Sparse Polynomial Interpolation and Berlekamp/Massey algorithms that correct Outlier Errors in Input Values
|
|
- Barbara Dean
- 5 years ago
- Views:
Transcription
1 Sparse Polynomial Interpolation and Berlekamp/Massey algorithms that correct Outlier Errors in Input Values Clément PERNET joint work with Matthew T. COMER and Erich L. KALTOFEN : LIG/INRIA-MOAIS, Grenoble Université, France : North Carolina State University, USA ISSAC 12, Grenoble, France, July 23rd, 2012
2 Outline Berlekamp/Massey algorithm with errors Bounds on the decoding capacity Decoding algorithms Sparse Polynomial Interpolation with errors Relations to Reed-Solomon decoding
3 Introduction Polynomial interpolation with errors Dense case: Reed-Solomon codes / CRT codes number of evaluation points made adaptive on error impact and degree [Khonji & Al. 10]
4 Introduction Polynomial interpolation with errors Dense case: Reed-Solomon codes / CRT codes number of evaluation points made adaptive on error impact and degree [Khonji & Al. 10] Sparse case: Present work based on Ben-Or & Tiwari s interpolation algorithm itself based on Berlekamp/Massey algorithm develop Berlekamp/Massey Algorithm with errors
5 Preliminaries Linear recurring sequences Sequence (a 0, a 1,..., a n,... ) such that t 1 j 0 a j+t = λ i a i+j generating polynomial: Λ(z) = z t t 1 i=0 λ iz i minimal generating polynomial: Λ(z) of minimal degree i=0 linear complexity of (a i ) i : the minimal degree of Λ Hamming weight: weight(x) = #{i x i 0} Hamming distance: d H (x, y) = weight(x y)
6 Berlekamp/Massey algorithm Input: (a 0,..., a n 1 ) a sequence of field elements. Result: Λ(z) = L n i=0 λ iz i a monic polynomial of minimal degree L n n such that L n i=0 λ ia i+j = 0 for j = 0,..., n L n 1. Guarantee : BMA finds Λ of degree t from 2t entries.
7 Outline Berlekamp/Massey algorithm with errors Bounds on the decoding capacity Decoding algorithms Sparse Polynomial Interpolation with errors Relations to Reed-Solomon decoding
8 Problem Statement Berlkamp/Massey with errors Suppose (a 0, a 1,... ) is linearly generated by Λ(z) of degree t where Λ(0) 0. Given (b 0, b 1,... ) = (a 0, a 1,... ) + ε, where weight(ε) E: 1. How to recover Λ(z) and (a 0, a 1,... ) 2. How many entries required for a unique solution a list of solutions including (a0, a 1,... )
9 Problem Statement Berlkamp/Massey with errors Suppose (a 0, a 1,... ) is linearly generated by Λ(z) of degree t where Λ(0) 0. Given (b 0, b 1,... ) = (a 0, a 1,... ) + ε, where weight(ε) E: 1. How to recover Λ(z) and (a 0, a 1,... ) 2. How many entries required for a unique solution a list of solutions including (a0, a 1,... ) Coding Theory formulation Let C be the set of all sequences of linear complexity t. 1. How to decode C? 2. What are the best correction capacity? for unique decoding list decoding
10 How many entries to guarantee uniqueness? Case E = 1, t = 2 (a i ) Λ(z) (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0) 2 2z 2 + z 4 + z 6 Where is the error?
11 How many entries to guarantee uniqueness? Case E = 1, t = 2 (a i ) Λ(z) (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0) 2 2z 2 + z 4 + z 6 (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0) 1 + z 2 Where is the error?
12 How many entries to guarantee uniqueness? Case E = 1, t = 2 (a i ) Λ(z) (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0) 2 2z 2 + z 4 + z 6 (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0) 1 + z 2 (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0) 1 + z 2 Where is the error?
13 How many entries to guarantee uniqueness? Case E = 1, t = 2 (a i ) Λ(z) (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0) 2 2z 2 + z 4 + z 6 (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0) 1 + z 2 (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0) 1 + z 2 Where is the error? A unique solution is not guaranteed with t = 2, E = 1 and n = 11 Is n 2t(2E + 1) a necessary condition?
14 Generalization to any E 1 t 1 times {}}{ Let 0 = ( 0,..., 0). Then s = (0, 1, 0, 1, 0, 1, 0, 1) is generated by z t 1 or z t + 1 up to E = 1 error. Then E times {}}{ ( s, s,..., s, 0, 1, 0) is generated by z t 1 or z t + 1 up to E errors. ambiguity with n = 2t(2E + 1) 1 values.
