Zum Hauptinhalt springen

Showing 1–18 of 18 results for author: Sasidharan, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12160  [pdf, other

    cs.IT cs.CR

    Block Circulant Codes with Application to Decentralized Systems

    Authors: Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau

    Abstract: The structure of linear dependence relations between coded symbols of a linear code, irrespective of specific coefficients involved, is referred to as the {\em topology} of the code. The specification of coefficients is referred to as an {\em instantiation} of the topology. In this paper, we propose a new block circulant topology $T_{[μ,λ,ω]}(ρ)$ parameterized by integers $ρ\geq 2$, $ω\geq 1$,… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2401.16647  [pdf, other

    cs.IT math.CO

    A Family of Low-Complexity Binary Codes with Constant Hamming Weights

    Authors: Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau

    Abstract: In this paper, we focus on the design of binary constant weight codes that admit low-complexity encoding and decoding algorithms, and that have a size $M=2^k$. For every integer $\ell \geq 3$, we construct a $(n=2^\ell, M=2^{k_{\ell}}, d=2)$ constant weight code ${\cal C}[\ell]$ of weight $\ell$ by encoding information in the gaps between successive $1$'s. The code is associated with an integer se… ▽ More

    Submitted 30 June, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: Submitted to Designs, Codes and Cryptography

  3. arXiv:2311.14116  [pdf, other

    cs.IT

    Hierarchical Coded Gradient Aggregation Based on Layered MDS Codes

    Authors: M. Nikhil Krishnan, Anoop Thomas, Birenjith Sasidharan

    Abstract: The growing privacy concerns and the communication costs associated with transmitting raw data have resulted in techniques like federated learning, where the machine learning models are trained at the edge nodes, and the parameter updates are shared with a central server. Because communications from the edge nodes are often unreliable, a hierarchical setup involving intermediate helper nodes is co… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

    Comments: Presented at 2023 IEEE International Symposium on Information Theory (ISIT)

  4. arXiv:2105.08308  [pdf, ps, other

    cs.DM math.CO

    On Oriented Diameter of $(n, k)$-Star Graphs

    Authors: K. S. Ajish Kumar, Birenjith Sasidharan, K. S. Sudeep

    Abstract: Assignment of one of the two possible directions to every edge of an undirected graph $G=(V,E)$ is called an orientation of $G$. The resulting directed graph is denoted by $\overrightarrow{G}$. A strong orientation is one in which every vertex is reachable from every other vertex via a directed path. The diameter of $\overrightarrow{G}$, i.e., the maximum distance from one vertex to another, depen… ▽ More

    Submitted 28 March, 2022; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Revised version contains proof of a lemma that was omitted earlier. It also elucidates a few arguments in the proof of main theorem. The section on comparison with other works is rewritten for clarity

  5. arXiv:2105.02919  [pdf, ps, other

    cs.IT cs.DC

    Coded Gradient Aggregation: A Tradeoff Between Communication Costs at Edge Nodes and at Helper Nodes

    Authors: Birenjith Sasidharan, Anoop Thomas

    Abstract: The increasing amount of data generated at the edge/client nodes and the privacy concerns have resulted in learning at the edge, in which the computations are performed at edge devices and are communicated to a central node for updating the model. The edge nodes have low bandwidth and may be available only intermittently. There are helper nodes present in the network that aid the edge nodes in the… ▽ More

    Submitted 6 May, 2021; originally announced May 2021.

    Comments: A shorter version accepted in 2021 IEEE International Symposium on Information Theory

  6. arXiv:2010.01344  [pdf, other

    cs.IT

    Codes for Distributed Storage

    Authors: Vinayak Ramkumar, Myna Vajha, S. B. Balaji, M. Nikhil Krishnan, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: This chapter deals with the topic of designing reliable and efficient codes for the storage and retrieval of large quantities of data over storage devices that are prone to failure. For long, the traditional objective has been one of ensuring reliability against data loss while minimizing storage overhead. More recently, a third concern has surfaced, namely of the need to efficiently recover from… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

    Comments: This survey article will appear as a chapter in the upcoming "A Concise Encyclopedia of Coding Theory", W. C. Huffman, J.-L. Kim, and P. Solé, CRC Press

  7. arXiv:1806.04437  [pdf, other

    cs.IT

    Erasure Coding for Distributed Storage: An Overview

    Authors: S. B. Balaji, M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: In a distributed storage system, code symbols are dispersed across space in nodes or storage units as opposed to time. In settings such as that of a large data center, an important consideration is the efficient repair of a failed node. Efficient repair calls for erasure codes that in the face of node failure, are efficient in terms of minimizing the amount of repair data transferred over the netw… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: This survey article will appear in Science China Information Sciences (SCIS) journal

