Thermal-Management Coding for High-Performance Interconnects

Size: px
Start display at page:

Download "Thermal-Management Coding for High-Performance Interconnects"

Transcription

1 Cooling Codes Thermal-Management Coding for High-Performance Interconnects Han Mao Kiah, Nanyang Technological University, Singapore Joint work with: Yeow Meng Chee, Nanyang Technological University Tuvi Etzion, Technion, Israel Institute of Technology Alexander Vardy, University of California, San Diego

2 DSM Bus Communication Sender Receiver s are connected via wires. Each wire has two states to represent a bit of information. Problem When a wire switches state, or when there is a state transition, the wire heats up.

3 Minimizing Switching Activity Previous work focus on reducing the number of state transitions. Encoding techniques: Bus- Invert (Stan and Burleson 995) Thermal Spreading (Wang et al. 27) Information theoretic analysis (Sotiriadis et al. 23, Koch et al. 29) Sender Receiver Bus- Invert Introduces one redundant wire. Chooses to send x or its complement x so that the number of state transitions is at most n/2 for n wires.

4 Controlling Peak Temperature How? Avoiding state transitions on the hottest wires. Sender Receiver Why? To handle anomalous events. Source signals are not usually uniformly distributed.

5 Key Features of Coding Scheme Consider a bus comprising n wires. Property A(t): Every transmission does not cause state transitions on the t hottest wires. Property B(w): Every transmission causes state transitions on at most w wires. Sender Receiver Property C(e): Correct up to at most e transmission errors. n = 6 t = 2 w = 2

6 Property A(t): Every transmission does not cause state transitions on the t hottest wires. This talk Property B(w): Every transmission causes state transitions on at most w wires. Property C(e): Correct up to at most e transmission errors. Code constructions that achieve Property B(w) only - Optimal Property A(t) only Optimal redundancy Property A(t) + Property B(w) only Asymptotically optimal redundancy Adaptive coding schemes. In the full paper on arxiv, More constructions that achieve Property A(t) + Property C(e) only Property B(w) + Property C(e) only Property A(t) + Property B(w) + Property C e Nonadaptive coding schemes

7 Adaptive + Differential Coding Sender Receiver Suppose Sender wants to communicate. Codeword Codeword Buffer We change the states to. Receiver adds the current state vector to the vector in the buffer to retrieve the message. Receiver updates the buffer.

8 Differential Coding and Property B Sender Receiver Property B(w): Every transmission causes state transitions on at most w wires. A code satisfies Property B(w) if and only if Codeword Codeword wt x w for codewords x. In other words, the optimal code that satisfies Property B w is Buffer n, w = x wt x w.

9 Differential Coding and Property A Sender Receiver Property A(t): Every transmission does not cause state transitions on the t hottest wires. A code satisfies Property A(t) if and only if Codeword??????????? Codeword??????????? for all codewords x, for all subsets S of size t, x J = for all i S. Buffer This implies that x =!! t =

10 Cooling Codes Property A(t): Every transmission does not cause state transitions on the t hottest wires. Instead of vectors, we consider codesets An (6,2)-cooling code C O =,,,,,,, C P =,,,,,,, C Q =,,,,,,, C R =,,,,,,, C S =,,,,,,, C T =,,,,,,, C U =,,,,,,, C V =,,,,,,, C W =,,,,,,. An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S.

11 Cooling Codes Property A(t): Every transmission does not cause state transitions on the t hottest wires. Consider the codeset C O and S =,2. An (6,2)-cooling code C O =,,,,,,. An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S, or, x =. _`

12 Cooling Codes and Related Codes Definition An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. Coding for Stuck- At Cells for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S, or x ` =. Additional requirement: x ` = z for all patterns z of length t Cooling codes require significantly lesser redundancy Dumer (989) constructed a special class of codes for stuck- at- cells Write- Once Memories (WOM) codes Different requirement: x ` = Different requirement: S need not be a subset of size t Cooling codes can be used to construct WOM codes. Explicit Constructions of Finite- Length WOM Codes ISIT, 3 Jun Fri, 2:3pm, Room: K5

13 Upper Bound on the Code Size Sender Receiver Lemma A (n, t)- cooling code has at most 2 ghi codesets. proof Corollary Since If < there t < are n no, state an (n, transition t)- cooling on t wires, code has no information most 2 ghi is transmitted. codesets. Therefore, at most n t bits of information can be transmitted. Property A(t): Every transmission does not cause state transitions on the t hottest wires.