15 Generalization to any E 1 t 1 times {}}{ Let 0 = ( 0,..., 0). Then s = (0, 1, 0, 1, 0, 1, 0, 1) is generated by z t 1 or z t + 1 up to E = 1 error. Then E times {}}{ ( s, s,..., s, 0, 1, 0) is generated by z t 1 or z t + 1 up to E errors. ambiguity with n = 2t(2E + 1) 1 values. Theorem Necessary condition for unique decoding: n 2t(2E + 1)
16 The Majority Rule Berlekamp/Massey algorithm 2t E=2 n=2t(2e+1) Λ Λ Λ Λ Λ
17 The Majority Rule Berlekamp/Massey algorithm 2t E=2 n=2t(2e+1) Λ Λ Λ Λ Λ Input: (a 0,..., a n 1 ) + ε, where n = 2t(2E + 1), weight(ε) E, and (a 0,..., a n 1 ) minimally generated by Λ of degree t, where Λ(0) 0. Output: Λ(z) and (a 0,..., a n 1 ). 1 begin 2 Run BMA on 2E + 1 segments of 2t entries and record Λ i (z) on each segment; 3 Perform majority vote to find Λ(z);
18 The Majority Rule Berlekamp/Massey algorithm 2t E=2 n=2t(2e+1) Λ Λ Λ Λ Λ Input: (a 0,..., a n 1 ) + ε, where n = 2t(2E + 1), weight(ε) E, and (a 0,..., a n 1 ) minimally generated by Λ of degree t, where Λ(0) 0. Output: Λ(z) and (a 0,..., a n 1 ). 1 begin 2 Run BMA on 2E + 1 segments of 2t entries and record Λ i (z) on each segment; 3 Perform majority vote to find Λ(z); 4 Use a clean segment to clean-up the sequence ; 5 return Λ(z) and (a 0, a 1,... );
19 Algorithm SequenceCleanUp Input: Λ(z) = z t + t 1 i=0 λ ix i where Λ(0) 0 Input: (a 0,..., a n 1 ), where n t + 1 Input: E, the maximum number of corrections to make Input: k, such that (a k, a k+2t 1 ) is clean Output: (b 0,..., b n 1 ) generated by Λ at distance E to (a 0,..., a n 1 )
20 Algorithm SequenceCleanUp Input: Λ(z) = z t + t 1 i=0 λ ix i where Λ(0) 0 Input: (a 0,..., a n 1 ), where n t + 1 Input: E, the maximum number of corrections to make Input: k, such that (a k, a k+2t 1 ) is clean Output: (b 0,..., b n 1 ) generated by Λ at distance E to (a 0,..., a n 1 ) 1 begin 2 (b 0,..., b n 1 ) (a 0,..., a n 1 ); e, j 0; 3 i k + 2t; 4 while i n 1 and e E do 5 if Λ does not satisfy (b i t+1,..., b i ) then 6 Fix b i using Λ(z) as a LFSR; e e + 1; 11 return (b 0,..., b n 1 ), e
21 Algorithm SequenceCleanUp Input: Λ(z) = z t + t 1 i=0 λ ix i where Λ(0) 0 Input: (a 0,..., a n 1 ), where n t + 1 Input: E, the maximum number of corrections to make Input: k, such that (a k, a k+2t 1 ) is clean Output: (b 0,..., b n 1 ) generated by Λ at distance E to (a 0,..., a n 1 ) 1 begin 2 (b 0,..., b n 1 ) (a 0,..., a n 1 ); e, j 0; 3 i k + 2t; 4 while i n 1 and e E do 5 if Λ does not satisfy (b i t+1,..., b i ) then 6 Fix b i using Λ(z) as a LFSR; e e + 1; 7 i k 1; 8 while i 0 and e E do 9 if Λ does not satisfy (b i,..., b i+t 1 ) then 10 Fix b i using z t Λ(1/z) as a LFSR; e e + 1; 11 return (b 0,..., b n 1 ), e
22 Algorithm SequenceCleanUp Input: Λ(z) = z t + t 1 i=0 λ ix i where Λ(0) 0 Input: (a 0,..., a n 1 ), where n t + 1 Input: E, the maximum number of corrections to make Input: k, such that (a k, a k+2t 1 ) is clean Output: (b 0,..., b n 1 ) generated by Λ at distance E to (a 0,..., a n 1 ) 1 begin 2 (b 0,..., b n 1 ) (a 0,..., a n 1 ); e, j 0; 3 i k + 2t; 4 while i n 1 and e E do 5 if Λ does not satisfy (b i t+1,..., b i ) then 6 Fix b i using Λ(z) as a LFSR; e e + 1; 7 i k 1; 8 while i 0 and e E do 9 if Λ does not satisfy (b i,..., b i+t 1 ) then 10 Fix b i using z t Λ(1/z) as a LFSR; e e + 1; 11 return (b 0,..., b n 1 ), e
23 Finding a clean segment: case E = 1 only one error (a 0,..., a k 2, b k 1 a k 1, a k, a k+1, a 2t 1 ) will be identified by the majority vote (2-to-1 majority).
24 Finding a clean segment: case E 2 Multiple errors on one segment can still be generated by Λ(z) deceptive segments: not good for SequenceCleanUp Example E = 3: (0, 1, 0, 2, 0, 4, 0, 8,... ) Λ(z) = z 2 2
25 Finding a clean segment: case E 2 Multiple errors on one segment can still be generated by Λ(z) deceptive segments: not good for SequenceCleanUp Example E = 3: (0, 1, 0, 2, 0, 4, 0, 8,... ) Λ(z) = z 2 2 (1, 1, 2, 2, 4, 4, 0, 8, 0, 16, 0, 32,... )
26 Finding a clean segment: case E 2 Multiple errors on one segment can still be generated by Λ(z) deceptive segments: not good for SequenceCleanUp Example E = 3: (0, 1, 0, 2, 0, 4, 0, 8,... ) Λ(z) = z 2 2 ( 1, 1, 2, 2, 4, 4, 0, 8, 0, 16, 0, 32,... ) }{{}}{{}}{{} z 2 2 z 2 +2z 2 z 2 2
27 Finding a clean segment: case E 2 Multiple errors on one segment can still be generated by Λ(z) deceptive segments: not good for SequenceCleanUp Example E = 3: (0, 1, 0, 2, 0, 4, 0, 8,... ) Λ(z) = z 2 2 ( 1, 1, 2, 2, 4, 4, 0, 8, 0, 16, 0, 32,... ) }{{}}{{}}{{} z 2 2 z 2 +2z 2 z 2 2 (1, 1, 2, 2) is deceptive. Applying SequenceCleanUp with this clean segment produces (1, 1, 2, 2, 4, 4, 8, 8, 16, 16, 32, 32, 64,... )
28 Finding a clean segment: case E 2 Multiple errors on one segment can still be generated by Λ(z) deceptive segments: not good for SequenceCleanUp Example E = 3: (0, 1, 0, 2, 0, 4, 0, 8,... ) Λ(z) = z 2 2 ( 1, 1, 2, 2, 4, 4, 0, 8, 0, 16, 0, 32,... ) }{{}}{{}}{{} z 2 2 z 2 +2z 2 z 2 2 (1, 1, 2, 2) is deceptive. Applying SequenceCleanUp with this clean segment produces (1, 1, 2, 2, 4, 4, 8, 8, 16, 16, 32, 32, 64,... ) E > 3? contradiction. Try (0, 16, 0, 32) as a clean segment instead.