  8. arXiv:1801.03379  [pdf, other

    cs.IT

    On Maximally Recoverable Codes for Product Topologies

    Authors: D. Shivakrishna, V. Arvind Rameshwar, V. Lalitha, Birenjith Sasidharan

    Abstract: Given a topology of local parity-check constraints, a maximally recoverable code (MRC) can correct all erasure patterns that are information-theoretically correctable. In a grid-like topology, there are $a$ local constraints in every column forming a column code, $b$ local constraints in every row forming a row code, and $h$ global constraints in an $(m \times n)$ grid of codeword. Recently, Gopal… ▽ More

    Submitted 10 January, 2018; originally announced January 2018.

    Comments: 6 pages, accepted to National Conference of Communications (NCC) 2018

  9. arXiv:1701.07447  [pdf, other

    cs.IT

    An Explicit, Coupled-Layer Construction of a High-Rate Regenerating Code with Low Sub-Packetization Level, Small Field Size and $d< (n-1)$

    Authors: Birenjith Sasidharan, Myna Vajha, P. Vijay Kumar

    Abstract: This paper presents an explicit construction for an $((n=2qt,k=2q(t-1),d=n-(q+1)), (α= q(2q)^{t-1},β= \fracα{q}))$ regenerating code (RGC) over a field $\mathbb{F}_Q$ having rate $\geq \frac{t-2}{t}$. The RGC code can be constructed to have rate $k/n$ as close to $1$ as desired, sub-packetization level $α\leq r^{\frac{n}{r}}$ for $r=(n-k)$, field size $Q$ no larger than $n$ and where all code symb… ▽ More

    Submitted 5 April, 2022; v1 submitted 25 January, 2017; originally announced January 2017.

    Comments: In the revised version, a correction is made in the rate calculation. The rate reduces and the code fails to be an MSR code. arXiv admin note: text overlap with arXiv:1607.07335

  10. arXiv:1607.07335  [pdf, other

    cs.IT

    An Explicit, Coupled-Layer Construction of a High-Rate MSR Code with Low Sub-Packetization Level, Small Field Size and All-Node Repair

    Authors: Birenjith Sasidharan, Myna Vajha, P. Vijay Kumar

    Abstract: This paper presents an explicit construction for an $((n,k,d=n-1), (α,β))$ regenerating code over a field $\mathbb{F}_Q$ operating at the Minimum Storage Regeneration (MSR) point. The MSR code can be constructed to have rate $k/n$ as close to $1$ as desired, sub-packetization given by $r^{\frac{n}{r}}$, for $r=(n-k)$, field size no larger than $n$ and where all code symbols can be repaired with th… ▽ More

    Submitted 17 September, 2016; v1 submitted 25 July, 2016; originally announced July 2016.

  11. arXiv:1606.04467  [pdf, other

    cs.IT

    Outer Bounds on the Storage-Repair Bandwidth Tradeoff of Exact-Repair Regenerating Codes

    Authors: Birenjith Sasidharan, N. Prakash, M. Nikhil Krishnan, Myna Vajha, Kaushik Senthoor, P. Vijay Kumar

    Abstract: In this paper, three outer bounds on the normalized storage-repair bandwidth (S-RB) tradeoff of regenerating codes having parameter set $\{(n,k,d),(α,β)\}$ under the exact-repair (ER) setting are presented. The first outer bound is applicable for every parameter set $(n,k,d)$ and in conjunction with a code construction known as {\em improved layered codes}, it characterizes the normalized ER trade… ▽ More

    Submitted 14 June, 2016; originally announced June 2016.

    Comments: Accepted for publication at International Journal of Information and Coding Theory (Special Issue on Information and Coding Theory for Data Storage)

  12. arXiv:1501.06683  [pdf, other

    cs.IT

    Codes With Hierarchical Locality

    Authors: Birenjith Sasidharan, Gaurav Kumar Agarwal, P. Vijay Kumar

    Abstract: In this paper, we study the notion of {\em codes with hierarchical locality} that is identified as another approach to local recovery from multiple erasures. The well-known class of {\em codes with locality} is said to possess hierarchical locality with a single level. In a {\em code with two-level hierarchical locality}, every symbol is protected by an inner-most local code, and another middle-le… ▽ More

    Submitted 27 January, 2015; originally announced January 2015.

