Zum Hauptinhalt springen

Showing 1–39 of 39 results for author: Dolecek, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.00192  [pdf, other

    cs.IT

    Block-MDS QC-LDPC Codes for Information Reconciliation in Key Distribution

    Authors: Lev Tauz, Debarnab Mitra, Jayanth Shreekumar, Murat Can Sarihan, Chee Wei Wong, Lara Dolecek

    Abstract: Quantum key distribution (QKD) is a popular protocol that provides information theoretically secure keys to multiple parties. Two important post-processing steps of QKD are 1) the information reconciliation (IR) step, where parties reconcile mismatches in generated keys through classical communication, and 2) the privacy amplification (PA) step, where parties distill their common key into a new se… ▽ More

    Submitted 29 February, 2024; originally announced March 2024.

    Comments: 7 pages, 1 figure, submitted to the International Symposium on Information Theory (ISIT) 2024

  2. arXiv:2305.07983  [pdf, other

    cs.IT cs.CR

    Fully Private Grouped Matrix Multiplication with Colluding Workers

    Authors: Lev Tauz, Lara Dolecek

    Abstract: In this paper, we present a novel variation of the coded matrix multiplication problem which we refer to as fully private grouped matrix multiplication (FPGMM). In FPGMM, a master wants to compute a group of matrix products between two matrix libraries that can be accessed by all workers while ensuring that any number of prescribed colluding workers learn nothing about which matrix products the ma… ▽ More

    Submitted 13 May, 2023; originally announced May 2023.

    Comments: 7 pages, 3 figures, submitted to the International Symposium on Information Theory (ISIT) 2023

  3. arXiv:2305.00956  [pdf, other

    cs.IT

    Non-Binary LDPC Code Design for Energy-Time Entanglement Quantum Key Distribution

    Authors: Debarnab Mitra, Lev Tauz, Murat Can Sarihan, Chee Wei Wong, Lara Dolecek

    Abstract: In energy-time entanglement Quantum Key Distribution (QKD), two users extract a shared secret key from the arrival times (discretized as symbols) of entangled photon pairs. In prior work, Zhou et al. proposed a multi-level coding (MLC) scheme that splits the observed symbols into bit layers and utilizes binary Low-Density Parity-Check (LDPC) codes for reconciliation of the symbols. While binary LD… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: 5 pages, 4 figures, submitted to International Symposium on Topics in Coding

  4. arXiv:2303.01973  [pdf, other

    cs.IT quant-ph

    QKD Based on Time-Entangled Photons and its Key-Rate Promise

    Authors: Lara Dolecek, Emina Soljanin

    Abstract: For secure practical systems, quantum key distribution (QKD) must provide high key rates over long distances. Time-entanglement-based QKD promises to increase the secret key rate and distribution distances compared to other QKD implementations. This article describes the major steps in QKD protocols, focusing on the nascent QKD technology based on high-dimensional time-bin entangled photons. We ov… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  5. arXiv:2301.08295  [pdf, other

    cs.IT cs.CR

    Polar Coded Merkle Tree: Mitigating Data Availability Attacks in Blockchain Systems Using Informed Polar Code Design

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: Data availability (DA) attack is a well-known problem in certain blockchains where users accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2DRS) codes with Merkle trees to mitigate DA attacks. These codes perform well across various metrics such as DA detection probability and communication cost. However, these codes are difficult to apply to bl… ▽ More

    Submitted 19 January, 2023; originally announced January 2023.

    Comments: 36 pages, 10 figures, 2 tables, submitted to IEEE Journal on Selected Areas in Information Theory

  6. arXiv:2203.02052  [pdf, ps, other

    cs.IT math.CO

    A Unified Spatially Coupled Code Design: Threshold, Cycles, and Locality

    Authors: Homa Esfahanizadeh, Eshed Ram, Yuval Cassuto, Lara Dolecek

    Abstract: Spatially-Coupled (SC)-LDPC codes are known to have outstanding error-correction performance and low decoding latency. Whereas previous works on LDPC and SC-LDPC codes mostly take either an asymptotic or a finite-length design approach, in this paper we present a unified framework for jointly optimizing the codes' thresholds and cycle counts to address both regimes. The framework is based on effic… ▽ More

    Submitted 31 August, 2022; v1 submitted 3 March, 2022; originally announced March 2022.