14 Lower Bound on the Code Size Sender Receiver Lemma A (n, t)- cooling code has at most 2 ghi codesets. Theorem If t + n/2, there is an (n, t)- cooling code of size at least 2 ghiho codesets. In other words, construction is optimal in terms of redundancy. Property A(t): Every transmission does not cause state transitions on the t hottest wires.

15 Spreads and Partial Spreads A partial τ- spread of F P g is a collection of τ- dimensional subspaces V O, V P,, V Z of F P g such that V J V ] = {} for all i j. If V J = F P g, then V O, V P,, V Z is called a τ- spread. A 3-spread of F P T V O = span,,, V P = span,,, V Q = span,,, V R = span,,, V S = span,,, V T = span,,, V U = span,,, V V = span,,, V W = span,,.

16 Spreads yields Cooling Codes Definition Theorem Let V O, V P,, V Z be a partial (t + )- spread. Set V J = V J {}. Then V O, V P,, V Z forms an (n, t)- cooling code. V O = span,, {}, V P = span,, {}, V Q = span,, {}, V R = span,, {}, V S = span,, {}, V T = span,, {}, V U = span,, {}, V V = span,, {}, V W = span,, {}. A partial τ- spread of F P g is a collection of τ- dim subspaces V O, V P,, V Z of F P g such that V J V ] = {} for all i j. Definition An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S. A 3-spread of F P T yields a (6,2)-cooling code

17 proof Spreads yields Cooling Codes Theorem Let V O, V P,, V Z be a (t + )- partial spread. Set V J = V J {}. Then V O, V P,, V Z forms an (n, t)- cooling code. Definition A partial τ- spread of F P g is a collection of τ- dim subspaces V O, V P,, V Z of F P g such that V J V ] = {} for all i j. Definition An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S. V J V ] = for i j follows from definition.

18 proof Spreads yields Cooling Codes Theorem Let V O, V P,, V Z be a (t + )- partial spread. Set V J = V J {}. Then V O, V P,, V Z forms an (n, t)- cooling code. Definition A partial τ- spread of F P g is a collection of τ- dim subspaces V O, V P,, V Z of F P g such that V J V ] = {} for all i j. Definition An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S. Consider the codeset V O and S =,2. V O = span,,. Want to find x V O such that x ] = for all j S, or, x O = x P =.

19 proof Spreads yields Cooling Codes Consider the codeset V O and S =,2. V O = span,,. Want to find x V O such that x O = x P =. (*) Let K be the collection of vectors that satisfy (*). Suppose x, y K. i.e. x V O such that x O = x P =. y V O such that y O = y P =. Then x + y K {}. In other words, K {} is a vector subspace of V O.

20 proof Spreads yields Cooling Codes Consider the codeset V O and S =,2. V O = span,,. Want to find x V O such that x O = x P =. (*) Let K be the collection of vectors that satisfy (*). In fact, K {} is the kernel of the map φ that projects V O onto the coordinates at S. φ: V O F P` Since V O has dimension three and its image has dimension two, its kernel K {} must be nontrivial. So, there exists nonzero x that satisfies (*).

21 Cooling Codes - Property A Theorem Let V O, V P,, V Z be a (t + )- partial spread. Set V J = V J {}. Then V O, V P,, V Z forms an (n, t)- cooling code. Theorem (Classic + Etzion and Vardy 2) Let τ n/2. There is a τ- partial spread of size at least 2 gh. Definition A partial τ- spread of F P g is a collection of τ- dim subspaces V O, V P,, V Z of F P g such that V J V ] = {} for all i j. Definition An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S. Theorem If t + n/2, there is an (n, t)- cooling code of size at least 2 ghiho codesets. The construction is optimal in terms of redundancy. (Dumer 989) There exist efficient encoding and decoding methods for spreads.

22 Property A and B Property A(t): Every transmission does not cause state transitions on the t hottest wires. Property B(w): Every transmission causes state transitions on at most w wires. Let n = 286, t = 3, w = 27. Consider a 4- partial spread of F P PVT of size 2 PRT. Let V O, V P,, V P ƒ be the vector spaces. Let V J = V J {} be the codesets. Choose a codeset V J. For any subset S of size 3, the kernel K of the projection φ: V J F P` has dimension of at least. We puncture K at the coordinates in S to obtain a By Plotkin bound, subspace K of dim and length 256. there exists nonzero x K with wt x 27.

