{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:31:52Z","timestamp":1762507912580,"version":"3.41.0"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T00:00:00Z","timestamp":1573171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2019,11,8]]},"abstract":"<jats:p>We introduced the concept of a digital fountain as a scalable approach to reliable multicast, realized with fast and practical erasure codes, in a paper published in ACM SIGCOMM '98. This invited editorial, on the occasion of the 50th anniversary of the SIG, reflects on the trajectory of work leading up to our approach, and the numerous developments in the field in the subsequent 21 years. We discuss advances in rateless codes, efficient implementations, applications of digital fountains in distributed storage systems, and connections to invertible Bloom lookup tables.<\/jats:p>","DOI":"10.1145\/3371934.3371960","type":"journal-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T20:27:58Z","timestamp":1573244878000},"page":"82-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A digital fountain retrospective"],"prefix":"10.1145","volume":"49","author":[{"given":"John W.","family":"Byers","sequence":"first","affiliation":[{"name":"Boston University"}]},{"given":"Michael","family":"Luby","sequence":"additional","affiliation":[{"name":"ICSI"}]},{"given":"Michael","family":"Mitzenmacher","sequence":"additional","affiliation":[{"name":"Harvard University"}]}],"member":"320","published-online":{"date-parts":[[2019,11,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Priority Encoding Transmission. IEEE Symposium on Foundations of Computer Science","author":"Albanese A.","year":"1994","unstructured":"A. Albanese , J. Bl\u00f6mer , J. Edmonds , M. Luby , M. Sudan . Priority Encoding Transmission. IEEE Symposium on Foundations of Computer Science , 1994 . A. Albanese, J. Bl\u00f6mer, J. Edmonds, M. Luby, M. Sudan. Priority Encoding Transmission. IEEE Symposium on Foundations of Computer Science, 1994."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.556670"},{"key":"e_1_2_1_3_1","first-page":"1313","article-title":"Exploiting Rateless Codes in Cloud Storage Systems","author":"Anglano C.","year":"2014","unstructured":"C. Anglano , R. Gaeta , M. Grangetto . Exploiting Rateless Codes in Cloud Storage Systems . IEEE Transactions on Parallel and Distributed Systems , pp. 1313 -- 1322 , Vol. 26, No. 5, 2014 . C. Anglano, R. Gaeta, M. Grangetto. Exploiting Rateless Codes in Cloud Storage Systems. IEEE Transactions on Parallel and Distributed Systems, pp. 1313--1322, Vol. 26, No. 5, 2014.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_2_1_4_1","first-page":"47","volume-title":"Rost Informed content delivery across adaptive overlay networks ACM SIGCOMM","author":"Byers J. W.","year":"2002","unstructured":"J. W. Byers , J. Considine , M. Mitzenmacher , S. Rost Informed content delivery across adaptive overlay networks ACM SIGCOMM , pp. 47 -- 60 , 2002 . J. W. Byers, J. Considine, M. Mitzenmacher, S. Rost Informed content delivery across adaptive overlay networks ACM SIGCOMM, pp. 47--60, 2002."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749293"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285258"},{"issue":"8","key":"e_1_2_1_7_1","first-page":"1528","article-title":"A Digital Fountain Approach to Asynchronous Reliable Multicast. IEEE J. on Selected Areas in Communications","volume":"20","author":"Byers J.W.","year":"2002","unstructured":"J.W. Byers , M. Luby , M. Mitzenmacher . A Digital Fountain Approach to Asynchronous Reliable Multicast. IEEE J. on Selected Areas in Communications , Special Issue on Network Support for Multicast Communication , Vol. 20 , No. 8 , October 2002 , pp. 1528 -- 1540 . J.W. Byers, M. Luby, M. Mitzenmacher. A Digital Fountain Approach to Asynchronous Reliable Multicast. IEEE J. on Selected Areas in Communications, Special Issue on Network Support for Multicast Communication, Vol. 20, No. 8, October 2002, pp. 1528 -- 1540.","journal-title":"Special Issue on Network Support for Multicast Communication"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2404842"},{"volume-title":"Distributed Fountain Codes for Networked Storage. 