    Comments: Submitted to IEEE Transactions on Magnetics

  7. arXiv:2201.07287  [pdf, other

    cs.IT cs.CR

    Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: Light nodes in blockchain systems are known to be vulnerable to data availability (DA) attacks where they accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2D-RS) codes with Merkle Trees to mitigate DA attacks. While these codes have demonstrated improved performance across a variety of metrics such as DA detection probability, they are difficul… ▽ More

    Submitted 16 May, 2022; v1 submitted 18 January, 2022; originally announced January 2022.

    Comments: 9 pages, 4 figures, 2 tables, To appear in IEEE International Symposium on Information Theory (ISIT) 2022

  8. arXiv:2109.08978  [pdf, other

    cs.IT

    Breaking the Computational Bottleneck: Design of Near-Optimal High-Memory Spatially-Coupled Codes

    Authors: Siyi Yang, Ahmed Hareedy, Robert Calderbank, Lara Dolecek

    Abstract: Spatially-coupled (SC) codes, known for their threshold saturation phenomenon and low-latency windowed decoding algorithms, are ideal for streaming applications and data storage systems. SC codes are constructed by partitioning an underlying block code, followed by rearranging and concatenating the partitioned components in a convolutional manner. The number of partitioned components determines th… ▽ More

    Submitted 18 September, 2021; originally announced September 2021.

    Comments: 26 pages, 30 figures, 2 tables, the manuscript has been submitted to IEEE Transactions on Information Theory. arXiv admin note: substantial text overlap with arXiv:2101.09962

  9. Overcoming Data Availability Attacks in Blockchain Systems: Short Code-Length LDPC Code Design for Coded Merkle Tree

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: Light nodes are clients in blockchain systems that only store a small portion of the blockchain ledger. In certain blockchains, light nodes are vulnerable to a data availability (DA) attack where a malicious node makes the light nodes accept an invalid block by hiding the invalid portion of the block from the nodes in the system. Recently, a technique based on LDPC codes called Coded Merkle Tree w… ▽ More

    Submitted 27 August, 2022; v1 submitted 30 August, 2021; originally announced August 2021.

    Comments: 18 pages, 7 figures, 3 tables, accepted at IEEE Transactions on Communications (TCOM) 2022. This version reflects comments from reviewers at TCOM

  10. arXiv:2105.06162  [pdf, other

    cs.IT

    Variable Coded Batch Matrix Multiplication

    Authors: Lev Tauz, Lara Dolecek

    Abstract: A majority of coded matrix-matrix computation literature has broadly focused in two directions: matrix partitioning for computing a single computation task and batch processing of multiple distinct computation tasks. While these works provide codes with good straggler resilience and fast decoding for their problem spaces, these codes would not be able to take advantage of the natural redundancy of… ▽ More

    Submitted 31 December, 2021; v1 submitted 13 May, 2021; originally announced May 2021.

    Comments: 35 pages, 8 figures, a part of this manuscript was published at IEEE Global Communications Conference (GLOBECOM) 2021

  11. arXiv:2105.06004  [pdf, other

    cs.IT cs.CR

    Communication-Efficient LDPC Code Design for Data Availability Oracle in Side Blockchains

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: A popular method of improving the throughput of blockchain systems is by running smaller side blockchains that push the hashes of their blocks onto a trusted blockchain. Side blockchains are vulnerable to stalling attacks where a side blockchain node pushes the hash of a block to the trusted blockchain but makes the block unavailable to other side blockchain nodes. Recently, Sheng et al. proposed… ▽ More

    Submitted 25 August, 2021; v1 submitted 12 May, 2021; originally announced May 2021.

    Comments: 7 pages, 2 figures, 2 tables, To appear in Information Theory Workshop (ITW) 2021

  12. arXiv:2103.11046  [pdf, ps, other

    cs.IT

    Hierarchical Hybrid Error Correction for Time-Sensitive Devices at the Edge

    Authors: Siyi Yang, Ahmed Hareedy, Robert Calderbank, Lara Dolecek

    Abstract: Computational storage, known as a solution to significantly reduce the latency by moving data-processing down to the data storage, has received wide attention because of its potential to accelerate data-driven devices at the edge. To meet the insatiable appetite for complicated functionalities tailored for intelligent devices such as autonomous vehicles, properties including heterogeneity, scalabi… ▽ More

    Submitted 19 March, 2021; originally announced March 2021.