23 Property A and B Property A(t): Every transmission does not cause state transitions on the t hottest wires. Property B(w): Every transmission causes state transitions on at most w wires. Let n = 286, t = 3, w = 24. Consider a 4- partial spread of F P PVT of size 2 PRT. Let V O, V P,, V P ƒ be the vector spaces. Let V J = V J {} be the codesets. Choose a codeset V J. For any subset S of size 3, the kernel K of the projection φ: V J F P` has dimension of at least. We puncture K at the coordinates in S to obtain a Checking codetables.de, subspace K of dim and length 256. there exists nonzero x K with wt x 24.

24 Property A and B Theorem Suppose that t + r (n + s)/2. If i. there is an [n, s, w + ]- linear code, and ii. an n t, r, w + - linear code does not exist, then there is a code that satisfies Property A(t) and B(w) of size 2 ghih. Property A(t): Every transmission does not cause state transitions on the t hottest wires. Property B(w): Every transmission causes state transitions on at most w wires.

25 Cooling Codes: Thermal-Management Coding for High-Performance Interconnects Full Paper Available at Other Results: Construction of (n, t)- cooling code for t + > n/2. Construction of codes that satisfy Property A(t) and B(w) using Baranyai s theorem, concatenation Construction of codes that satisfy additional Property C(e)

Low-Power Cooling Codes with Efficient Encoding and Decoding

Low-Power Cooling Codes with Efficient Encoding and Decoding Low-Power Cooling Codes with Efficient Encoding and Decoding Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Hengjia Wei School of Physical and Mathematical Sciences, Nanyang Technological

More information

Codes and Designs in the Grassmann Scheme

Codes and Designs in the Grassmann Scheme Codes and Designs in the Grassmann Scheme Tuvi Etzion Computer Science Department Technion -Israel Institute of Technology etzion@cs.technion.ac.il ALGEBRAIC COMBINATORICS AND APPLICATIONS ALCOMA10, Thurnau,

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

Explicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform

Explicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform Explicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang and Duan-Shin Lee Institute of Communications Engineering National Tsing Hua University

More information

Sunflowers and Primitive SCIDs

Sunflowers and Primitive SCIDs (joint work with R.D. Barrolleta, L. Storme and E. Suárez-Canedo) July 15, 2016 (joint work with R.D. Barrolleta, L. Storme and E. Suárez-Canedo) Definitions Background 1 Definitions Background 2 Subspace

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

Shannon s noisy-channel theorem

Shannon s noisy-channel theorem Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with

More information

Maximum Distance Separable Symbol-Pair Codes

Maximum Distance Separable Symbol-Pair Codes 2012 IEEE International Symposium on Information Theory Proceedings Maximum Distance Separable Symbol-Pair Codes Yeow Meng Chee, Han Mao Kiah, and Chengmin Wang School of Physical and Mathematical Sciences,

More information

Mathematics Department

Mathematics Department Mathematics Department Matthew Pressland Room 7.355 V57 WT 27/8 Advanced Higher Mathematics for INFOTECH Exercise Sheet 2. Let C F 6 3 be the linear code defined by the generator matrix G = 2 2 (a) Find

More information

Chapter 1. Vectors, Matrices, and Linear Spaces

Chapter 1. Vectors, Matrices, and Linear Spaces 1.6 Homogeneous Systems, Subspaces and Bases 1 Chapter 1. Vectors, Matrices, and Linear Spaces 1.6. Homogeneous Systems, Subspaces and Bases Note. In this section we explore the structure of the solution

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

Assignment 1 Math 5341 Linear Algebra Review. Give complete answers to each of the following questions. Show all of your work.

