Zum Hauptinhalt springen

Showing 1–50 of 72 results for author: Kumar, P V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06641  [pdf, other

    cs.IT

    On Existence of Latency Optimal Uncoded Storage Schemes in Geo-Distributed Data Storage Systems

    Authors: Srivathsa Acharya, P. Vijay Kumar, Viveck R. Cadambe

    Abstract: We consider the problem of geographically distributed data storage in a network of servers (or nodes) where the nodes are connected to each other via communication links having certain round-trip times (RTTs). Each node serves a specific set of clients, where a client can request for any of the files available in the distributed system. The parent node provides the requested file if available loca… ▽ More

    Submitted 13 May, 2024; v1 submitted 10 May, 2024; originally announced May 2024.

  2. arXiv:2405.06621  [pdf, other

    cs.IT

    On Streaming Codes for Simultaneously Correcting Burst and Random Erasures

    Authors: Shobhit Bhatnagar, Biswadip Chakraborty, P. Vijay Kumar

    Abstract: Streaming codes are packet-level codes that recover dropped packets within a strict decoding-delay constraint. We study streaming codes over a sliding-window (SW) channel model which admits only those erasure patterns which allow either a single burst erasure of $\le b$ packets along with $\le e$ random packet erasures, or else, $\le a$ random packet erasures, in any sliding-window of $w$ time slo… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  3. arXiv:2405.06606  [pdf, other

    cs.IT

    On Streaming Codes for Burst and Random Errors

    Authors: Shobhit Bhatnagar, P. Vijay Kumar

    Abstract: Streaming codes (SCs) are packet-level codes that recover erased packets within a strict decoding-delay deadline. Streaming codes for various packet erasure channel models such as sliding-window (SW) channel models that admit random or burst erasures in any SW of a fixed length have been studied in the literature, and the optimal rate as well as rate-optimal code constructions of SCs over such cha… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  4. arXiv:2305.06303  [pdf, other

    cs.IT

    Explicit Information-Debt-Optimal Streaming Codes With Small Memory

    Authors: M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, P. Vijay Kumar

    Abstract: For a convolutional code in the presence of a symbol erasure channel, the information debt $I(t)$ at time $t$ provides a measure of the number of additional code symbols required to recover all message symbols up to time $t$. Information-debt-optimal streaming ($i$DOS) codes are convolutional codes which allow for the recovery of all message symbols up to $t$ whenever $I(t)$ turns zero under the f… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: Accepted to 2023 IEEE International Symposium on Information Theory (ISIT)

  5. arXiv:2207.04025  [pdf, ps, other

    cs.IT

    Rate-Optimal Streaming Codes Over the Three-Node Decode-And-Forward Relay Network

    Authors: Shubhransh Singhvi, Gayathri R., P. Vijay Kumar

    Abstract: In this paper, we study the three-node Decode-and-Forward (D&F) relay network subject to random and burst packet erasures. The source wishes to transmit an infinite stream of packets to the destination via the relay. The three-node D&F relay network is constrained by a decoding delay of T packets, i.e., the packet transmitted by the source at time i must be decoded by the destination by time i+T.… ▽ More

    Submitted 29 November, 2022; v1 submitted 8 July, 2022; originally announced July 2022.

    Comments: Published at ISIT 2022

  6. arXiv:2205.06800  [pdf, other

    cs.LG cs.NI

    Distributed Transmission Control for Wireless Networks using Multi-Agent Reinforcement Learning

    Authors: Collin Farquhar, Prem Sagar Pattanshetty Vasanth Kumar, Anu Jagannath, Jithin Jagannath

    Abstract: We examine the problem of transmission control, i.e., when to transmit, in distributed wireless communications networks through the lens of multi-agent reinforcement learning. Most other works using reinforcement learning to control or schedule transmissions use some centralized control mechanism, whereas our approach is fully distributed. Each transmitter node is an independent reinforcement lear… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

    Comments: 20 pages, 11 figures. To appear in SPIE Defense and Commercial Sensing 2022 (SI22)

  7. arXiv:2201.00680  [pdf, other

    cs.LG cs.AI

    A Comprehensive Survey on Radio Frequency (RF) Fingerprinting: Traditional Approaches, Deep Learning, and Open Challenges

    Authors: Anu Jagannath, Jithin Jagannath, Prem Sagar Pattanshetty Vasanth Kumar

    Abstract: Fifth generation (5G) network and beyond envision massive Internet of Things (IoT) rollout to support disruptive applications such as extended reality (XR), augmented/virtual reality (AR/VR), industrial automation, autonomous driving, and smart everything which brings together massive and diverse IoT devices occupying the radio frequency (RF) spectrum. Along with the spectrum crunch and throughput… ▽ More

    Submitted 6 September, 2022; v1 submitted 3 January, 2022; originally announced January 2022.

