10,621 research outputs found
Optimal Error Correcting Delivery Scheme for Coded Caching with Symmetric Batch Prefetching
Coded caching is used to reduce network congestion during peak hours. A
single server is connected to a set of users through a bottleneck link, which
generally is assumed to be error-free. During non-peak hours, all the users
have full access to the files and they fill their local cache with portions of
the files available. During delivery phase, each user requests a file and the
server delivers coded transmissions to meet the demands taking into
consideration their cache contents. In this paper we assume that the shared
link is error prone. A new delivery scheme is required to meet the demands of
each user even after receiving finite number of transmissions in error. We
characterize the minimum average rate and minimum peak rate for this problem.
We find closed form expressions of these rates for a particular caching scheme
namely \textit{symmetric batch prefetching}. We also propose an optimal error
correcting delivery scheme for coded caching problem with symmetric batch
prefetching.Comment: 9 pages and 4 figure
Error Correction for Index Coding With Coded Side Information
Index coding is a source coding problem in which a broadcaster seeks to meet
the different demands of several users, each of whom is assumed to have some
prior information on the data held by the sender. If the sender knows its
clients' requests and their side-information sets, then the number of packet
transmissions required to satisfy all users' demands can be greatly reduced if
the data is encoded before sending. The collection of side-information indices
as well as the indices of the requested data is described as an instance of the
index coding with side-information (ICSI) problem. The encoding function is
called the index code of the instance, and the number of transmissions employed
by the code is referred to as its length. The main ICSI problem is to determine
the optimal length of an index code for and instance. As this number is hard to
compute, bounds approximating it are sought, as are algorithms to compute
efficient index codes. Two interesting generalizations of the problem that have
appeared in the literature are the subject of this work. The first of these is
the case of index coding with coded side information, in which linear
combinations of the source data are both requested by and held as users'
side-information. The second is the introduction of error-correction in the
problem, in which the broadcast channel is subject to noise.
In this paper we characterize the optimal length of a scalar or vector linear
index code with coded side information (ICCSI) over a finite field in terms of
a generalized min-rank and give bounds on this number based on constructions of
random codes for an arbitrary instance. We furthermore consider the length of
an optimal error correcting code for an instance of the ICCSI problem and
obtain bounds on this number, both for the Hamming metric and for rank-metric
errors. We describe decoding algorithms for both categories of errors
Mathematical Programming Decoding of Binary Linear Codes: Theory and Algorithms
Mathematical programming is a branch of applied mathematics and has recently
been used to derive new decoding approaches, challenging established but often
heuristic algorithms based on iterative message passing. Concepts from
mathematical programming used in the context of decoding include linear,
integer, and nonlinear programming, network flows, notions of duality as well
as matroid and polyhedral theory. This survey article reviews and categorizes
decoding methods based on mathematical programming approaches for binary linear
codes over binary-input memoryless symmetric channels.Comment: 17 pages, submitted to the IEEE Transactions on Information Theory.
Published July 201
Synchronization Strings: Explicit Constructions, Local Decoding, and Applications
This paper gives new results for synchronization strings, a powerful
combinatorial object that allows to efficiently deal with insertions and
deletions in various communication settings:
We give a deterministic, linear time synchronization string
construction, improving over an time randomized construction.
Independently of this work, a deterministic time
construction was just put on arXiv by Cheng, Li, and Wu. We also give a
deterministic linear time construction of an infinite synchronization string,
which was not known to be computable before. Both constructions are highly
explicit, i.e., the symbol can be computed in time.
This paper also introduces a generalized notion we call
long-distance synchronization strings that allow for local and very fast
decoding. In particular, only time and access to logarithmically
many symbols is required to decode any index.
We give several applications for these results:
For any we provide an insdel correcting
code with rate which can correct any fraction
of insdel errors in time. This near linear computational
efficiency is surprising given that we do not even know how to compute the
(edit) distance between the decoding input and output in sub-quadratic time. We
show that such codes can not only efficiently recover from fraction of
insdel errors but, similar to [Schulman, Zuckerman; TransInf'99], also from any
fraction of block transpositions and replications.
We show that highly explicitness and local decoding allow for
infinite channel simulations with exponentially smaller memory and decoding
time requirements. These simulations can be used to give the first near linear
time interactive coding scheme for insdel errors
On the Security of Index Coding with Side Information
Security aspects of the Index Coding with Side Information (ICSI) problem are
investigated. Building on the results of Bar-Yossef et al. (2006), the
properties of linear index codes are further explored. The notion of weak
security, considered by Bhattad and Narayanan (2005) in the context of network
coding, is generalized to block security. It is shown that the linear index
code based on a matrix , whose column space code has length ,
minimum distance and dual distance , is -block secure
(and hence also weakly secure) if the adversary knows in advance
messages, and is completely insecure if the adversary knows in advance more
than messages. Strong security is examined under the conditions that
the adversary: (i) possesses messages in advance; (ii) eavesdrops at most
transmissions; (iii) corrupts at most transmissions. We prove
that for sufficiently large , an optimal linear index code which is strongly
secure against such an adversary has length . Here
is a generalization of the min-rank over of the side
information graph for the ICSI problem in its original formulation in the work
of Bar- Yossef et al.Comment: 14 page
Parsing a sequence of qubits
We develop a theoretical framework for frame synchronization, also known as
block synchronization, in the quantum domain which makes it possible to attach
classical and quantum metadata to quantum information over a noisy channel even
when the information source and sink are frame-wise asynchronous. This
eliminates the need of frame synchronization at the hardware level and allows
for parsing qubit sequences during quantum information processing. Our
framework exploits binary constant-weight codes that are self-synchronizing.
Possible applications may include asynchronous quantum communication such as a
self-synchronizing quantum network where one can hop into the channel at any
time, catch the next coming quantum information with a label indicating the
sender, and reply by routing her quantum information with control qubits for
quantum switches all without assuming prior frame synchronization between
users.Comment: 11 pages, 2 figures, 1 table. Final accepted version for publication
in the IEEE Transactions on Information Theor
- …