29 Success of the sequence clean-up Theorem If n t(2e + 1), then a deceptive segment will necessarily be exposed by a failure of the condition e E in algorithm SequenceCleanUp.
30 Success of the sequence clean-up Theorem If n t(2e + 1), then a deceptive segment will necessarily be exposed by a failure of the condition e E in algorithm SequenceCleanUp. Corollary n 2t(2E + 1) is a necessary and sufficient condition for unique decoding of Λ and the corresponding sequence. Remark Also works with an upper bound t T on deg Λ.
31 List decoding for n 2t(E + 1) 2t E=2 n=2t(e+1) Λ Λ Λ 1 2 3
32 List decoding for n 2t(E + 1) 2t E=2 n=2t(e+1) Λ Λ Λ Input: (a 0,..., a n 1 ) + ε, where n = 2t(E + 1), weight(ε) E, and (a 0,..., a n 1 ) minimally generated by Λ of degree t, where Λ(0) 0. Output: (Λ i (z), s i = (a (i) 0,..., a(i) n 1 )) i a list of E candidates 1 begin 2 Run BMA on E + 1 segments of 2t entries and record Λ i (z) on each segment;
33 List decoding for n 2t(E + 1) 2t E=2 n=2t(e+1) Λ Λ Λ Input: (a 0,..., a n 1 ) + ε, where n = 2t(E + 1), weight(ε) E, and (a 0,..., a n 1 ) minimally generated by Λ of degree t, where Λ(0) 0. Output: (Λ i (z), s i = (a (i) 0,..., a(i) n 1 )) i a list of E candidates 1 begin 2 Run BMA on E + 1 segments of 2t entries and record Λ i (z) on each segment; 3 foreach Λ i (z) do 4 Use a clean segment to clean-up the sequence; 5 Withdraw Λ i if no clean segment can be found. 6 return the list (Λ i (z), (a (i) 0,..., a(i) n 1 )) i;
34 Properties The list contains the right solution (Λ, (a 0,..., a n 1 ))
35 Properties The list contains the right solution (Λ, (a 0,..., a n 1 )) n 2t(E + 1) is the tightest bound to enable syndrome decoding (BMA on a clean sequence of length 2t). Example n = 2t(E + 1) 1 and ε = (0,..., 0, 1, 0,..., 0, 1..., 1, 0,..., 0). }{{}}{{}}{{} 2t 1 2t 1 2t 1 Then (a 0,..., a n 1 ) + ε has no length 2t clean segment.
36 Outline Berlekamp/Massey algorithm with errors Bounds on the decoding capacity Decoding algorithms Sparse Polynomial Interpolation with errors Relations to Reed-Solomon decoding
37 Sparse Polynomial Interpolation x F f (x) Problem f = t i=1 c ix e i Recover a t-sparse polynomial f given a black-box computing evaluations of it.
38 Sparse Polynomial Interpolation x F f (x) Problem f = t i=1 c ix e i Recover a t-sparse polynomial f given a black-box computing evaluations of it. Ben-Or/Tiwari 1988: Let a i = f (p i ) for p a field element, and let Λ(λ) = t i=1 (z pe i ). Then Λ(λ) is the minimal generator of (a 0, a 1,... ). only need 2t entries to find Λ(λ) (using BMA)
39 Sparse Polynomial Interpolation x F f (x)+ε Problem f = t i=1 c ix e i Recover a t-sparse polynomial f given a black-box computing evaluations of it. Ben-Or/Tiwari 1988: Let a i = f (p i ) for p a field element, and let Λ(λ) = t i=1 (z pe i ). Then Λ(λ) is the minimal generator of (a 0, a 1,... ). only need 2t entries to find Λ(λ) (using BMA) only need 2T(2E + 1) with e E errors and t T.