    Comments: To appear in Computer Networks (Elsevier)

  8. arXiv:2109.03168  [pdf, other

    cs.IT

    Locally Recoverable Streaming Codes for Packet-Erasure Recovery

    Authors: Vinayak Ramkumar, Myna Vajha, P. Vijay Kumar

    Abstract: Streaming codes are a class of packet-level erasure codes that are designed with the goal of ensuring recovery in low-latency fashion, of erased packets over a communication network. It is well-known in the streaming code literature, that diagonally embedding codewords of a $[τ+1,τ+1-a]$ Maximum Distance Separable (MDS) code within the packet stream, leads to rate-optimal streaming codes capable o… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: To be presented at ITW 2021

  9. arXiv:2105.04432  [pdf, other

    cs.IT

    Explicit Rate-Optimal Streaming Codes with Smaller Field Size

    Authors: Myna Vajha, Vinayak Ramkumar, M. Nikhil Krishnan, P. Vijay Kumar

    Abstract: Streaming codes are a class of packet-level erasure codes that ensure packet recovery over a sliding window channel which allows either a burst erasure of size $b$ or $a$ random erasures within any window of size $(τ+1)$ time units, under a strict decoding-delay constraint $τ$. The field size over which streaming codes are constructed is an important factor determining the complexity of implementa… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

  10. arXiv:2104.07005  [pdf, other

    cs.IT

    Generalized Simple Streaming Codes from MDS Codes

    Authors: Vinayak Ramkumar, Myna Vajha, P. Vijay Kumar

    Abstract: Streaming codes represent a packet-level FEC scheme for achieving reliable, low-latency communication. In the literature on streaming codes, the commonly-assumed Gilbert-Elliott channel model, is replaced by a more tractable, delay-constrained, sliding-window (DCSW) channel model that can introduce either random or burst erasures. The known streaming codes that are rate optimal over the DCSW chann… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

  11. arXiv:2010.01344  [pdf, other

    cs.IT

    Codes for Distributed Storage

    Authors: Vinayak Ramkumar, Myna Vajha, S. B. Balaji, M. Nikhil Krishnan, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: This chapter deals with the topic of designing reliable and efficient codes for the storage and retrieval of large quantities of data over storage devices that are prone to failure. For long, the traditional objective has been one of ensuring reliability against data loss while minimizing storage overhead. More recently, a third concern has surfaced, namely of the need to efficiently recover from… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

    Comments: This survey article will appear as a chapter in the upcoming "A Concise Encyclopedia of Coding Theory", W. C. Huffman, J.-L. Kim, and P. Solé, CRC Press

  12. arXiv:2005.07113  [pdf, other

    cs.IT

    Staggered Diagonal Embedding Based Linear Field Size Streaming Codes

    Authors: Vinayak Ramkumar, Myna Vajha, M. Nikhil Krishnan, P. Vijay Kumar

    Abstract: An $(a,b,τ)$ streaming code is a packet-level erasure code that can recover under a strict delay constraint of $τ$ time units, from either a burst of $b$ erasures or else of $a$ random erasures, occurring within a sliding window of time duration $w$. While rate-optimal constructions of such streaming codes are available for all parameters $\{a,b,τ,w\}$ in the literature, they require in most insta… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: Accepted to ISIT 2020

  13. arXiv:2005.06921  [pdf, other

    cs.IT

    On the Performance Analysis of Streaming Codes over the Gilbert-Elliott Channel

    Authors: Myna Vajha, Vinayak Ramkumar, Mayank Jhamtani, P. Vijay Kumar

    Abstract: The Gilbert-Elliot (GE) channel is a commonly-accepted model for packet erasures in networks. Streaming codes are a class of packet-level erasure codes designed to provide reliable communication over the GE channel. The design of a streaming code may be viewed as a two-step process. In the first, a more tractable, delay-constrained sliding window (DCSW) channel model is considered as a proxy to th… ▽ More

    Submitted 7 September, 2021; v1 submitted 14 May, 2020; originally announced May 2020.

    Comments: To be presented at ITW 2021

  14. arXiv:1903.06210  [pdf, other

    cs.IT

    Low Field-size, Rate-Optimal Streaming Codes for Channels With Burst and Random Erasures

    Authors: M. Nikhil Krishnan, Deeptanshu Shukla, P. Vijay Kumar

    Abstract: In this paper, we design erasure-correcting codes for channels with burst and random erasures, when a strict decoding delay constraint is in place. We consider the sliding-window-based packet erasure model proposed by Badr et al., where any time-window of width $w$ contains either up to $a$ random erasures or an erasure burst of length at most $b$. One needs to recover any erased packet, where era… ▽ More

    Submitted 14 March, 2019; originally announced March 2019.

