6,677 research outputs found
Trajectory Codes for Flash Memory
Flash memory is well-known for its inherent asymmetry: the flash-cell charge
levels are easy to increase but are hard to decrease. In a general rewriting
model, the stored data changes its value with certain patterns. The patterns of
data updates are determined by the data structure and the application, and are
independent of the constraints imposed by the storage medium. Thus, an
appropriate coding scheme is needed so that the data changes can be updated and
stored efficiently under the storage-medium's constraints.
In this paper, we define the general rewriting problem using a graph model.
It extends many known rewriting models such as floating codes, WOM codes,
buffer codes, etc. We present a new rewriting scheme for flash memories, called
the trajectory code, for rewriting the stored data as many times as possible
without block erasures. We prove that the trajectory code is asymptotically
optimal in a wide range of scenarios.
We also present randomized rewriting codes optimized for expected performance
(given arbitrary rewriting sequences). Our rewriting codes are shown to be
asymptotically optimal.Comment: Submitted to IEEE Trans. on Inform. Theor
Black Box White Arrow
The present paper proposes a new and systematic approach to the so-called
black box group methods in computational group theory. Instead of a single
black box, we consider categories of black boxes and their morphisms. This
makes new classes of black box problems accessible. For example, we can enrich
black box groups by actions of outer automorphisms.
As an example of application of this technique, we construct Frobenius maps
on black box groups of untwisted Lie type in odd characteristic (Section 6) and
inverse-transpose automorphisms on black box groups encrypting .
One of the advantages of our approach is that it allows us to work in black
box groups over finite fields of big characteristic. Another advantage is
explanatory power of our methods; as an example, we explain Kantor's and
Kassabov's construction of an involution in black box groups encrypting .
Due to the nature of our work we also have to discuss a few methodological
issues of the black box group theory.
The paper is further development of our text "Fifty shades of black"
[arXiv:1308.2487], and repeats parts of it, but under a weaker axioms for black
box groups.Comment: arXiv admin note: substantial text overlap with arXiv:1308.248
On quadratic residue codes and hyperelliptic curves
A long standing problem has been to develop "good" binary linear codes to be
used for error-correction. This paper investigates in some detail an attack on
this problem using a connection between quadratic residue codes and
hyperelliptic curves. One question which coding theory is used to attack is:
Does there exist a c<2 such that, for all sufficiently large and all
subsets S of GF(p), we have |X_S(GF(p))| < cp?Comment: 18 pages, no figure
On self-dual double circulant codes
Self-dual double circulant codes of odd dimension are shown to be dihedral in
even characteristic and consta-dihedral in odd characteristic. Exact counting
formulae are derived for them and used to show they contain families of codes
with relative distance satisfying a modified Gilbert-Varshamov bound.Comment: 8 page
- âŠ