Assignment 1 Math 5341 Linear Algebra Review. Give complete answers to each of the following questions. Show all of your work. Assignment 1 Math 5341 Linear Algebra Review Give complete answers to each of the following questions Show all of your work Note: You might struggle with some of these questions, either because it has

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

GRAY codes were found by Gray [15] and introduced

GRAY codes were found by Gray [15] and introduced IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 45, NO 7, NOVEMBER 1999 2383 The Structure of Single-Track Gray Codes Moshe Schwartz Tuvi Etzion, Senior Member, IEEE Abstract Single-track Gray codes are cyclic

More information

Codes on Graphs, Normal Realizations, and Partition Functions

Codes on Graphs, Normal Realizations, and Partition Functions Codes on Graphs, Normal Realizations, and Partition Functions G. David Forney, Jr. 1 Workshop on Counting, Inference and Optimization Princeton, NJ November 3, 2011 1 Joint work with: Heide Gluesing-Luerssen,

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

Math 512 Syllabus Spring 2017, LIU Post

Math 512 Syllabus Spring 2017, LIU Post Week Class Date Material Math 512 Syllabus Spring 2017, LIU Post 1 1/23 ISBN, error-detecting codes HW: Exercises 1.1, 1.3, 1.5, 1.8, 1.14, 1.15 If x, y satisfy ISBN-10 check, then so does x + y. 2 1/30

More information

BINARY CODES. Binary Codes. Computer Mathematics I. Jiraporn Pooksook Department of Electrical and Computer Engineering Naresuan University

BINARY CODES. Binary Codes. Computer Mathematics I. Jiraporn Pooksook Department of Electrical and Computer Engineering Naresuan University Binary Codes Computer Mathematics I Jiraporn Pooksook Department of Electrical and Computer Engineering Naresuan University BINARY CODES: BCD Binary Coded Decimal system is represented by a group of 4

More information

Cyclic Redundancy Check Codes

Cyclic Redundancy Check Codes Cyclic Redundancy Check Codes Lectures No. 17 and 18 Dr. Aoife Moloney School of Electronics and Communications Dublin Institute of Technology Overview These lectures will look at the following: Cyclic

More information

Simplified Composite Coding for Index Coding

Simplified Composite Coding for Index Coding Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,

More information

arxiv: v4 [cs.it] 14 May 2013

arxiv: v4 [cs.it] 14 May 2013 arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University

More information

Low-Complexity Puncturing and Shortening of Polar Codes

Low-Complexity Puncturing and Shortening of Polar Codes Low-Complexity Puncturing and Shortening of Polar Codes Valerio Bioglio, Frédéric Gabry, Ingmar Land Mathematical and Algorithmic Sciences Lab France Research Center, Huawei Technologies Co. Ltd. Email:

More information

X row 1 X row 2, X row 2 X row 3, Z col 1 Z col 2, Z col 2 Z col 3,

X row 1 X row 2, X row 2 X row 3, Z col 1 Z col 2, Z col 2 Z col 3, 1 Ph 219c/CS 219c Exercises Due: Thursday 9 March 2017.1 A cleaning lemma for CSS codes In class we proved the cleaning lemma for stabilizer codes, which says the following: For an [[n, k]] stabilizer

More information

Error Detection and Correction: Hamming Code; Reed-Muller Code

Error Detection and Correction: Hamming Code; Reed-Muller Code Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation

More information

A Singleton Bound for Lattice Schemes

A Singleton Bound for Lattice Schemes 1 A Singleton Bound for Lattice Schemes Srikanth B. Pai, B. Sundar Rajan, Fellow, IEEE Abstract arxiv:1301.6456v4 [cs.it] 16 Jun 2015 In this paper, we derive a Singleton bound for lattice schemes and

More information

Chapter 2. Error Correcting Codes. 2.1 Basic Notions

Chapter 2. Error Correcting Codes. 2.1 Basic Notions Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.

More information

Improved Upper Bounds on Sizes of Codes

Improved Upper Bounds on Sizes of Codes 880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE

More information

Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching

Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, Duan-Shin Lee, and Chao-Yi Chen Institute of Communications Engineering

More information

Information redundancy

Information redundancy Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant

More information

Binary Linear Codes G = = [ I 3 B ] , G 4 = None of these matrices are in standard form. Note that the matrix 1 0 0

Binary Linear Codes G = = [ I 3 B ] , G 4 = None of these matrices are in standard form. Note that the matrix 1 0 0 Coding Theory Massoud Malek Binary Linear Codes Generator and Parity-Check Matrices. A subset C of IK n is called a linear code, if C is a subspace of IK n (i.e., C is closed under addition). A linear

More information

Lecture 3: Error Correcting Codes

Lecture 3: Error Correcting Codes CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error

More information

Bounds on Asymptotic Rate of Capacitive Crosstalk Avoidance Codes for On-chip Buses

Bounds on Asymptotic Rate of Capacitive Crosstalk Avoidance Codes for On-chip Buses Bounds on Asymptotic Rate of Capacitive Crosstalk Avoidance Codes for On-chip Buses Tadashi Wadayama and Taisuke Izumi Nagoya Institute of Technology, Japan Email: wadayama@nitech.ac.jp, t-izumi@nitech.ac.jp

More information

On Secure Index Coding with Side Information

On Secure Index Coding with Side Information On Secure Index Coding with Side Information Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological University 21 Nanyang Link, Singapore 637371 Email:

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Assume that the follow string of bits constitutes one of the segments we which to transmit.