40 Ben-Or & Tiwari s Algorithm Input: (a 0,..., a 2t 1 ) where a i = f (p i ) Input: t, the numvber of (non-zero) terms of f (x) = t j=1 c jx e j Output: f (x) 1 begin 2 Run BMA on (a 0,..., a 2t 1 ) to find Λ(z) 3 Find roots of Λ(z) (polynomial factorization) 4 Recover e j by repeated division (by p) 5 Recover c j by solving the transposed Vandermonde system (p 0 ) e 1 (p 0 ) e 2... (p 0 ) et c 1 (p 1 ) e 1 (p 1 ) e 2... (p 1 ) et c = (p t ) e 1 (p t ) e 2... (p t ) et c t a 0 a 1. a t 1
41 Outline Berlekamp/Massey algorithm with errors Bounds on the decoding capacity Decoding algorithms Sparse Polynomial Interpolation with errors Relations to Reed-Solomon decoding
42 Blahut s theorem Theorem (Blahut) The D.F.T of a vector of weight t has linear complexity at most t DFT ω (v) Vandemonde(ω 0, ω 1, ω 2,... )v Eval ω 0,ω 1,ω 2,...(v)
43 Blahut s theorem Theorem (Blahut) The D.F.T of a vector of weight t has linear complexity at most t DFT ω (v) Vandemonde(ω 0, ω 1, ω 2,... )v Eval ω 0,ω 1,ω 2,...(v) Univariate Ben-Or & Tiwari as a corollary
44 Blahut s theorem Theorem (Blahut) The D.F.T of a vector of weight t has linear complexity at most t DFT ω (v) Vandemonde(ω 0, ω 1, ω 2,... )v Eval ω 0,ω 1,ω 2,...(v) Univariate Ben-Or & Tiwari as a corollary Reed-Solomon codes: evaluation of a sparse error BMA
45 Reed-Solomon codes as Evaluation codes C = {(f (ω 1 ),..., f (ω n )) deg f < k} Evaluation f m=f(x), deg f < k 0 c = Eval(f), c = f(w i i ) error ε g g = f + Interp ( ε) Interpolation y = c + ε g
46 Reed-Solomon codes as Evaluation codes C = {(f (ω 1 ),..., f (ω n )) deg f < k} Evaluation f m=f(x), deg f < k 0 c = Eval(f), c i = f(w i ) error ε g g = f + Interp ( ε) BMA Interpolation y = c + ε f
47 Sparse interpolation with errors Find f from (f (w 1 ),..., f (w n )) + ε Interpolation error ε ε 0 c = Interp ( ε ) sparse polynomial f g g = Eval (f) + ε Evaluation y = c + f f
48 Sparse interpolation with errors Find f from (f (w 1 ),..., f (w n )) + ε Interpolation error ε ε 0 c = Interp ( ε ) sparse polynomial f g g = Eval (f) + ε Evaluation BMA y = c + f f
49 Same problems? Interchanging Evaluation and Interpolation Let V ω = Vandermonde(ω, ω 2,..., ω n ). Then (V ω ) 1 = 1 n V ω 1 Given g, find f, t-sparse and an error ε such that g = V ω f + ε V ω 1g = nf + V ω 1ɛ
50 Same problems? Interchanging Evaluation and Interpolation Let V ω = Vandermonde(ω, ω 2,..., ω n ). Then (V ω ) 1 = 1 n V ω 1 Given g, find f, t-sparse and an error ε such that g = V ω f + ε V ω 1g = nf }{{} + V ω 1ɛ }{{} weight t error RS code word Reed-Solomon decoding: unique solution provided ε has 2t consecutive trailing 0 s clean segment of length 2t n 2t(E + 1)
51 Same problems? Interchanging Evaluation and Interpolation Let V ω = Vandermonde(ω, ω 2,..., ω n ). Then (V ω ) 1 = 1 n V ω 1 Given g, find f, t-sparse and an error ε such that g = V ω f + ε V ω 1g = nf }{{} + V ω 1ɛ }{{} weight t error RS code word Reed-Solomon decoding: unique solution provided ε has 2t consecutive trailing 0 s clean segment of length 2t n 2t(E + 1) BUT: location of the syndrome, is a priori unknown no uniqueness
52 Applications and Perspectives Sparse interpolation with noise and outliers [Giesbrecht, Labahn &Lee 06] [Kaltofen, Lee, Yang 11]: Termination criteria for BMA: Exact singularity illconditionnedness Now combined with outliers
53 Applications and Perspectives Sparse interpolation with noise and outliers [Giesbrecht, Labahn &Lee 06] [Kaltofen, Lee, Yang 11]: Termination criteria for BMA: Perspectives: Exact singularity illconditionnedness Now combined with outliers surprising impact of noise on the sparsity: does not degenerate to dense
54 Applications and Perspectives Sparse interpolation with noise and outliers [Giesbrecht, Labahn &Lee 06] [Kaltofen, Lee, Yang 11]: Termination criteria for BMA: Perspectives: Exact singularity illconditionnedness Now combined with outliers surprising impact of noise on the sparsity: does not degenerate to dense Sparse rational function reconstruction with errors: dense case: Berlekamp/Welsh decoding and Padé approximant fit well together. sparse case?
55 Applications and Perspectives Sparse interpolation with noise and outliers [Giesbrecht, Labahn &Lee 06] [Kaltofen, Lee, Yang 11]: Termination criteria for BMA: Perspectives: Exact singularity illconditionnedness Now combined with outliers surprising impact of noise on the sparsity: does not degenerate to dense Sparse rational function reconstruction with errors: dense case: Berlekamp/Welsh decoding and Padé approximant fit well together. sparse case? application to k-error linear complexity (symmetric crypto)...