  15. arXiv:1812.02502  [pdf, other

    cs.IT

    A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures

    Authors: S. B. Balaji, Ganesh R. Kini, P. Vijay Kumar

    Abstract: By a locally recoverable code (LRC), we will in this paper, mean a linear code in which a given code symbol can be recovered by taking a linear combination of at most $r$ other code symbols with $r << k$. A natural extension is to the local recovery of a set of $t$ erased symbols. There have been several approaches proposed for the handling of multiple erasures. The approach considered here, is on… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

    Comments: To admin: Has overlaps with 1806.04474,1611.08561,1801.06794 . This is for submitting to the Journal

  16. arXiv:1806.04474  [pdf, other

    cs.IT

    Erasure Codes for Distributed Storage: Tight Bounds and Matching Constructions

    Authors: S. B. Balaji, P. Vijay Kumar

    Abstract: This thesis makes several significant contributions to the theory of both Regenerating (RG) and Locally Recoverable (LR) codes. The two principal contributions are characterizing the optimal rate of an LR code designed to recover from $t$ erased symbols sequentially, for any $t$ and the development of a tight bound on the sub-packetization level (length of a vector code symbol) of a sub-class of R… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: My PhD Thesis

  17. arXiv:1806.04437  [pdf, other

    cs.IT

    Erasure Coding for Distributed Storage: An Overview

    Authors: S. B. Balaji, M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: In a distributed storage system, code symbols are dispersed across space in nodes or storage units as opposed to time. In settings such as that of a large data center, an important consideration is the efficient repair of a failed node. Efficient repair calls for erasure codes that in the face of node failure, are efficient in terms of minimizing the amount of repair data transferred over the netw… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: This survey article will appear in Science China Information Sciences (SCIS) journal

  18. arXiv:1806.02028  [pdf, ps, other

    cs.IT

    Determining the Generalized Hamming Weight Hierarchy of the Binary Projective Reed-Muller Code

    Authors: Vinayak Ramkumar, Myna Vajha, P. Vijay Kumar

    Abstract: Projective Reed-Muller codes correspond to subcodes of the Reed-Muller code in which the polynomials being evaluated to yield codewords, are restricted to be homogeneous. The Generalized Hamming Weights (GHW) of a code ${\cal C}$, identify for each dimension $ν$, the smallest size of the support of a subcode of ${\cal C}$ of dimension $ν$. The GHW of a code are of interest in assessing the vulnera… ▽ More

    Submitted 6 June, 2018; originally announced June 2018.

    Comments: Will appear in NCC 2018 proceedings

  19. arXiv:1804.00598  [pdf, other

    cs.IT

    Small-d MSR Codes with Optimal Access, Optimal Sub-Packetization and Linear Field Size

    Authors: Myna Vajha, S. B. Balaji, P. Vijay Kumar

    Abstract: This paper presents an explicit construction of a class of optimal-access, minimum storage regenerating (MSR) codes, for small values of the number $d$ of helper nodes. The construction is valid for any parameter set $(n,k,d)$ with $d \in \{k+1, k+2, k+3\}$ and employs a finite field $\mathbb{F}_q$ of size $q=O(n)$. We will refer to the constructed codes as Small-d MSR codes. The sub-packetization… ▽ More

    Submitted 22 September, 2021; v1 submitted 2 April, 2018; originally announced April 2018.

  20. arXiv:1804.00564  [pdf, other

    cs.IT

    Codes with Combined Locality and Regeneration Having Optimal Rate, $d_{\text{min}}$ and Linear Field Size

    Authors: M. Nikhil Krishnan, Anantha Narayanan R., P. Vijay Kumar

    Abstract: In this paper, we study vector codes with all-symbol locality, where the local code is either a Minimum Bandwidth Regenerating (MBR) code or a Minimum Storage Regenerating (MSR) code. In the first part, we present vector codes with all-symbol MBR locality, for all parameters, that have both optimal minimum-distance and optimal rate. These codes combine ideas from two popular codes in the distribut… ▽ More

    Submitted 2 April, 2018; originally announced April 2018.