    Comments: 12 pages, submitted to ISIT 2015

  13. arXiv:1501.06662  [pdf, ps, other

    cs.IT

    A High-Rate MSR Code With Polynomial Sub-Packetization Level

    Authors: Birenjith Sasidharan, Gaurav Kumar Agarwal, P. Vijay Kumar

    Abstract: We present a high-rate $(n,k,d=n-1)$-MSR code with a sub-packetization level that is polynomial in the dimension $k$ of the code. While polynomial sub-packetization level was achieved earlier for vector MDS codes that repair systematic nodes optimally, no such MSR code construction is known. In the low-rate regime (i. e., rates less than one-half), MSR code constructions with a linear sub-packetiz… ▽ More

    Submitted 27 January, 2015; originally announced January 2015.

    Comments: Submitted to ISIT 2015

  14. arXiv:1501.04760  [pdf, other

    cs.IT

    An Alternate Construction of an Access-Optimal Regenerating Code with Optimal Sub-Packetization Level

    Authors: Gaurav Kumar Agarwal, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: Given the scale of today's distributed storage systems, the failure of an individual node is a common phenomenon. Various metrics have been proposed to measure the efficacy of the repair of a failed node, such as the amount of data download needed to repair (also known as the repair bandwidth), the amount of data accessed at the helper nodes, and the number of helper nodes contacted. Clearly, the… ▽ More

    Submitted 20 January, 2015; originally announced January 2015.

    Comments: To appear in National Conference on Communications 2015

  15. Layered, Exact-Repair Regenerating Codes Via Embedded Error Correction and Block Designs

    Authors: Chao Tian, Birenjith Sasidharan, Vaneet Aggarwal, Vinay A. Vaishampayan, P. Vijay Kumar

    Abstract: A new class of exact-repair regenerating codes is constructed by stitching together shorter erasure correction codes, where the stitching pattern can be viewed as block designs. The proposed codes have the "help-by-transfer" property where the helper nodes simply transfer part of the stored data directly, without performing any computation. This embedded error correction structure makes the decodi… ▽ More

    Submitted 2 August, 2014; originally announced August 2014.

    Comments: This is a combination of the following two papers with additional results (new asymptotic analysis, a better alphabet size bound and smaller repetition factors): arXiv:1302.4670 "Exact-Repair Regenerating Codes Via Layered Erasure Correction and Block Designs" by Tian, Aggarwal, and Vaishampayan, and arXiv:1301.6157 "High-Rate Regenerating Codes Through Layering" by Sasidharan and Kumar

    Journal ref: IEEE Transactions on Information Theory, vol. 61, no. 4, pp. 1933-1947 (2015)

  16. arXiv:1406.6783  [pdf, other

    cs.IT

    Evaluation of Codes with Inherent Double Replication for Hadoop

    Authors: M. Nikhil Krishnan, N. Prakash, V. Lalitha, Birenjith Sasidharan, P. Vijay Kumar, Srinivasan Narayanamurthy, Ranjit Kumar, Siddhartha Nandi

    Abstract: In this paper, we evaluate the efficacy, in a Hadoop setting, of two coding schemes, both possessing an inherent double replication of data. The two coding schemes belong to the class of regenerating and locally regenerating codes respectively, and these two classes are representative of recent advances made in designing codes for the efficient storage of data in a distributed setting. In comparis… ▽ More

    Submitted 26 June, 2014; originally announced June 2014.

    Comments: in Proceedings of Usenix HotStorage, Philadelphia, PA, June 2014

  17. arXiv:1312.6079  [pdf, other

    cs.IT

    An Improved Outer Bound on the Storage-Repair-Bandwidth Tradeoff of Exact-Repair Regenerating Codes

    Authors: Birenjith Sasidharan, Kaushik Senthoor, P. Vijay Kumar

    Abstract: In this paper we establish an improved outer bound on the storage-repair-bandwidth tradeoff of regenerating codes under exact repair. The result shows that in particular, it is not possible to construct exact-repair regenerating codes that asymptotically achieve the tradeoff that holds for functional repair. While this had been shown earlier by Tian for the special case of $[n,k,d]=[4,3,3]$ the pr… ▽ More

    Submitted 20 December, 2013; originally announced December 2013.

    Comments: 14 pages

  18. arXiv:1301.6157  [pdf, other

    cs.IT

    High-Rate Regenerating Codes Through Layering

    Authors: Birenjith Sasidharan, P. Vijay Kumar

    Abstract: In this paper, we provide explicit constructions for a class of exact-repair regenerating codes that possess a layered structure. These regenerating codes correspond to interior points on the storage-repair-bandwidth tradeoff, and compare very well in comparison to scheme that employs space-sharing between MSR and MBR codes. For the parameter set $(n,k,d=k)$ with $n < 2k-1$, we construct a class o… ▽ More

    Submitted 11 March, 2013; v1 submitted 25 January, 2013; originally announced January 2013.

    Comments: 20 pages, 9 figures