Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Vajha, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.06303  [pdf, other

    cs.IT

    Explicit Information-Debt-Optimal Streaming Codes With Small Memory

    Authors: M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, P. Vijay Kumar

    Abstract: For a convolutional code in the presence of a symbol erasure channel, the information debt $I(t)$ at time $t$ provides a measure of the number of additional code symbols required to recover all message symbols up to time $t$. Information-debt-optimal streaming ($i$DOS) codes are convolutional codes which allow for the recovery of all message symbols up to $t$ whenever $I(t)$ turns zero under the f… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: Accepted to 2023 IEEE International Symposium on Information Theory (ISIT)

  2. arXiv:2109.03168  [pdf, other

    cs.IT

    Locally Recoverable Streaming Codes for Packet-Erasure Recovery

    Authors: Vinayak Ramkumar, Myna Vajha, P. Vijay Kumar

    Abstract: Streaming codes are a class of packet-level erasure codes that are designed with the goal of ensuring recovery in low-latency fashion, of erased packets over a communication network. It is well-known in the streaming code literature, that diagonally embedding codewords of a $[τ+1,τ+1-a]$ Maximum Distance Separable (MDS) code within the packet stream, leads to rate-optimal streaming codes capable o… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: To be presented at ITW 2021

  3. arXiv:2105.04432  [pdf, other

    cs.IT

    Explicit Rate-Optimal Streaming Codes with Smaller Field Size

    Authors: Myna Vajha, Vinayak Ramkumar, M. Nikhil Krishnan, P. Vijay Kumar

    Abstract: Streaming codes are a class of packet-level erasure codes that ensure packet recovery over a sliding window channel which allows either a burst erasure of size $b$ or $a$ random erasures within any window of size $(τ+1)$ time units, under a strict decoding-delay constraint $τ$. The field size over which streaming codes are constructed is an important factor determining the complexity of implementa… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

  4. arXiv:2104.07005  [pdf, other

    cs.IT

    Generalized Simple Streaming Codes from MDS Codes

    Authors: Vinayak Ramkumar, Myna Vajha, P. Vijay Kumar

    Abstract: Streaming codes represent a packet-level FEC scheme for achieving reliable, low-latency communication. In the literature on streaming codes, the commonly-assumed Gilbert-Elliott channel model, is replaced by a more tractable, delay-constrained, sliding-window (DCSW) channel model that can introduce either random or burst erasures. The known streaming codes that are rate optimal over the DCSW chann… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

  5. arXiv:2010.01344  [pdf, other

    cs.IT

    Codes for Distributed Storage

    Authors: Vinayak Ramkumar, Myna Vajha, S. B. Balaji, M. Nikhil Krishnan, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: This chapter deals with the topic of designing reliable and efficient codes for the storage and retrieval of large quantities of data over storage devices that are prone to failure. For long, the traditional objective has been one of ensuring reliability against data loss while minimizing storage overhead. More recently, a third concern has surfaced, namely of the need to efficiently recover from… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

    Comments: This survey article will appear as a chapter in the upcoming "A Concise Encyclopedia of Coding Theory", W. C. Huffman, J.-L. Kim, and P. Solé, CRC Press

  6. arXiv:2005.07113  [pdf, other

    cs.IT

    Staggered Diagonal Embedding Based Linear Field Size Streaming Codes

    Authors: Vinayak Ramkumar, Myna Vajha, M. Nikhil Krishnan, P. Vijay Kumar

    Abstract: An $(a,b,τ)$ streaming code is a packet-level erasure code that can recover under a strict delay constraint of $τ$ time units, from either a burst of $b$ erasures or else of $a$ random erasures, occurring within a sliding window of time duration $w$. While rate-optimal constructions of such streaming codes are available for all parameters $\{a,b,τ,w\}$ in the literature, they require in most insta… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: Accepted to ISIT 2020

  7. arXiv:2005.06921  [pdf, other

    cs.IT

    On the Performance Analysis of Streaming Codes over the Gilbert-Elliott Channel

    Authors: Myna Vajha, Vinayak Ramkumar, Mayank Jhamtani, P. Vijay Kumar

    Abstract: The Gilbert-Elliot (GE) channel is a commonly-accepted model for packet erasures in networks. Streaming codes are a class of packet-level erasure codes designed to provide reliable communication over the GE channel. The design of a streaming code may be viewed as a two-step process. In the first, a more tractable, delay-constrained sliding window (DCSW) channel model is considered as a proxy to th… ▽ More

    Submitted 7 September, 2021; v1 submitted 14 May, 2020; originally announced May 2020.

    Comments: To be presented at ITW 2021

  8. arXiv:1806.04437  [pdf, other

    cs.IT

    Erasure Coding for Distributed Storage: An Overview

    Authors: S. B. Balaji, M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: In a distributed storage system, code symbols are dispersed across space in nodes or storage units as opposed to time. In settings such as that of a large data center, an important consideration is the efficient repair of a failed node. Efficient repair calls for erasure codes that in the face of node failure, are efficient in terms of minimizing the amount of repair data transferred over the netw… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: This survey article will appear in Science China Information Sciences (SCIS) journal

  9. arXiv:1806.02028  [pdf, ps, other

    cs.IT

    Determining the Generalized Hamming Weight Hierarchy of the Binary Projective Reed-Muller Code

    Authors: Vinayak Ramkumar, Myna Vajha, P. Vijay Kumar

    Abstract: Projective Reed-Muller codes correspond to subcodes of the Reed-Muller code in which the polynomials being evaluated to yield codewords, are restricted to be homogeneous. The Generalized Hamming Weights (GHW) of a code ${\cal C}$, identify for each dimension $ν$, the smallest size of the support of a subcode of ${\cal C}$ of dimension $ν$. The GHW of a code are of interest in assessing the vulnera… ▽ More

    Submitted 6 June, 2018; originally announced June 2018.