    Comments: Accepted for publication in 2018 IEEE International Symposium on Information Theory (ISIT)

  21. arXiv:1801.06794  [pdf, other

    cs.IT

    A Rate-Optimal Construction of Codes with Sequential Recovery with Low Block Length

    Authors: Balaji Srinivasan Babu, Ganesh R. Kini, P. Vijay Kumar

    Abstract: An erasure code is said to be a code with sequential recovery with parameters $r$ and $t$, if for any $s \leq t$ erased code symbols, there is an $s$-step recovery process in which at each step we recover exactly one erased code symbol by contacting at most $r$ other code symbols. In earlier work by the same authors, presented at ISIT 2017, we had given a construction for binary codes with sequent… ▽ More

    Submitted 21 January, 2018; originally announced January 2018.

    Comments: Accepted for publication in NCC 2018

  22. arXiv:1801.05919  [pdf, other

    cs.IT

    Rate-Optimal Streaming Codes for Channels with Burst and Isolated Erasures

    Authors: M. Nikhil Krishnan, P. Vijay Kumar

    Abstract: Recovery of data packets from packet erasures in a timely manner is critical for many streaming applications. An early paper by Martinian and Sundberg introduced a framework for streaming codes and designed rate-optimal codes that permit delay-constrained recovery from an erasure burst of length up to $B$. A recent work by Badr et al. extended this result and introduced a sliding-window channel mo… ▽ More

    Submitted 17 January, 2018; originally announced January 2018.

    Comments: shorter version submitted to ISIT 2018

  23. arXiv:1710.05876  [pdf, other

    cs.IT

    On Lower Bounds on Sub-Packetization Level of MSR codes and On The Structure of Optimal-Access MSR Codes Achieving The Bound

    Authors: S. B. Balaji, Myna Vajha, P. Vijay Kumar

    Abstract: We present two lower bounds on sub-packetization level $α$ of MSR codes with parameters $(n, k, d=n-1, α)$ where $n$ is the block length, $k$ dimension, $d$ number of helper nodes contacted during single node repair and $α$ the sub-packetization level. The first bound we present is for any MSR code and is given by $α\ge e^{\frac{(k-1)(r-1)}{2r^2}}$. The second bound we present is for the case of… ▽ More

    Submitted 18 September, 2021; v1 submitted 16 October, 2017; originally announced October 2017.

    Comments: Revised for journal submission

  24. arXiv:1702.05074  [pdf, other

    cs.IT

    Binary, Shortened Projective Reed Muller Codes for Coded Private Information Retrieval

    Authors: Myna Vajha, Vinayak Ramkumar, P. Vijay Kumar

    Abstract: The notion of a Private Information Retrieval (PIR) code was recently introduced by Fazeli, Vardy and Yaakobi who showed that this class of codes permit PIR at reduced levels of storage overhead in comparison with replicated-server PIR. In the present paper, the construction of an $(n,k)$ $τ$-server binary, linear PIR code having parameters $n = \sum\limits_{i = 0}^{\ell} {m \choose i}$,… ▽ More

    Submitted 17 March, 2017; v1 submitted 16 February, 2017; originally announced February 2017.

    Comments: submitted to ISIT 2017

  25. arXiv:1702.03786  [pdf, other

    cs.IT

    A Study on the Impact of Locality in the Decoding of Binary Cyclic Codes

    Authors: M. Nikhil Krishnan, Bhagyashree Puranik, P. Vijay Kumar, Itzhak Tamo, Alexander Barg

    Abstract: In this paper, we study the impact of locality on the decoding of binary cyclic codes under two approaches, namely ordered statistics decoding (OSD) and trellis decoding. Given a binary cyclic code having locality or availability, we suitably modify the OSD to obtain gains in terms of the Signal-To-Noise ratio, for a given reliability and essentially the same level of decoder complexity. With rega… ▽ More

    Submitted 13 February, 2017; originally announced February 2017.

    Comments: Extended version of a paper submitted to ISIT 2017

  26. arXiv:1701.07447  [pdf, other

    cs.IT

    An Explicit, Coupled-Layer Construction of a High-Rate Regenerating Code with Low Sub-Packetization Level, Small Field Size and $d< (n-1)$

    Authors: Birenjith Sasidharan, Myna Vajha, P. Vijay Kumar

    Abstract: This paper presents an explicit construction for an $((n=2qt,k=2q(t-1),d=n-(q+1)), (α= q(2q)^{t-1},β= \fracα{q}))$ regenerating code (RGC) over a field $\mathbb{F}_Q$ having rate $\geq \frac{t-2}{t}$. The RGC code can be constructed to have rate $k/n$ as close to $1$ as desired, sub-packetization level $α\leq r^{\frac{n}{r}}$ for $r=(n-k)$, field size $Q$ no larger than $n$ and where all code symb… ▽ More

    Submitted 5 April, 2022; v1 submitted 25 January, 2017; originally announced January 2017.

