Thermal-Management Coding for High-Performance Interconnects
|
|
- George Fleming
- 5 years ago
- Views:
Transcription
1 Cooling Codes Thermal-Management Coding for High-Performance Interconnects Han Mao Kiah, Nanyang Technological University, Singapore Joint work with: Yeow Meng Chee, Nanyang Technological University Tuvi Etzion, Technion, Israel Institute of Technology Alexander Vardy, University of California, San Diego
2 DSM Bus Communication Sender Receiver s are connected via wires. Each wire has two states to represent a bit of information. Problem When a wire switches state, or when there is a state transition, the wire heats up.
3 Minimizing Switching Activity Previous work focus on reducing the number of state transitions. Encoding techniques: Bus- Invert (Stan and Burleson 995) Thermal Spreading (Wang et al. 27) Information theoretic analysis (Sotiriadis et al. 23, Koch et al. 29) Sender Receiver Bus- Invert Introduces one redundant wire. Chooses to send x or its complement x so that the number of state transitions is at most n/2 for n wires.
4 Controlling Peak Temperature How? Avoiding state transitions on the hottest wires. Sender Receiver Why? To handle anomalous events. Source signals are not usually uniformly distributed.
5 Key Features of Coding Scheme Consider a bus comprising n wires. Property A(t): Every transmission does not cause state transitions on the t hottest wires. Property B(w): Every transmission causes state transitions on at most w wires. Sender Receiver Property C(e): Correct up to at most e transmission errors. n = 6 t = 2 w = 2
6 Property A(t): Every transmission does not cause state transitions on the t hottest wires. This talk Property B(w): Every transmission causes state transitions on at most w wires. Property C(e): Correct up to at most e transmission errors. Code constructions that achieve Property B(w) only - Optimal Property A(t) only Optimal redundancy Property A(t) + Property B(w) only Asymptotically optimal redundancy Adaptive coding schemes. In the full paper on arxiv, More constructions that achieve Property A(t) + Property C(e) only Property B(w) + Property C(e) only Property A(t) + Property B(w) + Property C e Nonadaptive coding schemes
7 Adaptive + Differential Coding Sender Receiver Suppose Sender wants to communicate. Codeword Codeword Buffer We change the states to. Receiver adds the current state vector to the vector in the buffer to retrieve the message. Receiver updates the buffer.
8 Differential Coding and Property B Sender Receiver Property B(w): Every transmission causes state transitions on at most w wires. A code satisfies Property B(w) if and only if Codeword Codeword wt x w for codewords x. In other words, the optimal code that satisfies Property B w is Buffer n, w = x wt x w.
9 Differential Coding and Property A Sender Receiver Property A(t): Every transmission does not cause state transitions on the t hottest wires. A code satisfies Property A(t) if and only if Codeword??????????? Codeword??????????? for all codewords x, for all subsets S of size t, x J = for all i S. Buffer This implies that x =!! t =
10 Cooling Codes Property A(t): Every transmission does not cause state transitions on the t hottest wires. Instead of vectors, we consider codesets An (6,2)-cooling code C O =,,,,,,, C P =,,,,,,, C Q =,,,,,,, C R =,,,,,,, C S =,,,,,,, C T =,,,,,,, C U =,,,,,,, C V =,,,,,,, C W =,,,,,,. An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S.
11 Cooling Codes Property A(t): Every transmission does not cause state transitions on the t hottest wires. Consider the codeset C O and S =,2. An (6,2)-cooling code C O =,,,,,,. An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S, or, x =. _`
12 Cooling Codes and Related Codes Definition An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. Coding for Stuck- At Cells for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S, or x ` =. Additional requirement: x ` = z for all patterns z of length t Cooling codes require significantly lesser redundancy Dumer (989) constructed a special class of codes for stuck- at- cells Write- Once Memories (WOM) codes Different requirement: x ` = Different requirement: S need not be a subset of size t Cooling codes can be used to construct WOM codes. Explicit Constructions of Finite- Length WOM Codes ISIT, 3 Jun Fri, 2:3pm, Room: K5
13 Upper Bound on the Code Size Sender Receiver Lemma A (n, t)- cooling code has at most 2 ghi codesets. proof Corollary Since If < there t < are n no, state an (n, transition t)- cooling on t wires, code has no information most 2 ghi is transmitted. codesets. Therefore, at most n t bits of information can be transmitted. Property A(t): Every transmission does not cause state transitions on the t hottest wires.