Adaptive decoding for dense and sparse evaluation/interpolation codes
Adaptive decoding for dense and sparse evaluation/interpolation codes Clément PERNET INRIA/LIG-MOAIS, Grenoble Université joint work with M. Comer, E. Kaltofen, J-L. Roch, T. Roche Séminaire Calcul formel
More informationCryptographic Engineering
Cryptographic Engineering Clément PERNET M2 Cyber Security, UFR-IM 2 AG, Univ. Grenoble-Alpes ENSIMAG, Grenoble INP Outline Coding Theory Introduction Linear Codes Reed-Solomon codes Application: Mc Eliece
More informationFast algorithms for factoring polynomials A selection. Erich Kaltofen North Carolina State University google->kaltofen google->han lu
Fast algorithms for factoring polynomials A selection Erich Kaltofen North Carolina State University google->kaltofen google->han lu Overview of my work 1 Theorem. Factorization in K[x] is undecidable
More informationComputing over Z, Q, K[X]
Computing over Z, Q, K[X] Clément PERNET M2-MIA Calcul Exact Outline Introduction Chinese Remainder Theorem Rational reconstruction Problem Statement Algorithms Applications Dense CRT codes Extension to
More information4F5: Advanced Communications and Coding
4F5: Advanced Communications and Coding Coding Handout 4: Reed Solomon Codes Jossy Sayir Signal Processing and Communications Lab Department of Engineering University of Cambridge jossy.sayir@eng.cam.ac.uk
More informationOutput-sensitive algorithms for sumset and sparse polynomial multiplication
Output-sensitive algorithms for sumset and sparse polynomial multiplication Andrew Arnold Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, Canada Daniel S. Roche Computer Science
More informationFast Estimates of Hankel Matrix Condition Numbers and Numeric Sparse Interpolation*
Fast Estimates of Hankel Matrix Condition Numbers and Numeric Sparse Interpolation* Erich L Kaltofen Department of Mathematics North Carolina State University Raleigh, NC 769-80, USA kaltofen@mathncsuedu
More informationSolving Sparse Rational Linear Systems. Pascal Giorgi. University of Waterloo (Canada) / University of Perpignan (France) joint work with
Solving Sparse Rational Linear Systems Pascal Giorgi University of Waterloo (Canada) / University of Perpignan (France) joint work with A. Storjohann, M. Giesbrecht (University of Waterloo), W. Eberly
More informationJournal of Symbolic Computation. On the Berlekamp/Massey algorithm and counting singular Hankel matrices over a finite field
Journal of Symbolic Computation 47 (2012) 480 491 Contents lists available at SciVerse ScienceDirect Journal of Symbolic Computation journal homepage: wwwelseviercom/locate/jsc On the Berlekamp/Massey
More informationOn the Berlekamp/Massey Algorithm and Counting Singular Hankel Matrices over a Finite Field
On the Berlekamp/Massey Algorithm and Counting Singular Hankel Matrices over a Finite Field Matthew T Comer Dept of Mathematics, North Carolina State University Raleigh, North Carolina, 27695-8205 USA
More informationSkew cyclic codes: Hamming distance and decoding algorithms 1
Skew cyclic codes: Hamming distance and decoding algorithms 1 J. Gómez-Torrecillas, F. J. Lobillo, G. Navarro Department of Algebra and CITIC, University of Granada Department of Computer Sciences and
More informationBerlekamp-Massey decoding of RS code
IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture
More informationOn the use of polynomial matrix approximant in the block Wiedemann algorithm
On the use of polynomial matrix approximant in the block Wiedemann algorithm ECOLE NORMALE SUPERIEURE DE LYON Laboratoire LIP, ENS Lyon, France Pascal Giorgi Symbolic Computation Group, School of Computer
More informationParallel Sparse Polynomial Interpolation over Finite Fields
Parallel Sparse Polynomial Interpolation over Finite Fields Seyed Mohammad Mahdi Javadi School of Computing Science, Simon Fraser University, Burnaby, B.C. Canada Michael Monagan Department of Mathematics,
More informationFast algorithms for multivariate interpolation problems
Fast algorithms for multivariate interpolation problems Vincent Neiger,, Claude-Pierre Jeannerod Éric Schost Gilles Villard AriC, LIP, École Normale Supérieure de Lyon, France ORCCA, Computer Science Department,
More informationComputing minimal interpolation bases
Computing minimal interpolation bases Vincent Neiger,, Claude-Pierre Jeannerod Éric Schost Gilles Villard AriC, LIP, École Normale Supérieure de Lyon, France University of Waterloo, Ontario, Canada Supported
More informationA Fraction Free Matrix Berlekamp/Massey Algorithm*
Linear Algebra and Applications, 439(9):2515-2526, November 2013. A Fraction Free Matrix Berlekamp/Massey Algorithm* Erich Kaltofen and George Yuhasz Dept. of Mathematics, North Carolina State University,
More informationDoubleSparseCompressedSensingProblem 1
Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 181 185 DoubleSparseCompressedSensingProblem 1 Grigory
More informationThe Seven Dwarfs of Symbolic Computation and the Discovery of Reduced Symbolic Models. Erich Kaltofen North Carolina State University google->kaltofen
The Seven Dwarfs of Symbolic Computation and the Discovery of Reduced Symbolic Models Erich Kaltofen North Carolina State University google->kaltofen Outline 2 The 7 Dwarfs of Symbolic Computation Discovery
More informationAn algebraic perspective on integer sparse recovery
An algebraic perspective on integer sparse recovery Lenny Fukshansky Claremont McKenna College (joint work with Deanna Needell and Benny Sudakov) Combinatorics Seminar USC October 31, 2018 From Wikipedia:
More informationOn Irreducible Polynomial Remainder Codes
2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering
More informationOn Exact and Approximate Interpolation of Sparse Rational Functions*
On Exact and Approximate Interpolation of Sparse Rational Functions* ABSTRACT Erich Kaltofen Department of Mathematics North Carolina State University Raleigh, North Carolina 27695-8205, USA kaltofen@math.ncsu.edu
More informationA fast parallel sparse polynomial GCD algorithm.
