Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Kelley, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.08153  [pdf, ps, other

    cs.NE cs.AI cs.DS

    The Runtime of Random Local Search on the Generalized Needle Problem

    Authors: Benjamin Doerr, Andrew James Kelley

    Abstract: In their recent work, C. Doerr and Krejca (Transactions on Evolutionary Computation, 2023) proved upper bounds on the expected runtime of the randomized local search heuristic on generalized Needle functions. Based on these upper bounds, they deduce in a not fully rigorous manner a drastic influence of the needle radius $k$ on the runtime. In this short article, we add the missing lower bound ne… ▽ More

    Submitted 19 March, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

    Comments: 18 pages

  2. arXiv:2307.14532  [pdf, ps, other

    cs.IT

    Absorbing Sets in Quantum LDPC Codes

    Authors: Kirsten D. Morris, Tefjol Pllaha, Christine A. Kelley

    Abstract: Iterative decoder failures of quantum low density parity check (QLDPC) codes are attributed to substructures in the code's graph, known as trapping sets, as well as degenerate errors that can arise in quantum codes. Failure inducing sets are subsets of codeword coordinates that, when initially in error, lead to decoding failure in a trapping set. The purpose of this paper is to examine failure ind… ▽ More

    Submitted 10 May, 2024; v1 submitted 26 July, 2023; originally announced July 2023.

  3. arXiv:2302.08021  [pdf, ps, other

    cs.NE cs.AI cs.DS

    Fourier Analysis Meets Runtime Analysis: Precise Runtimes on Plateaus

    Authors: Benjamin Doerr, Andrew James Kelley

    Abstract: We propose a new method based on discrete Fourier analysis to analyze the time evolutionary algorithms spend on plateaus. This immediately gives a concise proof of the classic estimate of the expected runtime of the $(1+1)$ evolutionary algorithm on the Needle problem due to Garnier, Kallel, and Schoenauer (1999). We also use this method to analyze the runtime of the $(1+1)$ evolutionary algorit… ▽ More

    Submitted 1 May, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: 43 pages. This is the full version of a paper appearing in the proceedings of GECCO 2023. Version 3 improves notation, adds more references, and fixes a small error

  4. arXiv:2106.04435  [pdf, other

    cs.LG cs.CR

    Enhancing Robustness of Neural Networks through Fourier Stabilization

    Authors: Netanel Raviv, Aidan Kelley, Michael Guo, Yevgeny Vorobeychik

    Abstract: Despite the considerable success of neural networks in security settings such as malware detection, such models have proved vulnerable to evasion attacks, in which attackers make slight changes to inputs (e.g., malware) to bypass detection. We propose a novel approach, \emph{Fourier stabilization}, for designing evasion-robust neural networks with binary inputs. This approach, which is complementa… ▽ More

    Submitted 8 June, 2021; originally announced June 2021.

    Comments: Full version of an ICML 2021 paper

  5. arXiv:1710.03619  [pdf, other

    cs.IT

    A Generalized Algebraic Approach to Optimizing SC-LDPC Codes

    Authors: Allison Beemer, Salman Habib, Christine A. Kelley, Joerg Kliewer

    Abstract: Spatially coupled low-density parity-check (SC-LDPC) codes are sparse graph codes that have recently become of interest due to their capacity-approaching performance on memoryless binary input channels. In this paper, we unify all existing SC-LDPC code construction methods under a new generalized description of SC-LDPC codes based on algebraic lifts of graphs. We present an improved low-complexity… ▽ More

    Submitted 10 October, 2017; originally announced October 2017.

    Comments: 8 pages, to appear in the Proceedings of the 55th Annual Allerton Conference on Communication, Control, and Computing, 2017

  6. arXiv:1612.05085  [pdf, ps, other

    cs.IT cs.CR

    Variations of the McEliece Cryptosystem

    Authors: Jessalyn Bolkema, Heide Gluesing-Luerssen, Christine A. Kelley, Kristin Lauter, Beth Malmskog, Joachim Rosenthal

    Abstract: Two variations of the McEliece cryptosystem are presented. The first one is based on a relaxation of the column permutation in the classical McEliece scrambling process. This is done in such a way that the Hamming weight of the error, added in the encryption process, can be controlled so that efficient decryption remains possible. The second variation is based on the use of spatially coupled moder… ▽ More

    Submitted 28 April, 2017; v1 submitted 15 December, 2016; originally announced December 2016.