14 Lower Bound on the Code Size Sender Receiver Lemma A (n, t)- cooling code has at most 2 ghi codesets. Theorem If t + n/2, there is an (n, t)- cooling code of size at least 2 ghiho codesets. In other words, construction is optimal in terms of redundancy. Property A(t): Every transmission does not cause state transitions on the t hottest wires.
15 Spreads and Partial Spreads A partial τ- spread of F P g is a collection of τ- dimensional subspaces V O, V P,, V Z of F P g such that V J V ] = {} for all i j. If V J = F P g, then V O, V P,, V Z is called a τ- spread. A 3-spread of F P T V O = span,,, V P = span,,, V Q = span,,, V R = span,,, V S = span,,, V T = span,,, V U = span,,, V V = span,,, V W = span,,.
16 Spreads yields Cooling Codes Definition Theorem Let V O, V P,, V Z be a partial (t + )- spread. Set V J = V J {}. Then V O, V P,, V Z forms an (n, t)- cooling code. V O = span,, {}, V P = span,, {}, V Q = span,, {}, V R = span,, {}, V S = span,, {}, V T = span,, {}, V U = span,, {}, V V = span,, {}, V W = span,, {}. A partial τ- spread of F P g is a collection of τ- dim subspaces V O, V P,, V Z of F P g such that V J V ] = {} for all i j. Definition An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S. A 3-spread of F P T yields a (6,2)-cooling code
17 proof Spreads yields Cooling Codes Theorem Let V O, V P,, V Z be a (t + )- partial spread. Set V J = V J {}. Then V O, V P,, V Z forms an (n, t)- cooling code. Definition A partial τ- spread of F P g is a collection of τ- dim subspaces V O, V P,, V Z of F P g such that V J V ] = {} for all i j. Definition An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S. V J V ] = for i j follows from definition.
18 proof Spreads yields Cooling Codes Theorem Let V O, V P,, V Z be a (t + )- partial spread. Set V J = V J {}. Then V O, V P,, V Z forms an (n, t)- cooling code. Definition A partial τ- spread of F P g is a collection of τ- dim subspaces V O, V P,, V Z of F P g such that V J V ] = {} for all i j. Definition An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S. Consider the codeset V O and S =,2. V O = span,,. Want to find x V O such that x ] = for all j S, or, x O = x P =.
19 proof Spreads yields Cooling Codes Consider the codeset V O and S =,2. V O = span,,. Want to find x V O such that x O = x P =. (*) Let K be the collection of vectors that satisfy (*). Suppose x, y K. i.e. x V O such that x O = x P =. y V O such that y O = y P =. Then x + y K {}. In other words, K {} is a vector subspace of V O.
20 proof Spreads yields Cooling Codes Consider the codeset V O and S =,2. V O = span,,. Want to find x V O such that x O = x P =. (*) Let K be the collection of vectors that satisfy (*). In fact, K {} is the kernel of the map φ that projects V O onto the coordinates at S. φ: V O F P` Since V O has dimension three and its image has dimension two, its kernel K {} must be nontrivial. So, there exists nonzero x that satisfies (*).
21 Cooling Codes - Property A Theorem Let V O, V P,, V Z be a (t + )- partial spread. Set V J = V J {}. Then V O, V P,, V Z forms an (n, t)- cooling code. Theorem (Classic + Etzion and Vardy 2) Let τ n/2. There is a τ- partial spread of size at least 2 gh. Definition A partial τ- spread of F P g is a collection of τ- dim subspaces V O, V P,, V Z of F P g such that V J V ] = {} for all i j. Definition An (n, t)- cooling code is a collection of M codesets C O, C P,, C Z such that C O, C P,, C Z are disjoint subsets. for all codesets C J, for all subsets S of size t, there exist a word x C J x ] = for all j S. Theorem If t + n/2, there is an (n, t)- cooling code of size at least 2 ghiho codesets. The construction is optimal in terms of redundancy. (Dumer 989) There exist efficient encoding and decoding methods for spreads.