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.","author":"Dimakis A.","key":"e_1_2_1_9_1","unstructured":"A. Dimakis , V. Prabhakaran , K. Ramchandran . Distributed Fountain Codes for Networked Storage. 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings. A. Dimakis, V. Prabhakaran, K. Ramchandran. Distributed Fountain Codes for Networked Storage. 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings."},{"issue":"2","key":"e_1_2_1_10_1","article-title":"Straggler identification in round-trip data streams via Newton's identities and invertible Bloom filters","volume":"23","author":"Eppstein D.","year":"2010","unstructured":"D. Eppstein , M. Goodrich . Straggler identification in round-trip data streams via Newton's identities and invertible Bloom filters . IEEE Transactions on Knowledge and Data Engineering, pp 297--306 , Vol. 23 , No. 2 , 2010 . D. Eppstein, M. Goodrich. Straggler identification in round-trip data streams via Newton's identities and invertible Bloom filters. IEEE Transactions on Knowledge and Data Engineering, pp 297--306, Vol. 23, No. 2, 2010.","journal-title":"IEEE Transactions on Knowledge and Data Engineering, pp 297--306"},{"key":"e_1_2_1_11_1","first-page":"218","volume-title":"ACM SIGCOMM","author":"Eppstein D.","year":"2011","unstructured":"D. Eppstein , M. Goodrich , F, Uyeda, G. Varghese . What's the difference? : efficient set reconciliation without prior context . ACM SIGCOMM , pp. 218 -- 229 , 2011 . D. Eppstein, M. Goodrich, F, Uyeda, G. Varghese. What's the difference?: efficient set reconciliation without prior context. ACM SIGCOMM, pp. 218--229, 2011."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498511"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120248"},{"volume-title":"Parallel peeling algorithms. ACM Transactions on Parallel Computing (TOPC)","author":"Jiang J.","key":"e_1_2_1_14_1","unstructured":"J. Jiang , M. Mitzenmacher , J. Thaler , Parallel peeling algorithms. ACM Transactions on Parallel Computing (TOPC) , Vol. 3 , No. 1, 2016. J. Jiang, M. Mitzenmacher, J. Thaler, Parallel peeling algorithms. ACM Transactions on Parallel Computing (TOPC), Vol. 3, No. 1, 2016."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159942"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1734877.1734892"},{"key":"e_1_2_1_17_1","volume-title":"Robust and Efficient Video Broadcast Technology. ACM Multimedia","author":"Lamparter B.","year":"1995","unstructured":"B. Lamparter , A. Albanese , M. Kalfane , M. Luby . PET - Priority Encoding Transmission : A New , Robust and Efficient Video Broadcast Technology. ACM Multimedia , San Francisco, CA , November 1995 . B. Lamparter, A. Albanese, M. Kalfane, M. Luby. PET - Priority Encoding Transmission: A New, Robust and Efficient Video Broadcast Technology. ACM Multimedia, San Francisco, CA, November 1995."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541258"},{"key":"e_1_2_1_19_1","first-page":"271","volume-title":"LT Codes. IEEE Symposium on Foundations of Computer Science","author":"Luby M.","year":"2002","unstructured":"M. Luby . LT Codes. IEEE Symposium on Foundations of Computer Science , November 16-19 2002 , pp. 271 -- 282 . M. Luby. LT Codes. IEEE Symposium on Foundations of Computer Science, November 16-19 2002, pp. 271--282."