    Comments: Will appear in NCC 2018 proceedings

  10. arXiv:1804.00598  [pdf, other

    cs.IT

    Small-d MSR Codes with Optimal Access, Optimal Sub-Packetization and Linear Field Size

    Authors: Myna Vajha, S. B. Balaji, P. Vijay Kumar

    Abstract: This paper presents an explicit construction of a class of optimal-access, minimum storage regenerating (MSR) codes, for small values of the number $d$ of helper nodes. The construction is valid for any parameter set $(n,k,d)$ with $d \in \{k+1, k+2, k+3\}$ and employs a finite field $\mathbb{F}_q$ of size $q=O(n)$. We will refer to the constructed codes as Small-d MSR codes. The sub-packetization… ▽ More

    Submitted 22 September, 2021; v1 submitted 2 April, 2018; originally announced April 2018.

  11. arXiv:1710.05876  [pdf, other

    cs.IT

    On Lower Bounds on Sub-Packetization Level of MSR codes and On The Structure of Optimal-Access MSR Codes Achieving The Bound

    Authors: S. B. Balaji, Myna Vajha, P. Vijay Kumar

    Abstract: We present two lower bounds on sub-packetization level $α$ of MSR codes with parameters $(n, k, d=n-1, α)$ where $n$ is the block length, $k$ dimension, $d$ number of helper nodes contacted during single node repair and $α$ the sub-packetization level. The first bound we present is for any MSR code and is given by $α\ge e^{\frac{(k-1)(r-1)}{2r^2}}$. The second bound we present is for the case of… ▽ More

    Submitted 18 September, 2021; v1 submitted 16 October, 2017; originally announced October 2017.

    Comments: Revised for journal submission

  12. arXiv:1702.05074  [pdf, other

    cs.IT

    Binary, Shortened Projective Reed Muller Codes for Coded Private Information Retrieval

    Authors: Myna Vajha, Vinayak Ramkumar, P. Vijay Kumar

    Abstract: The notion of a Private Information Retrieval (PIR) code was recently introduced by Fazeli, Vardy and Yaakobi who showed that this class of codes permit PIR at reduced levels of storage overhead in comparison with replicated-server PIR. In the present paper, the construction of an $(n,k)$ $τ$-server binary, linear PIR code having parameters $n = \sum\limits_{i = 0}^{\ell} {m \choose i}$,… ▽ More

    Submitted 17 March, 2017; v1 submitted 16 February, 2017; originally announced February 2017.

    Comments: submitted to ISIT 2017

  13. arXiv:1701.07447  [pdf, other

    cs.IT

    An Explicit, Coupled-Layer Construction of a High-Rate Regenerating Code with Low Sub-Packetization Level, Small Field Size and $d< (n-1)$

    Authors: Birenjith Sasidharan, Myna Vajha, P. Vijay Kumar

    Abstract: This paper presents an explicit construction for an $((n=2qt,k=2q(t-1),d=n-(q+1)), (α= q(2q)^{t-1},β= \fracα{q}))$ regenerating code (RGC) over a field $\mathbb{F}_Q$ having rate $\geq \frac{t-2}{t}$. The RGC code can be constructed to have rate $k/n$ as close to $1$ as desired, sub-packetization level $α\leq r^{\frac{n}{r}}$ for $r=(n-k)$, field size $Q$ no larger than $n$ and where all code symb… ▽ More

    Submitted 5 April, 2022; v1 submitted 25 January, 2017; originally announced January 2017.

    Comments: In the revised version, a correction is made in the rate calculation. The rate reduces and the code fails to be an MSR code. arXiv admin note: text overlap with arXiv:1607.07335

  14. arXiv:1607.07335  [pdf, other

    cs.IT

    An Explicit, Coupled-Layer Construction of a High-Rate MSR Code with Low Sub-Packetization Level, Small Field Size and All-Node Repair

    Authors: Birenjith Sasidharan, Myna Vajha, P. Vijay Kumar

    Abstract: This paper presents an explicit construction for an $((n,k,d=n-1), (α,β))$ regenerating code over a field $\mathbb{F}_Q$ operating at the Minimum Storage Regeneration (MSR) point. The MSR code can be constructed to have rate $k/n$ as close to $1$ as desired, sub-packetization given by $r^{\frac{n}{r}}$, for $r=(n-k)$, field size no larger than $n$ and where all code symbols can be repaired with th… ▽ More

    Submitted 17 September, 2016; v1 submitted 25 July, 2016; originally announced July 2016.

  15. arXiv:1606.04467  [pdf, other

    cs.IT

    Outer Bounds on the Storage-Repair Bandwidth Tradeoff of Exact-Repair Regenerating Codes

    Authors: Birenjith Sasidharan, N. Prakash, M. Nikhil Krishnan, Myna Vajha, Kaushik Senthoor, P. Vijay Kumar

    Abstract: In this paper, three outer bounds on the normalized storage-repair bandwidth (S-RB) tradeoff of regenerating codes having parameter set $\{(n,k,d),(α,β)\}$ under the exact-repair (ER) setting are presented. The first outer bound is applicable for every parameter set $(n,k,d)$ and in conjunction with a code construction known as {\em improved layered codes}, it characterizes the normalized ER trade… ▽ More

    Submitted 14 June, 2016; originally announced June 2016.

    Comments: Accepted for publication at International Journal of Information and Coding Theory (Special Issue on Information and Coding Theory for Data Storage)