scispace - formally typeset
G

Gaurav Kumar Agarwal

Researcher at University of California, Los Angeles

Publications -  30
Citations -  293

Gaurav Kumar Agarwal is an academic researcher from University of California, Los Angeles. The author has contributed to research in topics: Unicast & Linear network coding. The author has an hindex of 7, co-authored 30 publications receiving 256 citations. Previous affiliations of Gaurav Kumar Agarwal include Indian Institute of Science & Freescale Semiconductor.

Papers
More filters
Proceedings ArticleDOI

Codes with hierarchical locality

TL;DR: This paper first considers codes with two levels of hierarchical locality, derives an upper bound on the minimum distance, and provides optimal code constructions of low field-size under certain parameter sets, and generalizes both the bound and the constructions to hierarchical locality of arbitrary levels.
Proceedings ArticleDOI

A high-rate MSR code with polynomial sub-packetization level

TL;DR: A high-rate (n, k, d = n - 1)-MSR code with a sub-packetization level that is polynomial in the dimension k of the code, which allows help-by-transfer repair, i.
Posted Content

A High-Rate MSR Code With Polynomial Sub-Packetization Level

TL;DR: In this paper, a high-rate MSR code with a subpacketization level that is polynomial in the dimension of the code is presented, which is the first such code construction for vector MDS codes that repair systematic nodes optimally.
Proceedings ArticleDOI

An alternate construction of an access-optimal regenerating code with optimal sub-packetization level

TL;DR: An alternate construction under the same setup, of an access-optimal code repairing systematic nodes, that is inspired by the zigzag code construction and that achieves a sub-packetization level of rk/r.
Book ChapterDOI

Secure Network Coding for Multiple Unicast: On the Case of Single Source

TL;DR: This paper considers multiple unicast wireline noiseless networks where a single source wishes to transmit independent messages to a set of legitimate destinations and it is shown that the secure capacity result for the two destinations case is not reversible.