A. Krishnamurthy, and T. E. Anderson, “Trading capacity for performance in a disk array,”Proceedings of the OSDI, October 2000. [30] D. Zuckerman, “Simulating BPP using a general weak random source,”Proceedings of the 32nd Annual IEEE Symposium on the Foundations of Computer Science, 79—89, 1991.
|