},{"key":"e_1_2_1_20_1","article-title":"Repair rate lower bounds for distributed storage. Submitted to","author":"Luby M.","year":"2019","unstructured":"M. Luby . Repair rate lower bounds for distributed storage. Submitted to IEEE Transactions on Information Theory , July 2019 . M. Luby. Repair rate lower bounds for distributed storage. Submitted to IEEE Transactions on Information Theory, July 2019.","journal-title":"IEEE Transactions on Information Theory"},{"key":"e_1_2_1_21_1","volume-title":"Practical Loss-Resilient Codes. ACM Symposium on Theory of Computing","author":"Luby M.","year":"1997","unstructured":"M. Luby , M. Mitzenmacher , A. Shokrollahi , D. Spielman , V. Stemann . Practical Loss-Resilient Codes. ACM Symposium on Theory of Computing , 1997 . M. Luby, M. Mitzenmacher, A. Shokrollahi, D. Spielman, V. Stemann. Practical Loss-Resilient Codes. ACM Symposium on Theory of Computing, 1997."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.910575"},{"key":"e_1_2_1_23_1","volume-title":"ACM Transactions on Storage","volume":"15","author":"Luby M.","year":"2019","unstructured":"M. Luby , R. Padovani , T. Richardson , L. Minder , P. Aggarwal . Liquid cloud storage. arXiv:1705.07983 [cs.DC] . ACM Transactions on Storage , Vol. 15 , Issue 1, Article 2, April 2019 . M. Luby, R. Padovani, T. Richardson, L. Minder, P. Aggarwal. Liquid cloud storage. arXiv:1705.07983 [cs.DC]. ACM Transactions on Storage, Vol. 15, Issue 1, Article 2, April 2019."},{"key":"e_1_2_1_24_1","volume-title":"Raptor Codes for Reliable Download Delivery in Wireless Broadcast Systems. IEEE Consumer Communications and Networking Conference","author":"Luby M.","year":"2006","unstructured":"M. Luby , M. Watson , T. Gasiba , T. Stockhammer , W. Xu . Raptor Codes for Reliable Download Delivery in Wireless Broadcast Systems. IEEE Consumer Communications and Networking Conference , Las Vegas, Nevada, USA , January 2006 M. Luby, M. Watson, T. Gasiba, T. Stockhammer, W. Xu. Raptor Codes for Reliable Download Delivery in Wireless Broadcast Systems. IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, USA, January 2006"},{"key":"e_1_2_1_25_1","volume-title":"First International Workshop on Convergent Technology","volume":"5","author":"Lun D.","year":"2005","unstructured":"D. Lun , D. Shah , M. M\u00e9dard , R. Koetter . Efficient operation of wireless packet networks using network coding . First International Workshop on Convergent Technology , Vol. 5 , 2005 . D. Lun, D. Shah, M. M\u00e9dard, R. Koetter. Efficient operation of wireless packet networks using network coding. First International Workshop on Convergent Technology, Vol. 5, 2005."},{"key":"e_1_2_1_26_1","volume-title":"Information Theory, Inference, and Learning Algorithms","author":"MacKay D.","year":"2003","unstructured":"D. MacKay . Information Theory, Inference, and Learning Algorithms . Chapter 50: Digital Fountain codes. Cambridge University Press , September , 2003 . D. MacKay. Information Theory, Inference, and Learning Algorithms. Chapter 50: Digital Fountain codes. Cambridge University Press, September, 2003."},{"key":"e_1_2_1_27_1","volume-title":"Technical report","author":"Maymounkov P.","year":"2002","unstructured":"P. Maymounkov . Online codes. Technical report , New York University , 2002 . P. Maymounkov. Online codes. Technical report, New York University, 2002."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2453267"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6284236"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2004.1405313"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/263105.263181"},{"key":"e_1_2_1_32_1","volume-title":"ACM SIGCOMM","author":"Ozisik A.","year":"2019","unstructured":"A. Ozisik , B. Levine , G. Bissias , G. Andresen , D. Tapp , S. Katkuri . Graphene : Efficient Interactive Set Reconciliation Applied to Blockchain Propagation . ACM SIGCOMM , 2019 . A. Ozisik, B. Levine, G. Bissias, G. Andresen, D. Tapp, S. Katkuri. Graphene: Efficient Interactive Set Reconciliation Applied to Blockchain Propagation. ACM SIGCOMM, 2019."