A fast parallel sparse polynomial GCD algorithm. Jiaxiong Hu and Michael Monagan Department of Mathematics, Simon Fraser University Abstract We present a parallel GCD algorithm for sparse multivariate
More informationAn Introduction to (Network) Coding Theory
An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network
More informationCompressed Sensing and Linear Codes over Real Numbers
Compressed Sensing and Linear Codes over Real Numbers Henry D. Pfister (joint with Fan Zhang) Texas A&M University College Station Information Theory and Applications Workshop UC San Diego January 31st,
More informationCoding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May
Coding Theory Ruud Pellikaan g.r.pellikaan@tue.nl MasterMath 2MMC30 /k Lecture 11.1 May 12-2016 Content lecture 11 2/31 In Lecture 8.2 we introduced the Key equation Now we introduce two algorithms which
More informationAn Introduction to (Network) Coding Theory
An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history
More informationLecture 3: Error Correcting Codes
CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error
More informationarxiv: v2 [cs.sc] 22 Jun 2017
Sparse Polynomial Interpolation with Finitely Many Values for the Coefficients arxiv:1704.04359v [cs.sc] Jun 017 Qiaolong Huang and Xiao-Shan Gao KLMM, UCAS, Academy of Mathematics and Systems Science
More informationApproximation theory
Approximation theory Xiaojing Ye, Math & Stat, Georgia State University Spring 2019 Numerical Analysis II Xiaojing Ye, Math & Stat, Georgia State University 1 1 1.3 6 8.8 2 3.5 7 10.1 Least 3squares 4.2
More informationfor some error exponent E( R) as a function R,
. Capacity-achieving codes via Forney concatenation Shannon s Noisy Channel Theorem assures us the existence of capacity-achieving codes. However, exhaustive search for the code has double-exponential
More informationAn Alternative Decoding Method for Gabidulin Codes in Characteristic Zero
An Alternative Decoding Method for Gabidulin Codes in Characteristic Zero Sven Müelich, Sven Puchinger, David Mödinger, Martin Bossert Institute of Communications Engineering, Ulm University, Germany IEEE
More informationDecoding linear codes via systems solving: complexity issues and generalized Newton identities
Decoding linear codes via systems solving: complexity issues and generalized Newton identities Stanislav Bulygin (joint work with Ruud Pellikaan) University of Valladolid Valladolid, Spain March 14, 2008
More informationDecoding linear codes via systems solving: complexity issues
Decoding linear codes via systems solving: complexity issues Stanislav Bulygin (joint work with Ruud Pellikaan) University of Kaiserslautern June 19, 2008 Outline Outline of the talk Introduction: codes
More informationBinary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction
BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The
More informationBounding the number of affine roots
with applications in reliable and secure communication Inaugural Lecture, Aalborg University, August 11110, 11111100000 with applications in reliable and secure communication Polynomials: F (X ) = 2X 2
More informationAlgebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.
Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,
More informationError Detection, Correction and Erasure Codes for Implementation in a Cluster File-system
Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system Steve Baker December 6, 2011 Abstract. The evaluation of various error detection and correction algorithms and
More informationCombining geometry and combinatorics
Combining geometry and combinatorics A unified approach to sparse signal recovery Anna C. Gilbert University of Michigan joint work with R. Berinde (MIT), P. Indyk (MIT), H. Karloff (AT&T), M. Strauss
More informationSection 3 Error Correcting Codes (ECC): Fundamentals
Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter
More informationPART II: Research Proposal Algorithms for the Simplification of Algebraic Formulae
Form 101 Part II 6 Monagan, 195283 PART II: Research Proposal Algorithms for the Simplification of Algebraic Formulae 1 Research Area Computer algebra (CA) or symbolic computation, as my field is known
More informationFraction-free Row Reduction of Matrices of Skew Polynomials
Fraction-free Row Reduction of Matrices of Skew Polynomials Bernhard Beckermann Laboratoire d Analyse Numérique et d Optimisation Université des Sciences et Technologies de Lille France bbecker@ano.univ-lille1.fr
More informationFast computation of minimal interpolation bases in Popov form for arbitrary shifts
Fast computation of minimal interpolation bases in Popov form for arbitrary shifts ABSTRACT Claude-Pierre Jeannerod Inria, Université de Lyon Laboratoire LIP (CNRS, Inria, ENSL, UCBL) Éric Schost University
More informationOn Sparsity, Redundancy and Quality of Frame Representations
On Sparsity, Redundancy and Quality of Frame Representations Mehmet Açaaya Division of Engineering and Applied Sciences Harvard University Cambridge, MA Email: acaaya@fasharvardedu Vahid Taroh Division
More informationTowards High Performance Multivariate Factorization. Michael Monagan. This is joint work with Baris Tuncer.
Towards High Performance Multivariate Factorization Michael Monagan Center for Experimental and Constructive Mathematics Simon Fraser University British Columbia This is joint work with Baris Tuncer. The
More informationBon anniversaire Marc!
Bon anniversaire Marc! The full counting function of Gessel walks is algebraic Alin Bostan (INRIA) joint work with Manuel Kauers (INRIA/RISC) Journées GECKO/TERA 2008 Context: restricted lattice walks
More informationCode-Based Cryptography Error-Correcting Codes and Cryptography
Code-Based Cryptography Error-Correcting Codes and Cryptography I. Márquez-Corbella 0 1. Error-Correcting Codes and Cryptography 1. Introduction I - Cryptography 2. Introduction II - Coding Theory 3. Encoding
More informationA generalized Prony method for sparse approximation
A generalized Prony method for sparse approximation Gerlind Plonka and Thomas Peter Institute for Numerical and Applied Mathematics University of Göttingen Dolomites Research Week on Approximation September
More informationHigh Performance and Reliable Algebraic Computing
High Performance and Reliable Algebraic Computing Soutenance d habilitation à diriger des recherches Clément Pernet Université Joseph Fourier (Grenoble 1) November 25, 2014 Rapporteurs : Daniel Augot,
More information22m:033 Notes: 7.1 Diagonalization of Symmetric Matrices
m:33 Notes: 7. Diagonalization of Symmetric Matrices Dennis Roseman University of Iowa Iowa City, IA http://www.math.uiowa.edu/ roseman May 3, Symmetric matrices Definition. A symmetric matrix is a matrix
More informationList decoding of binary Goppa codes and key reduction for McEliece s cryptosystem
List decoding of binary Goppa codes and key reduction for McEliece s cryptosystem Morgan Barbier morgan.barbier@lix.polytechnique.fr École Polytechnique INRIA Saclay - Île de France 14 April 2011 University
More informationOn Stream Ciphers with Small State
ESC 2017, Canach, January 16. On Stream Ciphers with Small State Willi Meier joint work with Matthias Hamann, Matthias Krause (University of Mannheim) Bin Zhang (Chinese Academy of Sciences, Beijing) 1
More informationExtended Subspace Error Localization for Rate-Adaptive Distributed Source Coding
Introduction Error Correction Extended Subspace Simulation Extended Subspace Error Localization for Rate-Adaptive Distributed Source Coding Mojtaba Vaezi and Fabrice Labeau McGill University International
More informationProgressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes
Progressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes Li Chen ( 陈立 ), PhD, MIEEE Associate Professor, School of Information Science and Technology Sun Yat-sen University, China Joint work
More informationABSTRACT. YUHASZ, GEORGE L. Berlekamp/Massey Algorithms for Linearly Generated Matrix Sequences. (Under the direction of Professor Erich Kaltofen.