22 Property A and B Property A(t): Every transmission does not cause state transitions on the t hottest wires. Property B(w): Every transmission causes state transitions on at most w wires. Let n = 286, t = 3, w = 27. Consider a 4- partial spread of F P PVT of size 2 PRT. Let V O, V P,, V P ƒ be the vector spaces. Let V J = V J {} be the codesets. Choose a codeset V J. For any subset S of size 3, the kernel K of the projection φ: V J F P` has dimension of at least. We puncture K at the coordinates in S to obtain a By Plotkin bound, subspace K of dim and length 256. there exists nonzero x K with wt x 27.
23 Property A and B Property A(t): Every transmission does not cause state transitions on the t hottest wires. Property B(w): Every transmission causes state transitions on at most w wires. Let n = 286, t = 3, w = 24. Consider a 4- partial spread of F P PVT of size 2 PRT. Let V O, V P,, V P ƒ be the vector spaces. Let V J = V J {} be the codesets. Choose a codeset V J. For any subset S of size 3, the kernel K of the projection φ: V J F P` has dimension of at least. We puncture K at the coordinates in S to obtain a Checking codetables.de, subspace K of dim and length 256. there exists nonzero x K with wt x 24.
24 Property A and B Theorem Suppose that t + r (n + s)/2. If i. there is an [n, s, w + ]- linear code, and ii. an n t, r, w + - linear code does not exist, then there is a code that satisfies Property A(t) and B(w) of size 2 ghih. Property A(t): Every transmission does not cause state transitions on the t hottest wires. Property B(w): Every transmission causes state transitions on at most w wires.
25 Cooling Codes: Thermal-Management Coding for High-Performance Interconnects Full Paper Available at Other Results: Construction of (n, t)- cooling code for t + > n/2. Construction of codes that satisfy Property A(t) and B(w) using Baranyai s theorem, concatenation Construction of codes that satisfy additional Property C(e)
Low-Power Cooling Codes with Efficient Encoding and Decoding
Low-Power Cooling Codes with Efficient Encoding and Decoding Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Hengjia Wei School of Physical and Mathematical Sciences, Nanyang Technological
More informationCodes and Designs in the Grassmann Scheme
Codes and Designs in the Grassmann Scheme Tuvi Etzion Computer Science Department Technion -Israel Institute of Technology etzion@cs.technion.ac.il ALGEBRAIC COMBINATORICS AND APPLICATIONS ALCOMA10, Thurnau,
More informationMa/CS 6b Class 25: Error Correcting Codes 2
Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets
More informationExplicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform
Explicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang and Duan-Shin Lee Institute of Communications Engineering National Tsing Hua University
More informationSunflowers and Primitive SCIDs
(joint work with R.D. Barrolleta, L. Storme and E. Suárez-Canedo) July 15, 2016 (joint work with R.D. Barrolleta, L. Storme and E. Suárez-Canedo) Definitions Background 1 Definitions Background 2 Subspace
More informationMATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.
MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet
More informationShannon s noisy-channel theorem
Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for
More informationEE 229B ERROR CONTROL CODING Spring 2005
EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with
More informationMaximum Distance Separable Symbol-Pair Codes
2012 IEEE International Symposium on Information Theory Proceedings Maximum Distance Separable Symbol-Pair Codes Yeow Meng Chee, Han Mao Kiah, and Chengmin Wang School of Physical and Mathematical Sciences,
More informationMathematics Department
Mathematics Department Matthew Pressland Room 7.355 V57 WT 27/8 Advanced Higher Mathematics for INFOTECH Exercise Sheet 2. Let C F 6 3 be the linear code defined by the generator matrix G = 2 2 (a) Find
More informationChapter 1. Vectors, Matrices, and Linear Spaces
1.6 Homogeneous Systems, Subspaces and Bases 1 Chapter 1. Vectors, Matrices, and Linear Spaces 1.6. Homogeneous Systems, Subspaces and Bases Note. In this section we explore the structure of the solution
More informationLinear Codes, Target Function Classes, and Network Computing Capacity
Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:
More informationAssignment 1 Math 5341 Linear Algebra Review. Give complete answers to each of the following questions. Show all of your work.