    Comments: In the revised version, a correction is made in the rate calculation. The rate reduces and the code fails to be an MSR code. arXiv admin note: text overlap with arXiv:1607.07335

  27. arXiv:1611.08561  [pdf, other

    cs.IT

    A Tight Rate Bound and a Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures

    Authors: S. B. Balaji, Ganesh R. Kini, P. Vijay Kumar

    Abstract: An $[n,k]$ code $\mathcal{C}$ is said to be locally recoverable in the presence of a single erasure, and with locality parameter $r$, if each of the $n$ code symbols of $\mathcal{C}$ can be recovered by accessing at most $r$ other code symbols. An $[n,k]$ code is said to be a locally recoverable code with sequential recovery from $t$ erasures, if for any set of $s \leq t$ erasures, there is an… ▽ More

    Submitted 17 February, 2017; v1 submitted 25 November, 2016; originally announced November 2016.

    Comments: Revised version of the paper with revised title and abstract (longer version of ISIT 2017 submission)

  28. arXiv:1611.00159  [pdf, other

    cs.IT

    Bounds on Codes with Locality and Availability

    Authors: S. B. Balaji, P. Vijay Kumar

    Abstract: In this paper we investigate bounds on rate and minimum distance of codes with $t$ availability. We present bounds on minimum distance of a code with $t$ availability that are tighter than existing bounds. For bounds on rate of a code with $t$ availability, we restrict ourselves to a sub-class of codes with $t$ availability called codes with strict $t$ availability and derive a tighter rate bound.… ▽ More

    Submitted 28 February, 2017; v1 submitted 1 November, 2016; originally announced November 2016.

    Comments: submitted to ISIT 2017

  29. arXiv:1607.07335  [pdf, other

    cs.IT

    An Explicit, Coupled-Layer Construction of a High-Rate MSR Code with Low Sub-Packetization Level, Small Field Size and All-Node Repair

    Authors: Birenjith Sasidharan, Myna Vajha, P. Vijay Kumar

    Abstract: This paper presents an explicit construction for an $((n,k,d=n-1), (α,β))$ regenerating code over a field $\mathbb{F}_Q$ operating at the Minimum Storage Regeneration (MSR) point. The MSR code can be constructed to have rate $k/n$ as close to $1$ as desired, sub-packetization given by $r^{\frac{n}{r}}$, for $r=(n-k)$, field size no larger than $n$ and where all code symbols can be repaired with th… ▽ More

    Submitted 17 September, 2016; v1 submitted 25 July, 2016; originally announced July 2016.

  30. arXiv:1607.02817  [pdf, other

    cs.IT

    Binary Codes with Locality for Four Erasures

    Authors: S. B. Balaji, K. P. Prasanth, P. Vijay Kumar

    Abstract: In this paper, codes with locality for four erasures are considered. An upper bound on the rate of codes with locality with sequential recovery from four erasures is derived. The rate bound derived here is field independent. An optimal construction for binary codes meeting this rate bound is also provided. The construction is based on regular graphs of girth $6$ and employs the sequential approach… ▽ More

    Submitted 3 November, 2016; v1 submitted 11 July, 2016; originally announced July 2016.

    Comments: 5 pages, 2 figures

  31. arXiv:1606.04467  [pdf, other

    cs.IT

    Outer Bounds on the Storage-Repair Bandwidth Tradeoff of Exact-Repair Regenerating Codes

    Authors: Birenjith Sasidharan, N. Prakash, M. Nikhil Krishnan, Myna Vajha, Kaushik Senthoor, P. Vijay Kumar

    Abstract: In this paper, three outer bounds on the normalized storage-repair bandwidth (S-RB) tradeoff of regenerating codes having parameter set $\{(n,k,d),(α,β)\}$ under the exact-repair (ER) setting are presented. The first outer bound is applicable for every parameter set $(n,k,d)$ and in conjunction with a code construction known as {\em improved layered codes}, it characterizes the normalized ER trade… ▽ More

    Submitted 14 June, 2016; originally announced June 2016.

    Comments: Accepted for publication at International Journal of Information and Coding Theory (Special Issue on Information and Coding Theory for Data Storage)

  32. arXiv:1604.05272  [pdf

    cs.DB

    A Novel Approach for Mining Similarity Profiled Temporal Association Patterns

    Authors: Vangipuram Radhakrishna, P. V. Kumar, V. Janaki

    Abstract: The problem of frequent pattern mining from non-temporal databases is studied extensively by various researchers working in areas of data mining, temporal databases and information retrieval. However, Conventional frequent pattern algorithms are not suitable to find similar temporal association patterns from temporal databases. A Temporal database is a database which can store past, present and fu… ▽ More

    Submitted 18 April, 2016; originally announced April 2016.