    MSC Class: 11T71; 94A60; 94C15

  7. arXiv:1206.5762  [pdf, ps, other

    cs.IT math.CO

    Geometric WOM codes and coding strategies for multilevel flash memories

    Authors: Kathryn Haymaker, Christine A. Kelley

    Abstract: This paper investigates the design and application of write-once memory (WOM) codes for flash memory storage. Using ideas from Merkx ('84), we present a construction of WOM codes based on finite Euclidean geometries over $\mathbb{F}_2$. This construction yields WOM codes with new parameters and provides insight into the criterion that incidence structures should satisfy to give rise to good codes.… ▽ More

    Submitted 7 May, 2012; originally announced June 2012.

    Comments: Preliminary version, 15 pages, 4 figures

    MSC Class: 94Bxx; 05B25

  8. arXiv:1006.2977  [pdf, ps, other

    cs.IT

    Algebraic Constructions of Graph-Based Nested Codes from Protographs

    Authors: Christine A. Kelley, Joerg Kliewer

    Abstract: Nested codes have been employed in a large number of communication applications as a specific case of superposition codes, for example to implement binning schemes in the presence of noise, in joint network-channel coding, or in physical-layer secrecy. Whereas nested lattice codes have been proposed recently for continuous-input channels, in this paper we focus on the construction of nested linear… ▽ More

    Submitted 15 June, 2010; originally announced June 2010.

    Comments: 5 pages, 2 figures, To appear in 2010 IEEE International Symposium on Information Theory, Austin, TX, USA

  9. arXiv:0708.2462  [pdf, ps, other

    cs.IT

    Eigenvalue bounds on the pseudocodeword weight of expander codes

    Authors: Christine A. Kelley, Deepak Sridhara

    Abstract: Four different ways of obtaining low-density parity-check codes from expander graphs are considered. For each case, lower bounds on the minimum stopping set size and the minimum pseudocodeword weight of expander (LDPC) codes are derived. These bounds are compared with the known eigenvalue-based lower bounds on the minimum distance of expander codes. Furthermore, Tanner's parity-oriented eigenval… ▽ More

    Submitted 18 August, 2007; originally announced August 2007.

    Comments: Journal on Advances of Mathematics of Communications, vol. 1, no. 3, pp. 287 -- 307, Aug. 2007

    Journal ref: Journal on Advances of Mathematics of Communications, vol. 1, no. 3, pp. 287 -- 307, Aug. 2007

  10. arXiv:cs/0611155  [pdf, ps, other

    cs.IT

    Zig-zag and Replacement Product Graphs and LDPC Codes

    Authors: Christine A. Kelley, Deepak Sridhara, Joachim Rosenthal

    Abstract: The performance of codes defined from graphs depends on the expansion property of the underlying graph in a crucial way. Graph products, such as the zig-zag product and replacement product provide new infinite families of constant degree expander graphs. The paper investigates the use of zig-zag and replacement product graphs for the construction of codes on graphs. A modification of the zig-zag… ▽ More

    Submitted 20 August, 2007; v1 submitted 29 November, 2006; originally announced November 2006.

    Comments: Submitted to Journal of Advances in Mathematics of Communications, Aug. 2007

  11. Pseudocodeword weights for non-binary LDPC codes

    Authors: Christine A. Kelley, Deepak Sridhara, Joachim Rosenthal

    Abstract: Pseudocodewords of q-ary LDPC codes are examined and the weight of a pseudocodeword on the q-ary symmetric channel is defined. The weight definition of a pseudocodeword on the AWGN channel is also extended to two-dimensional q-ary modulation such as q-PAM and q-PSK. The tree-based lower bounds on the minimum pseudocodeword weight are shown to also hold for q-ary LDPC codes on these channels.

    Submitted 24 May, 2006; originally announced May 2006.

    Comments: 5 pages, 3 figures. To appear in Proceedings of the 2006 IEEE International Symposium on Information Theory, July 9-14, 2006, Seattle, USA

  12. arXiv:cs/0504013  [pdf, ps, other

    cs.IT

    Pseudocodewords of Tanner graphs

    Authors: Christine A. Kelley, Deepak Sridhara

    Abstract: This papers presents a detailed analysis of pseudocodewords of Tanner graphs. Pseudocodewords arising on the iterative decoder's computation tree are distinguished from pseudocodewords arising on finite degree lifts. Lower bounds on the minimum pseudocodeword weight are presented for the BEC, BSC, and AWGN channel. Some structural properties of pseudocodewords are examined, and pseudocodewords a… ▽ More

    Submitted 18 August, 2007; v1 submitted 5 April, 2005; originally announced April 2005.

    Comments: To appear in Nov. 2007 issue of IEEE Transactions on Information Theory