    Comments: 29 pages (single column), 0 figures, to be submitted to IEEE Transactions on Communications

  13. arXiv:2101.09962  [pdf, other

    cs.IT

    GRADE-AO: Towards Near-Optimal Spatially-Coupled Codes With High Memories

    Authors: Siyi Yang, Ahmed Hareedy, Shyam Venkatasubramanian, Robert Calderbank, Lara Dolecek

    Abstract: Spatially-coupled (SC) codes, known for their threshold saturation phenomenon and low-latency windowed decoding algorithms, are ideal for streaming applications. They also find application in various data storage systems because of their excellent performance. SC codes are constructed by partitioning an underlying block code, followed by rearranging and concatenating the partitioned components in… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

    Comments: 8 pages, 10 figures, 1 table, the shortened version has been submitted to ISIT 2021

  14. arXiv:2010.07363  [pdf, other

    cs.IT cs.CR

    Concentrated Stopping Set Design for Coded Merkle Tree: Improving Security Against Data Availability Attacks in Blockchain Systems

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: In certain blockchain systems, light nodes are clients that download only a small portion of the block. Light nodes are vulnerable to data availability (DA) attacks where a malicious node hides an invalid portion of the block from the light nodes. Recently, a technique based on erasure codes called Coded Merkle Tree (CMT) was proposed by Yu et al. that enables light nodes to detect a DA attack wit… ▽ More

    Submitted 23 January, 2021; v1 submitted 14 October, 2020; originally announced October 2020.

    Comments: 6 pages, 5 figures, To appear in Information Theory Workshop (ITW) 2020

  15. arXiv:2009.09146  [pdf, other

    cs.IT

    Hierarchical Coding for Cloud Storage: Topology-Adaptivity, Scalability, and Flexibility

    Authors: Siyi Yang, Ahmed Hareedy, Robert Calderbank, Lara Dolecek

    Abstract: In order to accommodate the ever-growing data from various, possibly independent, sources and the dynamic nature of data usage rates in practical applications, modern cloud data storage systems are required to be scalable, flexible, and heterogeneous. The recent rise of the blockchain technology is also moving various information systems towards decentralization to achieve high privacy at low cost… ▽ More

    Submitted 18 September, 2020; originally announced September 2020.

    Comments: 25 pages (single column), 19 figures, submitted to the IEEE Transactions on Information Theory (TIT)

  16. arXiv:2005.13450  [pdf, ps, other

    cs.IT

    Spatially Coupled Codes with Sub-Block Locality: Joint Finite Length-Asymptotic Design Approach

    Authors: Homa Esfahanizadeh, Eshed Ram, Yuval Cassuto, Lara Dolecek

    Abstract: SC-LDPC codes with sub-block locality can be decoded locally at the level of sub-blocks that are much smaller than the full code block, thus providing fast access to the coded information. The same code can also be decoded globally using the entire code block, for increased data reliability. In this paper, we pursue the analysis and design of such codes from both finite-length and asymptotic lense… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    Comments: 6 pages, accepted to appear in IEEE ISIT 2020 proceeding

  17. arXiv:2001.05117  [pdf, other

    cs.IT

    Non-Uniform Windowed Decoding For Multi-Dimensional Spatially-Coupled LDPC Codes

    Authors: Lev Tauz, Homa Esfahanizadeh, Lara Dolecek

    Abstract: In this paper, we propose a non-uniform windowed decoder for multi-dimensional spatially-coupled LDPC (MD-SC-LDPC) codes over the binary erasure channel. An MD-SC-LDPC code is constructed by connecting together several SC-LDPC codes into one larger code that provides major benefits over a variety of channel models. In general, SC codes allow for low-latency windowed decoding. While a standard wind… ▽ More

    Submitted 11 May, 2020; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: 7 pages, 5 figures, submitted to International Symposium on Information Theory (ISIT) 2020