    Comments: Technical Journal of the Faculty of Engineering, 14 pages

    Journal ref: Rev. Tec. Ing. Univ. Zulia. Vol. 38, No 3, 80 - 93, 2015

  33. arXiv:1604.03829  [pdf, other

    cs.LG

    Animation and Chirplet-Based Development of a PIR Sensor Array for Intruder Classification in an Outdoor Environment

    Authors: Raviteja Upadrashta, Tarun Choubisa, A. Praneeth, Tony G., Aswath V. S., P. Vijay Kumar, Sripad Kowshik, Hari Prasad Gokul R, T. V. Prabhakar

    Abstract: This paper presents the development of a passive infra-red sensor tower platform along with a classification algorithm to distinguish between human intrusion, animal intrusion and clutter arising from wind-blown vegetative movement in an outdoor environment. The research was aimed at exploring the potential use of wireless sensor networks as an early-warning system to help mitigate human-wildlife… ▽ More

    Submitted 13 April, 2016; originally announced April 2016.

  34. arXiv:1601.08190  [pdf, other

    cs.IT

    On MBR codes with replication

    Authors: M. Nikhil Krishnan, P. Vijay Kumar

    Abstract: An early paper by Rashmi et. al. presented the construction of an $(n,k,d=n-1)$ MBR regenerating code featuring the inherent double replication of all code symbols and repair-by-transfer (RBT), both of which are important in practice. We first show that no MBR code can contain even a single code symbol that is replicated more than twice. We then go on to present two new families of MBR codes which… ▽ More

    Submitted 29 January, 2016; originally announced January 2016.

    Comments: Submitted to ISIT 2016

  35. Binary Codes with Locality for Multiple Erasures Having Short Block Length

    Authors: S. B. Balaji, K. P. Prasanth, P. Vijay Kumar

    Abstract: The focus of this paper is on linear, binary codes with locality having locality parameter $r$, that are capable of recovering from $t\geq 2$ erasures and that moreover, have short block length. Both sequential and parallel (through orthogonal parity checks) recovery is considered here. In the case of parallel repair, minimum-block-length constructions for general $t$ are discussed. In the case of… ▽ More

    Submitted 2 February, 2016; v1 submitted 26 January, 2016; originally announced January 2016.

    Comments: 17 pages, submitted to ISIT 2016

  36. arXiv:1508.03787  [pdf, other

    cs.IT cs.CR

    Information-theoretically Secure Erasure Codes for Distributed Storage

    Authors: Nihar B. Shah, K. V. Rashmi, Kannan Ramchandran, P. Vijay Kumar

    Abstract: Repair operations in distributed storage systems potentially expose the data to malicious acts of passive eavesdroppers or active adversaries, which can be detrimental to the security of the system. This paper presents erasure codes and repair algorithms that ensure security of the data in the presence of passive eavesdroppers and active adversaries, while maintaining high availability, reliabilit… ▽ More

    Submitted 15 August, 2015; originally announced August 2015.

  37. arXiv:1501.07130  [pdf, ps, other

    cs.IT

    On Partial Maximally-Recoverable and Maximally-Recoverable Codes

    Authors: S. B. Balaji, P. Vijay Kumar

    Abstract: An [n, k] linear code C that is subject to locality constraints imposed by a parity check matrix H0 is said to be a maximally recoverable (MR) code if it can recover from any erasure pattern that some k-dimensional subcode of the null space of H0 can recover from. The focus in this paper is on MR codes constrained to have all-symbol locality r. Given that it is challenging to construct MR codes ha… ▽ More

    Submitted 28 January, 2015; originally announced January 2015.

  38. arXiv:1501.06683  [pdf, other

    cs.IT

    Codes With Hierarchical Locality

    Authors: Birenjith Sasidharan, Gaurav Kumar Agarwal, P. Vijay Kumar

    Abstract: In this paper, we study the notion of {\em codes with hierarchical locality} that is identified as another approach to local recovery from multiple erasures. The well-known class of {\em codes with locality} is said to possess hierarchical locality with a single level. In a {\em code with two-level hierarchical locality}, every symbol is protected by an inner-most local code, and another middle-le… ▽ More

    Submitted 27 January, 2015; originally announced January 2015.