Assume that the follow string of bits constitutes one of the segments we which to transmit. Cyclic Redundancy Checks( CRC) Cyclic Redundancy Checks fall into a class of codes called Algebraic Codes; more specifically, CRC codes are Polynomial Codes. These are error-detecting codes, not error-correcting

More information

IN this paper, we consider the capacity of sticky channels, a

IN this paper, we consider the capacity of sticky channels, a 72 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 1, JANUARY 2008 Capacity Bounds for Sticky Channels Michael Mitzenmacher, Member, IEEE Abstract The capacity of sticky channels, a subclass of insertion

More information

Network Coding and Schubert Varieties over Finite Fields

Network Coding and Schubert Varieties over Finite Fields Network Coding and Schubert Varieties over Finite Fields Anna-Lena Horlemann-Trautmann Algorithmics Laboratory, EPFL, Schweiz October 12th, 2016 University of Kentucky What is this talk about? 1 / 31 Overview

More information

Multimedia Systems WS 2010/2011

Multimedia Systems WS 2010/2011 Multimedia Systems WS 2010/2011 15.11.2010 M. Rahamatullah Khondoker (Room # 36/410 ) University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de

More information

Chapter 2: Linear Independence and Bases

Chapter 2: Linear Independence and Bases MATH20300: Linear Algebra 2 (2016 Chapter 2: Linear Independence and Bases 1 Linear Combinations and Spans Example 11 Consider the vector v (1, 1 R 2 What is the smallest subspace of (the real vector space

More information

channel of communication noise Each codeword has length 2, and all digits are either 0 or 1. Such codes are called Binary Codes.

channel of communication noise Each codeword has length 2, and all digits are either 0 or 1. Such codes are called Binary Codes. 5 Binary Codes You have already seen how check digits for bar codes (in Unit 3) and ISBN numbers (Unit 4) are used to detect errors. Here you will look at codes relevant for data transmission, for example,

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true.

We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true. Dimension We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true. Lemma If a vector space V has a basis B containing n vectors, then any set containing more

More information

Linear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

Linear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 26 Linear Block Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay July 28, 2014 Binary Block Codes 3 / 26 Let F 2 be the set

More information

Lecture 21: P vs BPP 2

Lecture 21: P vs BPP 2 Advanced Complexity Theory Spring 206 Prof. Dana Moshkovitz Lecture 2: P vs BPP 2 Overview In the previous lecture, we began our discussion of pseudorandomness. We presented the Blum- Micali definition

More information

Math Linear algebra, Spring Semester Dan Abramovich

Math Linear algebra, Spring Semester Dan Abramovich Math 52 0 - Linear algebra, Spring Semester 2012-2013 Dan Abramovich Fields. We learned to work with fields of numbers in school: Q = fractions of integers R = all real numbers, represented by infinite

More information

New constructions of WOM codes using the Wozencraft ensemble

New constructions of WOM codes using the Wozencraft ensemble New constructions of WOM codes using the Wozencraft ensemble Amir Shpilka Abstract In this paper we give several new constructions of WOM codes. The novelty in our constructions is the use of the so called

More information

Linear Algebra. Paul Yiu. 6D: 2-planes in R 4. Department of Mathematics Florida Atlantic University. Fall 2011

Linear Algebra. Paul Yiu. 6D: 2-planes in R 4. Department of Mathematics Florida Atlantic University. Fall 2011 Linear Algebra Paul Yiu Department of Mathematics Florida Atlantic University Fall 2011 6D: 2-planes in R 4 The angle between a vector and a plane The angle between a vector v R n and a subspace V is the

More information

Lecture 12: November 6, 2017

Lecture 12: November 6, 2017 Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and

More information

Constructing network codes using Möbius transformations

Constructing network codes using Möbius transformations Constructing network codes using Möbius transformations Andreas-Stephan Elsenhans and Axel Kohnert November 26, 2010 Abstract We study error correcting constant dimension subspace codes for network coding.