  18. arXiv:2001.04526  [pdf, other

    cs.IT

    Topology-Aware Cooperative Data Protection in Blockchain-Based Decentralized Storage Networks

    Authors: Siyi Yang, Ahmed Hareedy, Robert Calderbank, Lara Dolecek

    Abstract: From currency to cloud storage systems, the continuous rise of the blockchain technology is moving various information systems towards decentralization. Blockchain-based decentralized storage networks (DSNs) offer significantly higher privacy and lower costs to customers compared with centralized cloud storage associated with specific vendors. Coding is required in order to retrieve data stored on… ▽ More

    Submitted 15 May, 2020; v1 submitted 13 January, 2020; originally announced January 2020.

    Comments: 6 pages, 7 figures, the edits in this version are in response to the reviews we received on the short version accepted recently at ISIT 2020

  19. arXiv:2001.00611  [pdf, other

    cs.IT

    Efficient Information Reconciliation for Energy-Time Entanglement Quantum Key Distribution

    Authors: Siyi Yang, Murat Can Sarihan, Kai-Chi Chang, Chee Wei Wong, Lara Dolecek

    Abstract: Graph based codes such as low density parity check (LDPC) codes have been shown promising for the information reconciliation phase in quantum key distribution (QKD). However, existing graph coding schemes have not fully utilized the properties of the QKD channel. In this work, we first investigate the channel statistics for discrete variable (DV) QKD based on energy-time entangled photons. We then… ▽ More

    Submitted 2 January, 2020; originally announced January 2020.

    Comments: 5 pages, 5 figures, presented on the 53rd Asilomar Conference on Signals, Systems and Computers

  20. arXiv:1908.02462  [pdf, other

    cs.IT

    Multi-Dimensional Spatially-Coupled Code Design: Enhancing the Cycle Properties

    Authors: Homa Esfahanizadeh, Lev Tauz, Lara Dolecek

    Abstract: A circulant-based spatially-coupled (SC) code is constructed by partitioning the circulants in the parity-check matrix of a block code into several components and piecing copies of these components in a diagonal structure. By connecting several SC codes, multi-dimensional SC (MD-SC) codes are constructed. In this paper, we present a systematic framework for constructing MD-SC codes with notably be… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

    Comments: 34 pages, 10 figures, submitted to IEEE Transactions on Communications (TCOM)

  21. arXiv:1906.05955  [pdf, other

    cs.IT

    A Finite-Length Construction of Irregular Spatially-Coupled Codes

    Authors: Homa Esfahanizadeh, Ruiyi Wu, Lara Dolecek

    Abstract: Spatially-coupled (SC) LDPC codes have recently emerged as an excellent choice for error correction in modern data storage and communication systems due to their outstanding performance. It has long been known that irregular graph codes offer performance advantage over their regular counterparts. In this paper, we present a novel combinatorial framework for designing finite-length irregular SC LDP… ▽ More

    Submitted 13 June, 2019; originally announced June 2019.

    Comments: 5 pages, 3 figures, submitted to IEEE Information Theory Workshop (ITW) 2019

  22. arXiv:1905.08197  [pdf, ps, other

    cs.IT

    Coding for Deletion Channels with Multiple Traces

    Authors: Mahed Abroshan, Ramji Venkataramanan, Lara Dolecek, Albert Guillén i Fàbregas

    Abstract: Motivated by the sequence reconstruction problem from traces in DNA-based storage, we consider the problem of designing codes for the deletion channel when multiple observations (or traces) are available to the decoder. We propose simple binary and non-binary codes based on Varshamov-Tenengolts (VT) codes. The proposed codes split the codeword in blocks and employ a VT code in each block. The avai… ▽ More

    Submitted 24 June, 2019; v1 submitted 20 May, 2019; originally announced May 2019.