    Comments: 12 pages, submitted to ISIT 2015

  39. arXiv:1501.06662  [pdf, ps, other

    cs.IT

    A High-Rate MSR Code With Polynomial Sub-Packetization Level

    Authors: Birenjith Sasidharan, Gaurav Kumar Agarwal, P. Vijay Kumar

    Abstract: We present a high-rate $(n,k,d=n-1)$-MSR code with a sub-packetization level that is polynomial in the dimension $k$ of the code. While polynomial sub-packetization level was achieved earlier for vector MDS codes that repair systematic nodes optimally, no such MSR code construction is known. In the low-rate regime (i. e., rates less than one-half), MSR code constructions with a linear sub-packetiz… ▽ More

    Submitted 27 January, 2015; originally announced January 2015.

    Comments: Submitted to ISIT 2015

  40. arXiv:1501.04760  [pdf, other

    cs.IT

    An Alternate Construction of an Access-Optimal Regenerating Code with Optimal Sub-Packetization Level

    Authors: Gaurav Kumar Agarwal, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: Given the scale of today's distributed storage systems, the failure of an individual node is a common phenomenon. Various metrics have been proposed to measure the efficacy of the repair of a failed node, such as the amount of data download needed to repair (also known as the repair bandwidth), the amount of data accessed at the helper nodes, and the number of helper nodes contacted. Clearly, the… ▽ More

    Submitted 20 January, 2015; originally announced January 2015.

    Comments: To appear in National Conference on Communications 2015

  41. Layered, Exact-Repair Regenerating Codes Via Embedded Error Correction and Block Designs

    Authors: Chao Tian, Birenjith Sasidharan, Vaneet Aggarwal, Vinay A. Vaishampayan, P. Vijay Kumar

    Abstract: A new class of exact-repair regenerating codes is constructed by stitching together shorter erasure correction codes, where the stitching pattern can be viewed as block designs. The proposed codes have the "help-by-transfer" property where the helper nodes simply transfer part of the stored data directly, without performing any computation. This embedded error correction structure makes the decodi… ▽ More

    Submitted 2 August, 2014; originally announced August 2014.

    Comments: This is a combination of the following two papers with additional results (new asymptotic analysis, a better alphabet size bound and smaller repetition factors): arXiv:1302.4670 "Exact-Repair Regenerating Codes Via Layered Erasure Correction and Block Designs" by Tian, Aggarwal, and Vaishampayan, and arXiv:1301.6157 "High-Rate Regenerating Codes Through Layering" by Sasidharan and Kumar

    Journal ref: IEEE Transactions on Information Theory, vol. 61, no. 4, pp. 1933-1947 (2015)

  42. arXiv:1406.6783  [pdf, other

    cs.IT

    Evaluation of Codes with Inherent Double Replication for Hadoop

    Authors: M. Nikhil Krishnan, N. Prakash, V. Lalitha, Birenjith Sasidharan, P. Vijay Kumar, Srinivasan Narayanamurthy, Ranjit Kumar, Siddhartha Nandi

    Abstract: In this paper, we evaluate the efficacy, in a Hadoop setting, of two coding schemes, both possessing an inherent double replication of data. The two coding schemes belong to the class of regenerating and locally regenerating codes respectively, and these two classes are representative of recent advances made in designing codes for the efficient storage of data in a distributed setting. In comparis… ▽ More

    Submitted 26 June, 2014; originally announced June 2014.

    Comments: in Proceedings of Usenix HotStorage, Philadelphia, PA, June 2014

  43. arXiv:1401.2422  [pdf, other

    cs.IT

    Codes with Locality for Two Erasures

    Authors: N. Prakash, V. Lalitha, P. Vijay Kumar

    Abstract: In this paper, we study codes with locality that can recover from two erasures via a sequence of two local, parity-check computations. By a local parity-check computation, we mean recovery via a single parity-check equation associated to small Hamming weight. Earlier approaches considered recovery in parallel; the sequential approach allows us to potentially construct codes with improved minimum d… ▽ More

    Submitted 27 January, 2014; v1 submitted 10 January, 2014; originally announced January 2014.

    Comments: 14 pages, 3 figures, Updated for improved readability

  44. arXiv:1312.6079  [pdf, other

    cs.IT

    An Improved Outer Bound on the Storage-Repair-Bandwidth Tradeoff of Exact-Repair Regenerating Codes

    Authors: Birenjith Sasidharan, Kaushik Senthoor, P. Vijay Kumar

    Abstract: In this paper we establish an improved outer bound on the storage-repair-bandwidth tradeoff of regenerating codes under exact repair. The result shows that in particular, it is not possible to construct exact-repair regenerating codes that asymptotically achieve the tradeoff that holds for functional repair. While this had been shown earlier by Tian for the special case of $[n,k,d]=[4,3,3]$ the pr… ▽ More

    Submitted 20 December, 2013; originally announced December 2013.

