6,745 research outputs found
Generalized Gray Codes for Local Rank Modulation
We consider the local rank-modulation scheme in which a sliding window going
over a sequence of real-valued variables induces a sequence of permutations.
Local rank-modulation is a generalization of the rank-modulation scheme, which
has been recently suggested as a way of storing information in flash memory. We
study Gray codes for the local rank-modulation scheme in order to simulate
conventional multi-level flash cells while retaining the benefits of rank
modulation. Unlike the limited scope of previous works, we consider code
constructions for the entire range of parameters including the code length,
sliding window size, and overlap between adjacent windows. We show our
constructed codes have asymptotically-optimal rate. We also provide efficient
encoding, decoding, and next-state algorithms.Comment: 7 pages, 1 figure, shorter version was submitted to ISIT 201
Generalized Gray Codes for Local Rank Modulation
We consider the local rank-modulation scheme in
which a sliding window going over a sequence of real-valued
variables induces a sequence of permutations. Local rank-modulation
is a generalization of the rank-modulation scheme,
which has been recently suggested as a way of storing information
in flash memory.
We study Gray codes for the local rank-modulation scheme
in order to simulate conventional multi-level flash cells while
retaining the benefits of rank modulation. Unlike the limited
scope of previous works, we consider code constructions for the
entire range of parameters including the code length, sliding
window size, and overlap between adjacent windows. We show
our constructed codes have asymptotically-optimal rate. We also
provide efficient encoding, decoding, and next-state algorithms
Generalized Gray Codes for Local Rank Modulation
We consider the local rank-modulation scheme, in which a sliding window going over a sequence of real-valued variables induces a sequence of permutations. Local rank-modulation is a generalization of the rank-modulation scheme, which has been recently suggested as a way of storing information in flash memory. We study gray codes for the local rank-modulation scheme in order to simulate conventional multilevel flash cells while retaining the benefits of rank modulation. Unlike the limited scope of previous works, we consider code constructions for the entire range of parameters including the code length, sliding-window size, and overlap between adjacent windows. We show that the presented codes have asymptotically optimal rate. We also provide efficient encoding, decoding, and next-state algorithms
Constructions of Rank Modulation Codes
Rank modulation is a way of encoding information to correct errors in flash
memory devices as well as impulse noise in transmission lines. Modeling rank
modulation involves construction of packings of the space of permutations
equipped with the Kendall tau distance.
We present several general constructions of codes in permutations that cover
a broad range of code parameters. In particular, we show a number of ways in
which conventional error-correcting codes can be modified to correct errors in
the Kendall space. Codes that we construct afford simple encoding and decoding
algorithms of essentially the same complexity as required to correct errors in
the Hamming metric. For instance, from binary BCH codes we obtain codes
correcting Kendall errors in memory cells that support the order of
messages, for any constant We also construct
families of codes that correct a number of errors that grows with at
varying rates, from to . One of our constructions
gives rise to a family of rank modulation codes for which the trade-off between
the number of messages and the number of correctable Kendall errors approaches
the optimal scaling rate. Finally, we list a number of possibilities for
constructing codes of finite length, and give examples of rank modulation codes
with specific parameters.Comment: Submitted to IEEE Transactions on Information Theor
Limited-Magnitude Error-Correcting Gray Codes for Rank Modulation
We construct Gray codes over permutations for the rank-modulation scheme,
which are also capable of correcting errors under the infinity-metric. These
errors model limited-magnitude or spike errors, for which only
single-error-detecting Gray codes are currently known. Surprisingly, the
error-correcting codes we construct achieve a better asymptotic rate than that
of presently known constructions not having the Gray property, and exceed the
Gilbert-Varshamov bound. Additionally, we present efficient ranking and
unranking procedures, as well as a decoding procedure that runs in linear time.
Finally, we also apply our methods to solve an outstanding issue with
error-detecting rank-modulation Gray codes (snake-in-the-box codes) under a
different metric, the Kendall -metric, in the group of permutations over
an even number of elements , where we provide asymptotically optimal
codes.Comment: Revised version for journal submission. Additional results include
more tight auxiliary constructions, a decoding shcema, ranking/unranking
procedures, and application to snake-in-the-box codes under the Kendall
tau-metri
Constructions of Snake-in-the-Box Codes for Rank Modulation
Snake-in-the-box code is a Gray code which is capable of detecting a single
error. Gray codes are important in the context of the rank modulation scheme
which was suggested recently for representing information in flash memories.
For a Gray code in this scheme the codewords are permutations, two consecutive
codewords are obtained by using the "push-to-the-top" operation, and the
distance measure is defined on permutations. In this paper the Kendall's
-metric is used as the distance measure. We present a general method for
constructing such Gray codes. We apply the method recursively to obtain a snake
of length for permutations of ,
from a snake of length for permutations of~. Thus, we have
, improving
on the previous known ratio of . By using the general method we also present a direct construction. This
direct construction is based on necklaces and it might yield snakes of length
for permutations of . The direct
construction was applied successfully for and , and hence
.Comment: IEEE Transactions on Information Theor
- …