• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zheng Tengfei, Zhou Tongqing, Cai Zhiping, Wu Hongjia. Review of Coded Computing[J]. Journal of Computer Research and Development, 2021, 58(10): 2187-2212. DOI: 10.7544/issn1000-1239.2021.20210496
Citation: Zheng Tengfei, Zhou Tongqing, Cai Zhiping, Wu Hongjia. Review of Coded Computing[J]. Journal of Computer Research and Development, 2021, 58(10): 2187-2212. DOI: 10.7544/issn1000-1239.2021.20210496

Review of Coded Computing

Funds: This work was supported by the National Key Research and Development Program of China (2020YFC2003400, 2018YFB0204301), the National Natural Science Foundation of China (62072465, 62102425, 62172155), and the National University of Defense Technology Research (ZK19-38).
More Information
  • Published Date: September 30, 2021
  • By integrating the coding theory with distributed computing and exploiting flexible coding methods, coded computing manages to relieve the transmission burden and the negative effects of stragglers. In this way, it improves the overall performance of distributed computing systems. Meanwhile, coded computing schemes are also designed and used to provide security and privacy guarantees for distributed computing systems, where mechanisms, such as error-correcting and data masking, are generally adopted. Due to the advantages of coded computing in communication, storage and computational complexity, it has attracted extensive attention and has become a popular direction in the field of distributed computing. In this survey, the background of coded computing is reviewed with its definition and core ideology clarified. Afterward, the existing coding schemes for communication bottleneck, computation delay and security privacy are introduced and comparatively analyzed in detail. Finally, future research directions and technical challenges of coded computing are analyzed and introduced to provide valuable references for related researchers.
  • Related Articles

    [1]Xu Jingnan, Wang Leixia, Meng Xiaofeng. Research on Privacy Auditing in Data Governance[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202540530
    [2]Liu Jialang, Guo Yanming, Lao Mingrui, Yu Tianyuan, Wu Yulun, Feng Yunhao, Wu Jiazhuang. Survey of Backdoor Attack and Defense Algorithms Based on Federated Learning[J]. Journal of Computer Research and Development, 2024, 61(10): 2607-2626. DOI: 10.7544/issn1000-1239.202440487
    [3]Zhang Jing, Ju Jialiang, Ren Yonggong. Double-Generators Network for Data-Free Knowledge Distillation[J]. Journal of Computer Research and Development, 2023, 60(7): 1615-1627. DOI: 10.7544/issn1000-1239.202220024
    [4]Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing. Survey of Data Privacy Security Based on General Data Protection Regulation[J]. Journal of Computer Research and Development, 2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800
    [5]Chen Yufei, Shen Chao, Wang Qian, Li Qi, Wang Cong, Ji Shouling, Li Kang, Guan Xiaohong. Security and Privacy Risks in Artificial Intelligence Systems[J]. Journal of Computer Research and Development, 2019, 56(10): 2135-2150. DOI: 10.7544/issn1000-1239.2019.20190415
    [6]Wang Liang, Wang Weiping, Meng Dan. Privacy Preserving Data Publishing via Weighted Bayesian Networks[J]. Journal of Computer Research and Development, 2016, 53(10): 2343-2353. DOI: 10.7544/issn1000-1239.2016.20160465
    [7]Cao Zhenfu, Dong Xiaolei, Zhou Jun, Shen Jiachen, Ning Jianting, Gong Junqing. Research Advances on Big Data Security and Privacy Preserving[J]. Journal of Computer Research and Development, 2016, 53(10): 2137-2151. DOI: 10.7544/issn1000-1239.2016.20160684
    [8]Guo Caihua, Wang Bin, Zhu Huaijie, Yang Xiaochun. Incremental Dynamic Social Network Anonymity Technology[J]. Journal of Computer Research and Development, 2016, 53(6): 1352-1364. DOI: 10.7544/issn1000-1239.2016.20140695
    [9]Meng Xiaofeng, Zhang Xiaojian. Big Data Privacy Management[J]. Journal of Computer Research and Development, 2015, 52(2): 265-281. DOI: 10.7544/issn1000-1239.2015.20140073
    [10]Hou Qinghua, Wu Yongwei, Zheng Weimin, and Yang Guangwen. A Method on Protection of User Data Privacy in Cloud Storage Platform[J]. Journal of Computer Research and Development, 2011, 48(7): 1146-1154.
  • Cited by

    Periodical cited type(5)

    1. 李宁,徐丽娜,方国勇,马英晋. 结合容错编码的量子化学分布式计算. 化学学报. 2024(02): 138-145 .
    2. 陈雨梁,林夕,李建华. 基于编码计算的分布式人工智能系统安全防护研究. 网络空间安全. 2024(01): 108-112 .
    3. 郭中孚,季新生,游伟,赵宇,巩小锐. 基于喷泉码的隐私保护编码计算卸载方法. 信息工程大学学报. 2024(05): 559-566 .
    4. 杨在航,李跃鹏,曾德泽. 基于编码计算的边端融合计算发展趋势. 自动化博览. 2023(02): 45-49 .
    5. 史洪玮,洪道诚,施连敏,杨迎尧. 异构编码联邦学习. 华东师范大学学报(自然科学版). 2023(05): 110-121 .

    Other cited types(5)

Catalog

    Article views (1032) PDF downloads (750) Cited by(10)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return