    Comments: This paper will be presented at ISIT 2019

  23. arXiv:1905.02279  [pdf, ps, other

    cs.IT

    Hierarchical Coding to Enable Scalability and Flexibility in Heterogeneous Cloud Storage

    Authors: Siyi Yang, Ahmed Hareedy, Robert Calderbank, Lara Dolecek

    Abstract: In order to accommodate the ever-growing data from various, possibly independent, sources and the dynamic nature of data usage rates in practical applications, modern cloud data storage systems are required to be scalable, flexible, and heterogeneous. Codes with hierarchical locality have been intensively studied due to their effectiveness in reducing the average reading time in cloud storage. In… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

    Comments: 7 pages, 1 figure, a shortened 6 pages version has been submitted to IEEE GLOBECOM 2019

  24. arXiv:1809.05859  [pdf, other

    cs.AR cs.ET cs.PL

    Exploiting Errors for Efficiency: A Survey from Circuits to Algorithms

    Authors: Phillip Stanley-Marbell, Armin Alaghi, Michael Carbin, Eva Darulova, Lara Dolecek, Andreas Gerstlauer, Ghayoor Gillani, Djordje Jevdjic, Thierry Moreau, Mattia Cacciotti, Alexandros Daglis, Natalie Enright Jerger, Babak Falsafi, Sasa Misailovic, Adrian Sampson, Damien Zufferey

    Abstract: When a computational task tolerates a relaxation of its specification or when an algorithm tolerates the effects of noise in its execution, hardware, programming languages, and system software can trade deviations from correct behavior for lower resource usage. We present, for the first time, a synthesis of research results on computing systems that only make as many errors as their users can tole… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

    Comments: 35 pages

  25. arXiv:1809.04798  [pdf, other

    cs.IT math.CO

    Multi-Dimensional Spatially-Coupled Code Design Through Informed Relocation of Circulants

    Authors: Homa Esfahanizadeh, Ahmed Hareedy, Lara Dolecek

    Abstract: A circulant-based spatially-coupled (SC) code is constructed by partitioning the circulants of an underlying block code into a number of components, and then coupling copies of these components together. By connecting (coupling) several SC codes, multi-dimensional SC (MD-SC) codes are constructed. In this paper, we present a systematic framework for constructing MD-SC codes with notably better gir… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

    Comments: 7 pages, 9 figures, Allerton Conference 2018

  26. A Channel-Aware Combinatorial Approach to Design High Performance Spatially-Coupled Codes for Magnetic Recording Systems

    Authors: Ahmed Hareedy, Ruiyi Wu, Lara Dolecek

    Abstract: Because of their capacity-approaching performance and their complexity/latency advantages, spatially-coupled (SC) codes are among the most attractive error-correcting codes for use in modern dense data storage systems. SC codes are constructed by partitioning an underlying block code and coupling the partitioned components. Here, we focus on circulant-based SC codes. Recently, the optimal overlap… ▽ More

    Submitted 7 April, 2019; v1 submitted 16 April, 2018; originally announced April 2018.

    Comments: 35 pages (single column), 19 figures, submitted to the IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, 2020

  27. arXiv:1803.06417  [pdf, other

    cs.IT

    Coding for Channels with SNR Variation: Spatial Coupling and Efficient Interleaving

    Authors: Homa Esfahanizadeh, Ahmed Hareedy, Ruiyi Wu, Rick Galbraith, Lara Dolecek

    Abstract: In magnetic-recording systems, consecutive sections experience different signal to noise ratios (SNRs). To perform error correction over these systems, one approach is to use an individual block code for each section. However, the performance over a section affected by a lower SNR is weaker compared to the performance over a section affected by a higher SNR. Spatially-coupled (SC) codes are a fami… ▽ More

    Submitted 28 June, 2018; v1 submitted 16 March, 2018; originally announced March 2018.

    Comments: 8 pages, Submitted to IEEE Transactions on Magnetics (TMAG)

  28. Theoretical Bounds and Constructions of Codes in the Generalized Cayley Metric

    Authors: Siyi Yang, Clayton Schoeny, Lara Dolecek

    Abstract: Permutation codes have recently garnered substantial research interest due to their potential in various applications including cloud storage systems, genome resequencing and flash memories. In this paper, we study the theoretical bounds and constructions of permutation codes in the generalized Cayley metric. The generalized Cayley metric captures the number of generalized transposition errors in… ▽ More

    Submitted 2 January, 2020; v1 submitted 12 March, 2018; originally announced March 2018.