    Comments: 14 pages

  45. Linear Coding Schemes for the Distributed Computation of Subspaces

    Authors: V. Lalitha, N. Prakash, K. Vinodh, P. Vijay Kumar, S. Sandeep Pradhan

    Abstract: Let $X_1, ..., X_m$ be a set of $m$ statistically dependent sources over the common alphabet $\mathbb{F}_q$, that are linearly independent when considered as functions over the sample space. We consider a distributed function computation setting in which the receiver is interested in the lossless computation of the elements of an $s$-dimensional subspace $W$ spanned by the elements of the row vect… ▽ More

    Submitted 20 February, 2013; originally announced February 2013.

    Comments: To appear in IEEE Journal of Selected Areas in Communications (In-Network Computation: Exploring the Fundamental Limits), April 2013

  46. arXiv:1302.0744  [pdf, other

    cs.IT

    Explicit MBR All-Symbol Locality Codes

    Authors: Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, Sriram Vishwanath

    Abstract: Node failures are inevitable in distributed storage systems (DSS). To enable efficient repair when faced with such failures, two main techniques are known: Regenerating codes, i.e., codes that minimize the total repair bandwidth; and codes with locality, which minimize the number of nodes participating in the repair process. This paper focuses on regenerating codes with locality, using pre-coding… ▽ More

    Submitted 27 May, 2013; v1 submitted 4 February, 2013; originally announced February 2013.

  47. arXiv:1301.6157  [pdf, other

    cs.IT

    High-Rate Regenerating Codes Through Layering

    Authors: Birenjith Sasidharan, P. Vijay Kumar

    Abstract: In this paper, we provide explicit constructions for a class of exact-repair regenerating codes that possess a layered structure. These regenerating codes correspond to interior points on the storage-repair-bandwidth tradeoff, and compare very well in comparison to scheme that employs space-sharing between MSR and MBR codes. For the parameter set $(n,k,d=k)$ with $n < 2k-1$, we construct a class o… ▽ More

    Submitted 11 March, 2013; v1 submitted 25 January, 2013; originally announced January 2013.

    Comments: 20 pages, 9 figures

  48. arXiv:1211.1932  [pdf, other

    cs.IT

    Codes with Local Regeneration

    Authors: Govinda M. Kamath, N. Prakash, V. Lalitha, P. Vijay Kumar

    Abstract: Regenerating codes and codes with locality are two schemes that have recently been proposed to ensure data collection and reliability in a distributed storage network. In a situation where one is attempting to repair a failed node, regenerating codes seek to minimize the amount of data downloaded for node repair, while codes with locality attempt to minimize the number of helper nodes accessed. In… ▽ More

    Submitted 4 February, 2013; v1 submitted 8 November, 2012; originally announced November 2012.

    Comments: 44 pages, 7 figures. A class of codes termed as Uniform Rank Accumulation (URA) codes is introduced and a minimum distance bound is derived when the local codes are URA codes. Also, the results of our earlier arXiv submssion(arXiv:1202:2414[cs.IT]) are included in Section 3 of this version

  49. arXiv:1205.4487  [pdf

    cs.ET

    CDMA Based Interconnect Mechanism for SOPC

    Authors: V. Rajesh, P. Vijaya Kumar

    Abstract: The Network-on-chip (NoC) designs consisting of large pack of Intellectual Property (IP) blocks (cores) on the same silicon die is becoming technically possible nowadays. But, the communication between the IP Cores is the main issue in recent years. This paper presents the design of a Code Division Multiple Access (CDMA) based wrapper interconnect as a component of System on programmable chip (SOP… ▽ More

    Submitted 21 May, 2012; originally announced May 2012.

    Comments: IJCSI Vol.9 Issue 2, 2012

  50. arXiv:1202.2414  [pdf, ps, other

    cs.IT

    Optimal Linear Codes with a Local-Error-Correction Property

    Authors: N. Prakash, Govinda M. Kamath, V. Lalitha, P. Vijay Kumar

    Abstract: Motivated by applications to distributed storage, Gopalan \textit{et al} recently introduced the interesting notion of information-symbol locality in a linear code. By this it is meant that each message symbol appears in a parity-check equation associated with small Hamming weight, thereby enabling recovery of the message symbol by examining a small number of other code symbols. This notion is exp… ▽ More

    Submitted 11 February, 2012; originally announced February 2012.

    Comments: 13 pages, Shorter version submitted to ISIT 2012