More information

Family Feud Review. Linear Algebra. October 22, 2013

Family Feud Review. Linear Algebra. October 22, 2013 Review Linear Algebra October 22, 2013 Question 1 Let A and B be matrices. If AB is a 4 7 matrix, then determine the dimensions of A and B if A has 19 columns. Answer 1 Answer A is a 4 19 matrix, while

More information

MATH 112 QUADRATIC AND BILINEAR FORMS NOVEMBER 24, Bilinear forms

MATH 112 QUADRATIC AND BILINEAR FORMS NOVEMBER 24, Bilinear forms MATH 112 QUADRATIC AND BILINEAR FORMS NOVEMBER 24,2015 M. J. HOPKINS 1.1. Bilinear forms and matrices. 1. Bilinear forms Definition 1.1. Suppose that F is a field and V is a vector space over F. bilinear

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network

More information

Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity

Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity Henry D. Pfister, Member, Igal Sason, Member, and Rüdiger Urbanke Abstract We present two sequences of ensembles of non-systematic

More information

Correcting Bursty and Localized Deletions Using Guess & Check Codes

Correcting Bursty and Localized Deletions Using Guess & Check Codes Correcting Bursty and Localized Deletions Using Guess & Chec Codes Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University serge..hanna@rutgers.edu, salim.elrouayheb@rutgers.edu Abstract

More information

2018 Fall 2210Q Section 013 Midterm Exam II Solution

2018 Fall 2210Q Section 013 Midterm Exam II Solution 08 Fall 0Q Section 0 Midterm Exam II Solution True or False questions points 0 0 points) ) Let A be an n n matrix. If the equation Ax b has at least one solution for each b R n, then the solution is unique

More information

Correcting Localized Deletions Using Guess & Check Codes

Correcting Localized Deletions Using Guess & Check Codes 55th Annual Allerton Conference on Communication, Control, and Computing Correcting Localized Deletions Using Guess & Check Codes Salim El Rouayheb Rutgers University Joint work with Serge Kas Hanna and

More information

MATH3302. Coding and Cryptography. Coding Theory

MATH3302. Coding and Cryptography. Coding Theory MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu

More information

Information Leakage of Correlated Source Coded Sequences over a Channel with an Eavesdropper

Information Leakage of Correlated Source Coded Sequences over a Channel with an Eavesdropper Information Leakage of Correlated Source Coded Sequences over a Channel with an Eavesdropper Reevana Balmahoon and Ling Cheng School of Electrical and Information Engineering University of the Witwatersrand

More information

THIS paper is aimed at designing efficient decoding algorithms

THIS paper is aimed at designing efficient decoding algorithms IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used

More information

Explicit Receivers for Optical Communication and Quantum Reading

Explicit Receivers for Optical Communication and Quantum Reading Explicit Receivers for Optical Communication and Quantum Reading Mark M. Wilde School of Computer Science, McGill University Joint work with Saikat Guha, Si-Hui Tan, and Seth Lloyd arxiv:1202.0518 ISIT

More information

(a). W contains the zero vector in R n. (b). W is closed under addition. (c). W is closed under scalar multiplication.

(a). W contains the zero vector in R n. (b). W is closed under addition. (c). W is closed under scalar multiplication. . Subspaces of R n Bases and Linear Independence Definition. Subspaces of R n A subset W of R n is called a subspace of R n if it has the following properties: (a). W contains the zero vector in R n. (b).

More information

MTH5102 Spring 2017 HW Assignment 3: Sec. 1.5, #2(e), 9, 15, 20; Sec. 1.6, #7, 13, 29 The due date for this assignment is 2/01/17.

MTH5102 Spring 2017 HW Assignment 3: Sec. 1.5, #2(e), 9, 15, 20; Sec. 1.6, #7, 13, 29 The due date for this assignment is 2/01/17. MTH5102 Spring 2017 HW Assignment 3: Sec. 1.5, #2(e), 9, 15, 20; Sec. 1.6, #7, 13, 29 The due date for this assignment is 2/01/17. Sec. 1.5, #2(e). Determine whether the following sets are linearly dependent

More information

New constructions of WOM codes using the Wozencraft ensemble

New constructions of WOM codes using the Wozencraft ensemble New constructions of WOM codes using the Wozencraft ensemble Amir Shpilka Abstract In this paper we give several new constructions of WOM codes. The novelty in our constructions is the use of the so called