    Comments: 18 pages; 0 figures; published on IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 65, no. 8, pp. 4746 - 4763, 2019

  29. arXiv:1802.06481  [pdf, other

    cs.IT

    Finite-Length Construction of High Performance Spatially-Coupled Codes via Optimized Partitioning and Lifting

    Authors: Homa Esfahanizadeh, Ahmed Hareedy, Lara Dolecek

    Abstract: Spatially-coupled (SC) codes are a family of graph-based codes that have attracted significant attention thanks to their capacity approaching performance and low decoding latency. An SC code is constructed by partitioning an underlying block code into a number of components and coupling their copies together. In this paper, we first introduce a general approach for the enumeration of detrimental c… ▽ More

    Submitted 18 February, 2018; originally announced February 2018.

    Comments: 30 pages; this manuscript is submitted to IEEE Transactions on Communications (TCOM)

  30. High Performance Non-Binary Spatially-Coupled Codes for Flash Memories

    Authors: Ahmed Hareedy, Homa Esfahanizadeh, Lara Dolecek

    Abstract: Modern dense Flash memory devices operate at very low error rates, which require powerful error correcting coding (ECC) techniques. An emerging class of graph-based ECC techniques that has broad applications is the class of spatially-coupled (SC) codes, where a block code is partitioned into components that are then rewired multiple times to construct an SC code. Here, our focus is on SC codes wit… ▽ More

    Submitted 10 March, 2018; v1 submitted 22 June, 2017; originally announced June 2017.

    Comments: 8 pages (double column), 5 figures, the short version was accepted at the IEEE Information Theory Workshop

    Journal ref: IEEE Information Theory Workshop (ITW), Nov. 2017, pp. 229-233

  31. A Combinatorial Methodology for Optimizing Non-Binary Graph-Based Codes: Theoretical Analysis and Applications in Data Storage

    Authors: Ahmed Hareedy, Chinmayi Lanka, Nian Guo, Lara Dolecek

    Abstract: Non-binary (NB) low-density parity-check (LDPC) codes are graph-based codes that are increasingly being considered as a powerful error correction tool for modern dense storage devices. The increasing levels of asymmetry incorporated by the channels underlying modern dense storage systems exacerbates the error floor problem. In a recent research, the weight consistency matrix (WCM) framework was in… ▽ More

    Submitted 20 September, 2019; v1 submitted 22 June, 2017; originally announced June 2017.

    Comments: 27 pages, 21 figures, published at the IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 65, no. 4, pp. 2128-2154, Apr. 2019

  32. arXiv:1703.02641  [pdf, other

    stat.ML cs.LG

    Don't Fear the Bit Flips: Optimized Coding Strategies for Binary Classification

    Authors: Frederic Sala, Shahroze Kabir, Guy Van den Broeck, Lara Dolecek

    Abstract: After being trained, classifiers must often operate on data that has been corrupted by noise. In this paper, we consider the impact of such noise on the features of binary classifiers. Inspired by tools for classifier robustness, we introduce the same classification probability (SCP) to measure the resulting distortion on the classifier outputs. We introduce a low-complexity estimate of the SCP ba… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

    Comments: 11 pages, 4 figures

  33. arXiv:1604.03000  [pdf, other

    cs.IT

    Exact Reconstruction from Insertions in Synchronization Codes

    Authors: Frederic Sala, Ryan Gabrys, Clayton Schoeny, Lara Dolecek

    Abstract: This work studies problems in data reconstruction, an important area with numerous applications. In particular, we examine the reconstruction of binary and non-binary sequences from synchronization (insertion/deletion-correcting) codes. These sequences have been corrupted by a fixed number of symbol insertions (larger than the minimum edit distance of the code), yielding a number of distinct trace… ▽ More

    Submitted 7 March, 2017; v1 submitted 11 April, 2016; originally announced April 2016.