ABSTRACT YUHASZ, GEORGE L. Berlekamp/Massey Algorithms for Linearly Generated Matrix Sequences. (Under the direction of Professor Erich Kaltofen.) The Berlekamp/Massey algorithm computes the unique minimal
More informationWhy solve integer linear systems exactly? David Saunders - U of Delaware
NSF CDI, 2007Oct30 1 Why solve integer linear systems exactly?... an enabling tool for discovery and innovation? David Saunders - U of Delaware LinBox library at linalg.org NSF CDI, 2007Oct30 2 LinBoxers
More informationOn Syndrome Decoding of Chinese Remainder Codes
On Syndrome Decoding of Chinese Remainder Codes Wenhui Li Institute of, June 16, 2012 Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2012) Pomorie, Bulgaria Wenhui
More informationNumerical decoding, Johnson-Lindenstrauss transforms, and linear codes
Clemson University TigerPrints All Dissertations Dissertations 12-2014 Numerical decoding, Johnson-Lindenstrauss transforms, and linear codes Yue Mao Clemson University, yuem@gclemsonedu Follow this and
More informationNotes 10: List Decoding Reed-Solomon Codes and Concatenated codes
Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT
More informationList Decoding of Binary Goppa Codes up to the Binary Johnson Bound
List Decoding of Binary Goppa Codes up to the Binary Johnson Bound Daniel Augot Morgan Barbier Alain Couvreur École Polytechnique INRIA Saclay - Île de France ITW 2011 - Paraty Augot - Barbier - Couvreur
More informationLecture 5: Ideals of Points
Lecture 5: Ideals of Points The Vanishing Lecture Martin Kreuzer Fakultät für Informatik und Mathematik Universität Passau martin.kreuzer@ uni-passau.de Sophus Lie Center Nordfjordeid June 18, 2009 1 Contents
More informationAn Interpolation Algorithm for List Decoding of Reed-Solomon Codes
An Interpolation Algorithm for List Decoding of Reed-Solomon Codes Kwankyu Lee Department of Mathematics San Diego State University San Diego, USA Email: kwankyu@sogangackr Michael E O Sullivan Department
More informationAn Algorithm for Approximate Factorization of Bivariate Polynomials 1)
MM Research Preprints, 402 408 MMRC, AMSS, Academia Sinica No. 22, December 2003 An Algorithm for Approximate Factorization of Bivariate Polynomials 1) Zhengfeng Yang and Lihong Zhi 2) Abstract. In this
More informationFast Polynomial Multiplication
Fast Polynomial Multiplication Marc Moreno Maza CS 9652, October 4, 2017 Plan Primitive roots of unity The discrete Fourier transform Convolution of polynomials The fast Fourier transform Fast convolution
More informationSparse Solutions of an Undetermined Linear System
1 Sparse Solutions of an Undetermined Linear System Maddullah Almerdasy New York University Tandon School of Engineering arxiv:1702.07096v1 [math.oc] 23 Feb 2017 Abstract This work proposes a research
More information: Error Correcting Codes. November 2017 Lecture 2
03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial
More informationError Correcting Codes: Combinatorics, Algorithms and Applications Spring Homework Due Monday March 23, 2009 in class
Error Correcting Codes: Combinatorics, Algorithms and Applications Spring 2009 Homework Due Monday March 23, 2009 in class You can collaborate in groups of up to 3. However, the write-ups must be done
More informationGreat Theoretical Ideas in Computer Science
15-251 Great Theoretical Ideas in Computer Science Polynomials, Lagrange, and Error-correction Lecture 23 (November 10, 2009) P(X) = X 3 X 2 + + X 1 + Definition: Recall: Fields A field F is a set together
More informationSparse analysis Lecture VII: Combining geometry and combinatorics, sparse matrices for sparse signal recovery
Sparse analysis Lecture VII: Combining geometry and combinatorics, sparse matrices for sparse signal recovery Anna C. Gilbert Department of Mathematics University of Michigan Sparse signal recovery measurements:
More informationGeneral error locator polynomials for nth-root codes
General error locator polynomials for nth-root codes Marta Giorgetti 1 and Massimiliano Sala 2 1 Department of Mathematics, University of Milano, Italy 2 Boole Centre for Research in Informatics, UCC Cork,
More informationOptimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction
Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes
More informationCME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 6
CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 6 GENE H GOLUB Issues with Floating-point Arithmetic We conclude our discussion of floating-point arithmetic by highlighting two issues that frequently
More informationFast Multivariate Power Series Multiplication in Characteristic Zero
Fast Multivariate Power Series Multiplication in Characteristic Zero Grégoire Lecerf and Éric Schost Laboratoire GAGE, École polytechnique 91128 Palaiseau, France E-mail: lecerf,schost@gage.polytechnique.fr
More informationSequences, DFT and Resistance against Fast Algebraic Attacks
Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca
More informationReed-Solomon codes. Chapter Linear codes over finite fields
Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime
More informationGeneralized Reed-Solomon Codes
Chapter 5 Generalized Reed-Solomon Codes In 1960, I.S. Reed and G. Solomon introduced a family of error-correcting codes that are douly lessed. The codes and their generalizations are useful in practice,
More informationSymbolic-Numeric Sparse Interpolation of Multivariate Polynomials
Symbolic-Numeric Sparse Inerpolaion o Mulivariae Polynomials Mark Giesbrech George Labahn Wen-shin Lee School o Compuer Science Universiy o Waerloo Approimae inerpolaion o polynomials Suppose we can sample
More informationORIE 6300 Mathematical Programming I August 25, Recitation 1
ORIE 6300 Mathematical Programming I August 25, 2016 Lecturer: Calvin Wylie Recitation 1 Scribe: Mateo Díaz 1 Linear Algebra Review 1 1.1 Independence, Spanning, and Dimension Definition 1 A (usually infinite)
More informationInterpolation and Polynomial Approximation I
Interpolation and Polynomial Approximation I If f (n) (x), n are available, Taylor polynomial is an approximation: f (x) = f (x 0 )+f (x 0 )(x x 0 )+ 1 2! f (x 0 )(x x 0 ) 2 + Example: e x = 1 + x 1! +
More informationWeakly Secure Data Exchange with Generalized Reed Solomon Codes
Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,
More informationTowards High Performance Multivariate Factorization. Michael Monagan. This is joint work with Baris Tuncer.