More information

Enhancing Binary Images of Non-Binary LDPC Codes

Enhancing Binary Images of Non-Binary LDPC Codes Enhancing Binary Images of Non-Binary LDPC Codes Aman Bhatia, Aravind R Iyengar, and Paul H Siegel University of California, San Diego, La Jolla, CA 92093 0401, USA Email: {a1bhatia, aravind, psiegel}@ucsdedu

More information

Polar Code Construction for List Decoding

Polar Code Construction for List Decoding 1 Polar Code Construction for List Decoding Peihong Yuan, Tobias Prinz, Georg Böcherer arxiv:1707.09753v1 [cs.it] 31 Jul 2017 Abstract A heuristic construction of polar codes for successive cancellation

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history

More information

Index Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan

Index Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan Index Coding Trivandrum School on Communication, Coding and Networking 2017 Prasad Krishnan Signal Processing and Communications Research Centre, International Institute of Information Technology, Hyderabad

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Unordered Error-Correcting Codes and their Applications

Unordered Error-Correcting Codes and their Applications Unordered Error-Correcting Codes and their Applications Mario Blaum and Jehoshua Bruck IBM Research Division Almaden Research Center San Jose, CA 95120 Abstract We give efficient constructions for error

More information

X 1 : X Table 1: Y = X X 2

X 1 : X Table 1: Y = X X 2 ECE 534: Elements of Information Theory, Fall 200 Homework 3 Solutions (ALL DUE to Kenneth S. Palacio Baus) December, 200. Problem 5.20. Multiple access (a) Find the capacity region for the multiple-access

More information

Algebraic Codes for Error Control

Algebraic Codes for Error Control little -at- mathcs -dot- holycross -dot- edu Department of Mathematics and Computer Science College of the Holy Cross SACNAS National Conference An Abstract Look at Algebra October 16, 2009 Outline Coding

More information

Locally Encodable and Decodable Codes for Distributed Storage Systems

Locally Encodable and Decodable Codes for Distributed Storage Systems Locally Encodable and Decodable Codes for Distributed Storage Systems Son Hoang Dau, Han Mao Kiah, Wentu Song, Chau Yuen Singapore University of Technology and Design, Nanyang Technological University,

More information

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE 4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,

More information

Secure RAID Schemes from EVENODD and STAR Codes

Secure RAID Schemes from EVENODD and STAR Codes Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity

More information

LECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem

LECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem LECTURE 15 Last time: Feedback channel: setting up the problem Perfect feedback Feedback capacity Data compression Lecture outline Joint source and channel coding theorem Converse Robustness Brain teaser

More information

4 An Introduction to Channel Coding and Decoding over BSC

4 An Introduction to Channel Coding and Decoding over BSC 4 An Introduction to Channel Coding and Decoding over BSC 4.1. Recall that channel coding introduces, in a controlled manner, some redundancy in the (binary information sequence that can be used at the

More information

REPRESENTATION THEORY OF S n

REPRESENTATION THEORY OF S n REPRESENTATION THEORY OF S n EVAN JENKINS Abstract. These are notes from three lectures given in MATH 26700, Introduction to Representation Theory of Finite Groups, at the University of Chicago in November

More information

Quantum Error-Correcting Codes by Concatenation

Quantum Error-Correcting Codes by Concatenation Second International Conference on Quantum Error Correction University of Southern California, Los Angeles, USA December 5 9, 2011 Quantum Error-Correcting Codes by Concatenation Markus Grassl joint work

More information

A Comparison of Two Achievable Rate Regions for the Interference Channel

A Comparison of Two Achievable Rate Regions for the Interference Channel A Comparison of Two Achievable Rate Regions for the Interference Channel Hon-Fah Chong, Mehul Motani, and Hari Krishna Garg Electrical & Computer Engineering National University of Singapore Email: {g030596,motani,eleghk}@nus.edu.sg

More information

Chapter 3. Directions: For questions 1-11 mark each statement True or False. Justify each answer.

