R. Vannithamby and S. Talwar, Towards 5G: Applications, Requirements and Candidate Technologies, 2017.
DOI : 10.1002/9781118979846

D. Soldani, 5G beyond radio access, Mondo Digitale, issue.2, 2018.

K. Samdanis, X. Costa-perez, and V. Sciancalepore, From network sharing to multi-tenancy: The 5G network slice broker, IEEE Communications Magazine, vol.54, issue.7, pp.32-39
DOI : 10.1109/MCOM.2016.7514161

URL : http://arxiv.org/pdf/1605.01201

V. Jeyakumar, EyeQ: Practical network performance isolation for the multi-tenant cloud, HotCloud, 2012.

B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, Private information retrieval, Proc. 36th Annual IEEE Symp, pp.41-50, 1995.

J. Katz and L. Trevisan, On the efficiency of local decoding procedures for error-correcting codes, Proceedings of the thirty-second annual ACM symposium on Theory of computing , STOC '00, pp.80-86, 2000.
DOI : 10.1145/335305.335315

URL : http://www.cs.columbia.edu/~homin/dixon/kattre00.ps

S. Yekhanin, Private information retrieval, Communications of the ACM, vol.53, issue.4, pp.68-73, 2010.
DOI : 10.1145/1721654.1721674

C. E. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948.
DOI : 10.1002/j.1538-7305.1948.tb01338.x

, Communication theory of secrecy systems, Bell Labs Technical Journal, vol.28, issue.4, pp.656-715, 1949.

W. K. Harrison, J. Almeida, M. R. Bloch, S. W. Mclaughlin, and J. Barros, Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security, IEEE Signal Processing Magazine, vol.30, issue.5, pp.41-50, 2013.
DOI : 10.1109/MSP.2013.2265141

S. Yekhanin, Locally Decodable Codes, Foundations and Trends?? in Theoretical Computer Science, vol.6, issue.3, pp.139-255, 2012.
DOI : 10.1561/0400000030

S. Kopparty, S. Saraf, and S. Yekhanin, High-rate codes with sublineartime decoding, Journal of the ACM (JACM), vol.61, issue.5, pp.28-2014

S. Kopparty, Theory of Computing, vol.11, issue.1, pp.149-182, 2015.
DOI : 10.4086/toc.2015.v011a005

D. Augot, F. Levy-dit-vehel, and A. Shikfa, A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers, Int. Conf. on Crypt. and Network Security, pp.222-239, 2014.
DOI : 10.1007/978-3-319-12280-9_15

URL : https://hal.archives-ouvertes.fr/hal-01094807

R. Freij-hollanti, O. W. Gnilke, C. Hollanti, and D. A. Karpuk, Private Information Retrieval from Coded Databases with Colluding Servers, SIAM Journal on Applied Algebra and Geometry, vol.1, issue.1, pp.647-664, 2017.
DOI : 10.1137/16M1102562

K. Banawan and S. Ulukus, The Capacity of Private Information Retrieval From Coded Databases, IEEE Transactions on Information Theory, vol.64, issue.3, pp.1945-1956, 2018.
DOI : 10.1109/TIT.2018.2791994

A. Fazeli, A. Vardy, and E. Yaakobi, Codes for distributed PIR with low storage overhead, 2015 IEEE International Symposium on Information Theory (ISIT), pp.2852-2856, 2015.
DOI : 10.1109/ISIT.2015.7282977

S. Kumar, E. Rosnes, and A. G. Amat, Private information retrieval in distributed storage systems using an arbitrary linear code, 2017 IEEE International Symposium on Information Theory (ISIT), pp.2017-1421
DOI : 10.1109/ISIT.2017.8006763

S. R. Blackburn and T. Etzion, PIR array codes with optimal PIR rates, 2017 IEEE International Symposium on Information Theory (ISIT), pp.2658-2662, 2017.
DOI : 10.1109/ISIT.2017.8007011

S. Madhu, Locality in coding theory Available: https, IEEE Information Theory Society, Microsoft Research, 2015.

D. Augot, F. L. Vehel, and C. M. Ngô, Information sets of Multiplicity codes, 2015 IEEE International Symposium on Information Theory (ISIT), pp.2401-2405, 2015.
DOI : 10.1109/ISIT.2015.7282886

URL : https://hal.archives-ouvertes.fr/hal-01188935

N. Coxon, Fast systematic encoding of multiplicity codes, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01512372

G. Lachaud, Projective reed-muller codes, International Colloquium on Coding Theory and Applications, pp.125-129, 1986.
DOI : 10.1007/3-540-19368-5_13

A. Alloum, S. Lin, and T. Y. , On locality of Generalized Reed-Muller codes over the broadcast erasure channel, 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), pp.1-4, 2016.
DOI : 10.1109/BMSB.2016.7521914

S. G. Krantz and H. R. Parks, The implicit function theorem: history, theory, and applications, 2012.

N. Batir, Inequalities for the gamma function, Archiv der Mathematik, vol.91, issue.6, pp.554-563, 2008.
DOI : 10.1007/s00013-008-2856-9

F. Qi, Bounds for the Ratio of Two Gamma Functions, Journal of Inequalities and Applications, vol.11, issue.3, Art. 1, 2010.
DOI : 10.1016/j.aam.2009.03.003