},{"key":"e_1_2_1_33_1","first-page":"49","volume-title":"ACM SIGCOMM 2012","author":"Perry J.","year":"2012","unstructured":"J. Perry , P. Iannucci , K. Fleming , H. Balakrishnan , D. Shah . ACM SIGCOMM 2012 , pp. 49 -- 60 , 2012 . J. Perry, P. Iannucci, K. Fleming, H. Balakrishnan, D. Shah. ACM SIGCOMM 2012, pp. 49--60, 2012."},{"key":"e_1_2_1_35_1","first-page":"335","volume-title":"load balancing, and fault tolerance. Journal of the ACM (JACM), 36(2)","author":"Rabin M.","year":"1989","unstructured":"M. Rabin . Efficient dispersal of information for security , load balancing, and fault tolerance. Journal of the ACM (JACM), 36(2) , 1989 , pp. 335 -- 348 . M. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM (JACM), 36(2), 1989, pp. 335--348."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_37_1","first-page":"3","volume":"6","author":"Shokrollahi A.","year":"2011","unstructured":"A. Shokrollahi , M. Luby . Raptor Codes . Foundations and Trends in Communications and Information Theory , 2011 , Vol. 6 : No 3 - 4 , pp 213--322. A. Shokrollahi, M. Luby. Raptor Codes. Foundations and Trends in Communications and Information Theory, 2011, Vol. 6: No 3-4, pp 213--322.","journal-title":"Foundations and Trends in Communications and Information Theory"},{"issue":"5","key":"e_1_2_1_38_1","first-page":"94","article-title":"Application Layer FEC","volume":"45","author":"Stockhammer T.","year":"2008","unstructured":"T. Stockhammer , M. Luby , M. Watson . Application Layer FEC in IPTV Services. IEEE Communications Magazine , Vol. 45 , No. 5 , May 2008 , p. 94 -- 101 T. Stockhammer, M. Luby, M. Watson. Application Layer FEC in IPTV Services. IEEE Communications Magazine, Vol. 45, No. 5, May 2008, p. 94--101","journal-title":"IPTV Services. IEEE Communications Magazine"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595268"},{"key":"e_1_2_1_40_1","article-title":"How the Magic of IBLTs Could Boost Bitcoin's Decentralization","author":"Widrum A.","year":"2015","unstructured":"A. Widrum . How the Magic of IBLTs Could Boost Bitcoin's Decentralization . Bitcoin Magazine , Nov. 2015 . A. Widrum. How the Magic of IBLTs Could Boost Bitcoin's Decentralization. Bitcoin Magazine, Nov. 2015.","journal-title":"Bitcoin Magazine"},{"key":"e_1_2_1_41_1","volume-title":"Delivery, Synchronization, and Error Protection, (A\/331)","author":"Advanced Television and Systems Committee","year":"2019","unstructured":"Advanced Television and Systems Committee . ATSC Standard: Signaling , Delivery, Synchronization, and Error Protection, (A\/331) , June 2019 . Advanced Television and Systems Committee. ATSC Standard: Signaling, Delivery, Synchronization, and Error Protection, (A\/331), June 2019."},{"key":"e_1_2_1_42_1","article-title":"The Use of Forward Error Correction (FEC) in Reliable Multicast. M. Luby, L. Vicisano, J. Gemmell, L. Rizzo, M. Handley","author":"Internet Engineering Task Force (IETF) RFC3453","year":"2002","unstructured":"Internet Engineering Task Force (IETF) RFC3453 . The Use of Forward Error Correction (FEC) in Reliable Multicast. M. Luby, L. Vicisano, J. Gemmell, L. Rizzo, M. Handley , J. Crowcroft. December 2002 . Internet Engineering Task Force (IETF) RFC3453. The Use of Forward Error Correction (FEC) in Reliable Multicast. M. Luby, L. Vicisano, J. Gemmell, L. Rizzo, M. Handley, J. Crowcroft. December 2002.","journal-title":"J. Crowcroft."},{"key":"e_1_2_1_43_1","volume-title":"V. K Goyal.","author":"IETF","year":"2004","unstructured":"IETF RFC3738. Wave and equation based rate control building block. M. Luby , V. K Goyal. April 2004 . IETF RFC3738. Wave and equation based rate control building block. M. Luby, V. K Goyal. April 2004."},{"key":"e_1_2_1_44_1","volume-title":"M. Luby, L. Vicisano.","author":"IETF","year":"2007","unstructured":"IETF RFC5052. Forward Error Correction (FEC) Building Block. M. Watson , M. Luby, L. Vicisano. August 2007 . IETF RFC5052. Forward Error Correction (FEC) Building Block. M. Watson, M. Luby, L. Vicisano. August 2007."