Chapter 3. Directions: For questions 1-11 mark each statement True or False. Justify each answer. Chapter 3 Directions: For questions 1-11 mark each statement True or False. Justify each answer. 1. (True False) Asking whether the linear system corresponding to an augmented matrix [ a 1 a 2 a 3 b ]

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Covert Communication with Channel-State Information at the Transmitter

Covert Communication with Channel-State Information at the Transmitter Covert Communication with Channel-State Information at the Transmitter Si-Hyeon Lee Joint Work with Ligong Wang, Ashish Khisti, and Gregory W. Wornell July 27, 2017 1 / 21 Covert Communication Transmitter

More information

6.4 BASIS AND DIMENSION (Review) DEF 1 Vectors v 1, v 2,, v k in a vector space V are said to form a basis for V if. (a) v 1,, v k span V and

6.4 BASIS AND DIMENSION (Review) DEF 1 Vectors v 1, v 2,, v k in a vector space V are said to form a basis for V if. (a) v 1,, v k span V and 6.4 BASIS AND DIMENSION (Review) DEF 1 Vectors v 1, v 2,, v k in a vector space V are said to form a basis for V if (a) v 1,, v k span V and (b) v 1,, v k are linearly independent. HMHsueh 1 Natural Basis

More information

Tilings of Binary Spaces

Tilings of Binary Spaces Tilings of Binary Spaces Gérard Cohen Département Informatique ENST, 46 rue Barrault 75634 Paris, France Simon Litsyn Department of Electrical Engineering Tel-Aviv University Ramat-Aviv 69978, Israel Alexander

More information

Efficient Bounded Distance Decoders for Barnes-Wall Lattices

Efficient Bounded Distance Decoders for Barnes-Wall Lattices Efficient Bounded Distance Decoders for Barnes-Wall Lattices Daniele Micciancio Antonio Nicolosi April 30, 2008 Abstract We describe a new family of parallelizable bounded distance decoding algorithms

More information

9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise

9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise 9 THEORY OF CODES Chapter 9 Theory of Codes After studying this chapter you should understand what is meant by noise, error detection and correction; be able to find and use the Hamming distance for a

More information

Entropies & Information Theory

Entropies & Information Theory Entropies & Information Theory LECTURE I Nilanjana Datta University of Cambridge,U.K. See lecture notes on: http://www.qi.damtp.cam.ac.uk/node/223 Quantum Information Theory Born out of Classical Information

More information

Flip-N-Write: A Simple Deterministic Technique to Improve PRAM Write Performance, Energy and Endurance. Presenter: Brian Wongchaowart March 17, 2010

Flip-N-Write: A Simple Deterministic Technique to Improve PRAM Write Performance, Energy and Endurance. Presenter: Brian Wongchaowart March 17, 2010 Flip-N-Write: A Simple Deterministic Technique to Improve PRAM Write Performance, Energy and Endurance Sangyeun Cho Hyunjin Lee Presenter: Brian Wongchaowart March 17, 2010 Motivation Suppose that you

More information

Capacity achieving multiwrite WOM codes

Capacity achieving multiwrite WOM codes Capacity achieving multiwrite WOM codes Amir Shpilka Abstract arxiv:1209.1128v1 [cs.it] 5 Sep 2012 In this paper we give an explicit construction of a capacity achieving family of binary t-write WOM codes

More information

LET F q be the finite field of size q. For two k l matrices

LET F q be the finite field of size q. For two k l matrices 1 Codes and Designs Related to Lifted MRD Codes Tuvi Etzion, Fellow, IEEE and Natalia Silberstein arxiv:1102.2593v5 [cs.it 17 ug 2012 bstract Lifted maximum ran distance (MRD) codes, which are constant

More information

Math 54. Selected Solutions for Week 5

Math 54. Selected Solutions for Week 5 Math 54. Selected Solutions for Week 5 Section 4. (Page 94) 8. Consider the following two systems of equations: 5x + x 3x 3 = 5x + x 3x 3 = 9x + x + 5x 3 = 4x + x 6x 3 = 9 9x + x + 5x 3 = 5 4x + x 6x 3

More information

6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory

6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory 6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of

More information

exercise in the previous class (1)

exercise in the previous class (1) exercise in the previous class () Consider an odd parity check code C whose codewords are (x,, x k, p) with p = x + +x k +. Is C a linear code? No. x =, x 2 =x =...=x k = p =, and... is a codeword x 2

More information

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International

More information

communication complexity lower bounds yield data structure lower bounds

communication complexity lower bounds yield data structure lower bounds communication complexity lower bounds yield data structure lower bounds Implementation of a database - D: D represents a subset S of {...N} 2 3 4 Access to D via "membership queries" - Q for each i, can

More information