    Comments: 18 pages, 3 figures. Accepted to IEEE Transactions on Information Theory

  34. arXiv:1507.05941  [pdf

    cs.IT

    A Perspective on Future Research Directions in Information Theory

    Authors: Jeffrey G. Andrews, Alexandros Dimakis, Lara Dolecek, Michelle Effros, Muriel Medard, Olgica Milenkovic, Andrea Montanari, Sriram Vishwanath, Edmund Yeh, Randall Berry, Ken Duffy, Soheil Feizi, Saul Kato, Manolis Kellis, Stuart Licht, Jon Sorenson, Lav Varshney, Haris Vikalo

    Abstract: Information theory is rapidly approaching its 70th birthday. What are promising future directions for research in information theory? Where will information theory be having the most impact in 10-20 years? What new and emerging areas are ripe for the most impact, of the sort that information theory has had on the telecommunications industry over the last 60 years? How should the IEEE Information T… ▽ More

    Submitted 21 July, 2015; originally announced July 2015.

  35. Spatially Coupled Sparse Codes on Graphs - Theory and Practice

    Authors: Daniel J. Costello, Jr., Lara Dolecek, Thomas E. Fuja, Joerg Kliewer, David G. M. Mitchell, Roxana Smarandache

    Abstract: Since the discovery of turbo codes 20 years ago and the subsequent re-discovery of low-density parity-check codes a few years later, the field of channel coding has experienced a number of major advances. Up until that time, code designers were usually happy with performance that came within a few decibels of the Shannon Limit, primarily due to implementation complexity constraints, whereas the ne… ▽ More

    Submitted 14 October, 2013; originally announced October 2013.

    Comments: Submitted to the IEEE Communications Magazine

  36. arXiv:1307.7087  [pdf, ps, other

    cs.IT

    Correcting Grain-Errors in Magnetic Media

    Authors: Ryan Gabrys, Eitan Yaakobi, Lara Dolecek

    Abstract: This paper studies new bounds and constructions that are applicable to the combinatorial granular channel model previously introduced by Sharov and Roth. We derive new bounds on the maximum cardinality of a grain-error-correcting code and propose constructions of codes that correct grain-errors. We demonstrate that a permutation of the classical group codes (e.g., Constantin-Rao codes) can correct… ▽ More

    Submitted 30 April, 2018; v1 submitted 26 July, 2013; originally announced July 2013.

  37. arXiv:1208.6094  [pdf, other

    cs.IT

    The Cycle Consistency Matrix Approach to Absorbing Sets in Separable Circulant-Based LDPC Codes

    Authors: Jiadong Wang, Lara Dolecek, Richard Wesel

    Abstract: For LDPC codes operating over additive white Gaussian noise channels and decoded using message-passing decoders with limited precision, absorbing sets have been shown to be a key factor in error floor behavior. Focusing on this scenario, this paper introduces the cycle consistency matrix (CCM) as a powerful analytical tool for characterizing and avoiding absorbing sets in separable circulant-based… ▽ More

    Submitted 5 December, 2012; v1 submitted 30 August, 2012; originally announced August 2012.

  38. arXiv:1207.0290  [pdf, other

    cs.IT

    A Deterministic Polynomial-Time Protocol for Synchronizing from Deletions

    Authors: S. M. Sadegh Tabatabaei Yazdi, Lara Dolecek

    Abstract: In this paper, we consider a synchronization problem between nodes $A$ and $B$ that are connected through a two--way communication channel. {Node $A$} contains a binary file $X$ of length $n$ and {node $B$} contains a binary file $Y$ that is generated by randomly deleting bits from $X$, by a small deletion rate $β$. The location of deleted bits is not known to either node $A$ or node $B$. We offer… ▽ More

    Submitted 21 August, 2013; v1 submitted 2 July, 2012; originally announced July 2012.

    Comments: Accepted to the IEEE Transactions on Information Theory

  39. arXiv:1106.0057  [pdf, other

    cs.IT

    Absorbing Set Spectrum Approach for Practical Code Design

    Authors: Jiadong Wang, Lara Dolecek, Zhengya Zhang, Richard Wesel

    Abstract: This paper focuses on controlling the absorbing set spectrum for a class of regular LDPC codes known as separable, circulant-based (SCB) codes. For a specified circulant matrix, SCB codes all share a common mother matrix, examples of which are array-based LDPC codes and many common quasi-cyclic codes. SCB codes retain the standard properties of quasi-cyclic LDPC codes such as girth, code structure… ▽ More

    Submitted 31 May, 2011; originally announced June 2011.

    Comments: 10 pages