Towards High Performance Multivariate Factorization Michael Monagan Center for Experimental and Constructive Mathematics Simon Fraser University British Columbia This is joint work with Baris Tuncer. To
More informationCoding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013
Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved
More informationChapter 6. BCH Codes
Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight
More informationRobust Principal Component Analysis
ELE 538B: Mathematics of High-Dimensional Data Robust Principal Component Analysis Yuxin Chen Princeton University, Fall 2018 Disentangling sparse and low-rank matrices Suppose we are given a matrix M
More informationEfficient Algorithms for Order Bases Computation
Efficient Algorithms for Order Bases Computation Wei Zhou and George Labahn Cheriton School of Computer Science University of Waterloo, Waterloo, Ontario, Canada Abstract In this paper we present two algorithms
More informationComputing Error Distance of Reed-Solomon Codes
Computing Error Distance of Reed-Solomon Codes Guizhen Zhu Institute For Advanced Study Tsinghua University, Beijing, 100084, PR China Email:zhugz08@mailstsinghuaeducn Daqing Wan Department of Mathematics
More informationLecture 12: November 6, 2017
Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and
More informationLecture 12: Reed-Solomon Codes
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 007) Lecture 1: Reed-Solomon Codes September 8, 007 Lecturer: Atri Rudra Scribe: Michel Kulhandjian Last lecture we saw the proof
More informationGreedy Signal Recovery and Uniform Uncertainty Principles
Greedy Signal Recovery and Uniform Uncertainty Principles SPIE - IE 2008 Deanna Needell Joint work with Roman Vershynin UC Davis, January 2008 Greedy Signal Recovery and Uniform Uncertainty Principles
More information(a) II and III (b) I (c) I and III (d) I and II and III (e) None are true.
1 Which of the following statements is always true? I The null space of an m n matrix is a subspace of R m II If the set B = {v 1,, v n } spans a vector space V and dimv = n, then B is a basis for V III
More informationCover Page. The handle holds various files of this Leiden University dissertation
Cover Page The handle http://hdl.handle.net/1887/57796 holds various files of this Leiden University dissertation Author: Mirandola, Diego Title: On products of linear error correcting codes Date: 2017-12-06
More informationFFT-based Dense Polynomial Arithmetic on Multi-cores
FFT-based Dense Polynomial Arithmetic on Multi-cores Yuzhen Xie Computer Science and Artificial Intelligence Laboratory, MIT and Marc Moreno Maza Ontario Research Centre for Computer Algebra, UWO ACA 2009,
More informationPolynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes
Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Roberta Barbi December 17, 2015 Roberta Barbi List decoding December 17, 2015 1 / 13 Codes Let F q be
More information: Error Correcting Codes. October 2017 Lecture 1
03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of
More informationError Detection & Correction
Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy
More informationLinear Algebra for Computing Gröbner Bases of Linear Recursive Multidimensional Sequences
Linear Algebra for Computing Gröbner Bases of Linear Recursive Multidimensional Sequences Jérémy Berthomieu, Brice Boyer, Jean-Charles Faugère To cite this version: Jérémy Berthomieu, Brice Boyer, Jean-Charles
More informationSPARSE POLYNOMIAL INTERPOLATION AND THE FAST EUCLIDEAN ALGORITHM
SPARSE POLYNOMIAL INTERPOLATION AND THE FAST EUCLIDEAN ALGORITHM by Soo H. Go B.Math., University of Waterloo, 2006 a Thesis submitted in partial fulfillment of the requirements for the degree of Master
More informationFast computation of normal forms of polynomial matrices
1/25 Fast computation of normal forms of polynomial matrices Vincent Neiger Inria AriC, École Normale Supérieure de Lyon, France University of Waterloo, Ontario, Canada Partially supported by the mobility
More informationOn Computably Enumerable Sets over Function Fields
On Computably Enumerable Sets over Function Fields Alexandra Shlapentokh East Carolina University Joint Meetings 2017 Atlanta January 2017 Some History Outline 1 Some History A Question and the Answer
More informationLecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012
CS 59000 CTT Current Topics in Theoretical CS Oct 4, 01 Lecturer: Elena Grigorescu Lecture 14 Scribe: Selvakumaran Vadivelmurugan 1 Introduction We introduced error-correcting codes and linear codes in
More information