Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Schoeny, C

Searching in archive cs. Search in all archives.
.
  1. Theoretical Bounds and Constructions of Codes in the Generalized Cayley Metric

    Authors: Siyi Yang, Clayton Schoeny, Lara Dolecek

    Abstract: Permutation codes have recently garnered substantial research interest due to their potential in various applications including cloud storage systems, genome resequencing and flash memories. In this paper, we study the theoretical bounds and constructions of permutation codes in the generalized Cayley metric. The generalized Cayley metric captures the number of generalized transposition errors in… ▽ More

    Submitted 2 January, 2020; v1 submitted 12 March, 2018; originally announced March 2018.

    Comments: 18 pages; 0 figures; published on IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 65, no. 8, pp. 4746 - 4763, 2019

  2. arXiv:1604.03000  [pdf, other

    cs.IT

    Exact Reconstruction from Insertions in Synchronization Codes

    Authors: Frederic Sala, Ryan Gabrys, Clayton Schoeny, Lara Dolecek

    Abstract: This work studies problems in data reconstruction, an important area with numerous applications. In particular, we examine the reconstruction of binary and non-binary sequences from synchronization (insertion/deletion-correcting) codes. These sequences have been corrupted by a fixed number of symbol insertions (larger than the minimum edit distance of the code), yielding a number of distinct trace… ▽ More

    Submitted 7 March, 2017; v1 submitted 11 April, 2016; originally announced April 2016.

    Comments: 18 pages, 3 figures. Accepted to IEEE Transactions on Information Theory

  3. arXiv:1602.06820  [pdf, ps, other

    cs.IT

    Codes Correcting a Burst of Deletions or Insertions

    Authors: Clayton Schoeny, Antonia Wachter-Zeh, Ryan Gabrys, Eitan Yaakobi

    Abstract: This paper studies codes that correct bursts of deletions. Namely, a code will be called a $b$-burst-deletion-correcting code if it can correct a deletion of any $b$ consecutive bits. While the lower bound on the redundancy of such codes was shown by Levenshtein to be asymptotically $\log(n)+b-1$, the redundancy of the best code construction by Cheng et al. is $b(\log (n/b+1))$. In this paper we c… ▽ More

    Submitted 12 May, 2016; v1 submitted 22 February, 2016; originally announced February 2016.