794 research outputs found
Boolean Functions, Projection Operators and Quantum Error Correcting Codes
This paper describes a fundamental correspondence between Boolean functions
and projection operators in Hilbert space. The correspondence is widely
applicable, and it is used in this paper to provide a common mathematical
framework for the design of both additive and non-additive quantum error
correcting codes. The new framework leads to the construction of a variety of
codes including an infinite class of codes that extend the original ((5,6,2))
code found by Rains [21]. It also extends to operator quantum error correcting
codes.Comment: Submitted to IEEE Transactions on Information Theory, October 2006,
to appear in IEEE Transactions on Information Theory, 200
A linear construction for certain Kerdock and Preparata codes
The Nordstrom-Robinson, Kerdock, and (slightly modified) Pre\- parata codes
are shown to be linear over \ZZ_4, the integers . The Kerdock and
Preparata codes are duals over \ZZ_4, and the Nordstrom-Robinson code is
self-dual. All these codes are just extended cyclic codes over \ZZ_4. This
provides a simple definition for these codes and explains why their Hamming
weight distributions are dual to each other. First- and second-order
Reed-Muller codes are also linear codes over \ZZ_4, but Hamming codes in
general are not, nor is the Golay code.Comment: 5 page
Embedded Rank Distance Codes for ISI channels
Designs for transmit alphabet constrained space-time codes naturally lead to
questions about the design of rank distance codes. Recently, diversity embedded
multi-level space-time codes for flat fading channels have been designed from
sets of binary matrices with rank distance guarantees over the binary field by
mapping them onto QAM and PSK constellations. In this paper we demonstrate that
diversity embedded space-time codes for fading Inter-Symbol Interference (ISI)
channels can be designed with provable rank distance guarantees. As a corollary
we obtain an asymptotic characterization of the fixed transmit alphabet
rate-diversity trade-off for multiple antenna fading ISI channels. The key idea
is to construct and analyze properties of binary matrices with a particular
structure induced by ISI channels.Comment: Submitted to IEEE Transactions on Information Theor
Instruction Set Architectures for Quantum Processing Units
Progress in quantum computing hardware raises questions about how these
devices can be controlled, programmed, and integrated with existing
computational workflows. We briefly describe several prominent quantum
computational models, their associated quantum processing units (QPUs), and the
adoption of these devices as accelerators within high-performance computing
systems. Emphasizing the interface to the QPU, we analyze instruction set
architectures based on reduced and complex instruction sets, i.e., RISC and
CISC architectures. We clarify the role of conventional constraints on memory
addressing and instruction widths within the quantum computing context.
Finally, we examine existing quantum computing platforms, including the D-Wave
2000Q and IBM Quantum Experience, within the context of future ISA development
and HPC needs.Comment: To be published in the proceedings in the International Super
Computing Conference 2017 publicatio
List decoding of noisy Reed-Muller-like codes
First- and second-order Reed-Muller (RM(1) and RM(2), respectively) codes are
two fundamental error-correcting codes which arise in communication as well as
in probabilistically-checkable proofs and learning. In this paper, we take the
first steps toward extending the quick randomized decoding tools of RM(1) into
the realm of quadratic binary and, equivalently, Z_4 codes. Our main
algorithmic result is an extension of the RM(1) techniques from Goldreich-Levin
and Kushilevitz-Mansour algorithms to the Hankel code, a code between RM(1) and
RM(2). That is, given signal s of length N, we find a list that is a superset
of all Hankel codewords phi with dot product to s at least (1/sqrt(k)) times
the norm of s, in time polynomial in k and log(N). We also give a new and
simple formulation of a known Kerdock code as a subcode of the Hankel code. As
a corollary, we can list-decode Kerdock, too. Also, we get a quick algorithm
for finding a sparse Kerdock approximation. That is, for k small compared with
1/sqrt{N} and for epsilon > 0, we find, in time polynomial in (k
log(N)/epsilon), a k-Kerdock-term approximation s~ to s with Euclidean error at
most the factor (1+epsilon+O(k^2/sqrt{N})) times that of the best such
approximation
Quantum Reed-Solomon Codes
After a brief introduction to both quantum computation and quantum error
correction, we show how to construct quantum error-correcting codes based on
classical BCH codes. With these codes, decoding can exploit additional
information about the position of errors. This error model - the quantum
erasure channel - is discussed. Finally, parameters of quantum BCH codes are
provided.Comment: Summary only (2 pages), for the full version see: Proceedings Applied
Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-13), Lecture
Notes in Computer Science 1719, Springer, 199
Nonintersecting Subspaces Based on Finite Alphabets
Two subspaces of a vector space are here called ``nonintersecting'' if they
meet only in the zero vector. The following problem arises in the design of
noncoherent multiple-antenna communications systems. How many pairwise
nonintersecting M_t-dimensional subspaces of an m-dimensional vector space V
over a field F can be found, if the generator matrices for the subspaces may
contain only symbols from a given finite alphabet A subseteq F? The most
important case is when F is the field of complex numbers C; then M_t is the
number of antennas. If A = F = GF(q) it is shown that the number of
nonintersecting subspaces is at most (q^m-1)/(q^{M_t}-1), and that this bound
can be attained if and only if m is divisible by M_t. Furthermore these
subspaces remain nonintersecting when ``lifted'' to the complex field. Thus the
finite field case is essentially completely solved. In the case when F = C only
the case M_t=2 is considered. It is shown that if A is a PSK-configuration,
consisting of the 2^r complex roots of unity, the number of nonintersecting
planes is at least 2^{r(m-2)} and at most 2^{r(m-1)-1} (the lower bound may in
fact be the best that can be achieved).Comment: 14 page
- …