},{"key":"e_1_2_1_45_1","volume-title":"A. Shokrollahi, M. Watson, T. Stockhammer.","author":"IETF","year":"2007","unstructured":"IETF RFC5053. Raptor Forward Error Correction Scheme for Object Delivery. M. Luby , A. Shokrollahi, M. Watson, T. Stockhammer. October 2007 . IETF RFC5053. Raptor Forward Error Correction Scheme for Object Delivery. M. Luby, A. Shokrollahi, M. Watson, T. Stockhammer. October 2007."},{"key":"e_1_2_1_46_1","article-title":"Asynchronous Layered Coding (ALC) Protocol Instantiation. M. Luby, J. Gemmell, L. Vicisano, L. Rizzo","author":"IETF","year":"2010","unstructured":"IETF RFC5775 . Asynchronous Layered Coding (ALC) Protocol Instantiation. M. Luby, J. Gemmell, L. Vicisano, L. Rizzo , J. Crowcroft. April 2010 . IETF RFC5775. Asynchronous Layered Coding (ALC) Protocol Instantiation. M. Luby, J. Gemmell, L. Vicisano, L. Rizzo, J. Crowcroft. April 2010.","journal-title":"J. Crowcroft."},{"key":"e_1_2_1_47_1","article-title":"Layered Coding Transport (LCT) Building Block. M. Luby, J. Gemmell, L. Vicisano, L. Rizzo, M. Handley","author":"IETF","year":"2009","unstructured":"IETF RFC5651 . Layered Coding Transport (LCT) Building Block. M. Luby, J. Gemmell, L. Vicisano, L. Rizzo, M. Handley , J. Crowcroft. October 2009 . IETF RFC5651. Layered Coding Transport (LCT) Building Block. M. Luby, J. Gemmell, L. Vicisano, L. Rizzo, M. Handley, J. Crowcroft. October 2009.","journal-title":"J. Crowcroft."},{"key":"e_1_2_1_48_1","volume-title":"A. Shokrollahi, M. Watson, T. Stockhammer, L. Minder.","author":"IETF","year":"2011","unstructured":"IETF RFC6330. RaptorQ Forward Error Correction Scheme for Object Delivery. M. Luby , A. Shokrollahi, M. Watson, T. Stockhammer, L. Minder. August 2011 . IETF RFC6330. RaptorQ Forward Error Correction Scheme for Object Delivery. M. Luby, A. Shokrollahi, M. Watson, T. Stockhammer, L. Minder. August 2011."},{"key":"e_1_2_1_49_1","volume-title":"T. Stockhammer, M. Luby.","author":"IETF","year":"2012","unstructured":"IETF RFC6681. Raptor Forward Error Correction Schemes for FECFRAME. M. Watson , T. Stockhammer, M. Luby. August 2012 . IETF RFC6681. Raptor Forward Error Correction Schemes for FECFRAME. M. Watson, T. Stockhammer, M. Luby. August 2012."},{"key":"e_1_2_1_50_1","volume-title":"M. Luby, R. Lehtonen, V. Roca, R. Walsh.","author":"IETF","year":"2012","unstructured":"IETF RFC6726. FLUTE - File Delivery over Unidirectional Transport. T. Paila , M. Luby, R. Lehtonen, V. Roca, R. Walsh. November 2012 . IETF RFC6726. FLUTE - File Delivery over Unidirectional Transport. T. Paila, M. Luby, R. Lehtonen, V. Roca, R. Walsh. November 2012."},{"key":"e_1_2_1_51_1","volume-title":"Ver. 6.0.0","author":"Multicast Multimedia Broadcast","year":"2005","unstructured":"Multimedia Broadcast Multicast Service (3GPP TS 26.346). 3rd Generation Partnership Program technical specification , Ver. 6.0.0 , April 2005 . Multimedia Broadcast Multicast Service (3GPP TS 26.346). 3rd Generation Partnership Program technical specification, Ver. 6.0.0, April 2005."},{"key":"e_1_2_1_52_1","unstructured":"Codornices Project International Computer Science Institute. www.codornices.info.  Codornices Project International Computer Science Institute. www.codornices.info."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371934.3371960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371934.3371960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:19Z","timestamp":1750203859000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371934.3371960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,8]]},"references-count":51,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,11,8]]}},"alternative-id":["10.1145\/3371934.3371960"],"URL":"https:\/\/doi.org\/10.1145\/3371934.3371960","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2019,11,8]]},"assertion":[{"value":"2019-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}