Assignment 1 Math 5341 Linear Algebra Review Give complete answers to each of the following questions Show all of your work Note: You might struggle with some of these questions, either because it has
More informationCodes for Partially Stuck-at Memory Cells
1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il
More informationGRAY codes were found by Gray [15] and introduced
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 45, NO 7, NOVEMBER 1999 2383 The Structure of Single-Track Gray Codes Moshe Schwartz Tuvi Etzion, Senior Member, IEEE Abstract Single-track Gray codes are cyclic
More informationCodes on Graphs, Normal Realizations, and Partition Functions
Codes on Graphs, Normal Realizations, and Partition Functions G. David Forney, Jr. 1 Workshop on Counting, Inference and Optimization Princeton, NJ November 3, 2011 1 Joint work with: Heide Gluesing-Luerssen,
More informationGraph-based codes for flash memory
1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background
More informationMath 512 Syllabus Spring 2017, LIU Post
Week Class Date Material Math 512 Syllabus Spring 2017, LIU Post 1 1/23 ISBN, error-detecting codes HW: Exercises 1.1, 1.3, 1.5, 1.8, 1.14, 1.15 If x, y satisfy ISBN-10 check, then so does x + y. 2 1/30
More informationBINARY CODES. Binary Codes. Computer Mathematics I. Jiraporn Pooksook Department of Electrical and Computer Engineering Naresuan University
Binary Codes Computer Mathematics I Jiraporn Pooksook Department of Electrical and Computer Engineering Naresuan University BINARY CODES: BCD Binary Coded Decimal system is represented by a group of 4
More informationCyclic Redundancy Check Codes
Cyclic Redundancy Check Codes Lectures No. 17 and 18 Dr. Aoife Moloney School of Electronics and Communications Dublin Institute of Technology Overview These lectures will look at the following: Cyclic
More informationSimplified Composite Coding for Index Coding
Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,
More informationarxiv: v4 [cs.it] 14 May 2013
arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University
More informationLow-Complexity Puncturing and Shortening of Polar Codes
Low-Complexity Puncturing and Shortening of Polar Codes Valerio Bioglio, Frédéric Gabry, Ingmar Land Mathematical and Algorithmic Sciences Lab France Research Center, Huawei Technologies Co. Ltd. Email:
More informationX row 1 X row 2, X row 2 X row 3, Z col 1 Z col 2, Z col 2 Z col 3,
1 Ph 219c/CS 219c Exercises Due: Thursday 9 March 2017.1 A cleaning lemma for CSS codes In class we proved the cleaning lemma for stabilizer codes, which says the following: For an [[n, k]] stabilizer
More informationError Detection and Correction: Hamming Code; Reed-Muller Code
Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation
More informationA Singleton Bound for Lattice Schemes
1 A Singleton Bound for Lattice Schemes Srikanth B. Pai, B. Sundar Rajan, Fellow, IEEE Abstract arxiv:1301.6456v4 [cs.it] 16 Jun 2015 In this paper, we derive a Singleton bound for lattice schemes and
More informationChapter 2. Error Correcting Codes. 2.1 Basic Notions
Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.
More informationImproved Upper Bounds on Sizes of Codes
880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE
More informationBit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching
Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, Duan-Shin Lee, and Chao-Yi Chen Institute of Communications Engineering
More informationInformation redundancy
Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant
More informationBinary Linear Codes G = = [ I 3 B ] , G 4 = None of these matrices are in standard form. Note that the matrix 1 0 0
Coding Theory Massoud Malek Binary Linear Codes Generator and Parity-Check Matrices. A subset C of IK n is called a linear code, if C is a subspace of IK n (i.e., C is closed under addition). A linear
More informationLecture 3: Error Correcting Codes
CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error
More informationBounds on Asymptotic Rate of Capacitive Crosstalk Avoidance Codes for On-chip Buses
Bounds on Asymptotic Rate of Capacitive Crosstalk Avoidance Codes for On-chip Buses Tadashi Wadayama and Taisuke Izumi Nagoya Institute of Technology, Japan Email: wadayama@nitech.ac.jp, t-izumi@nitech.ac.jp
More informationOn Secure Index Coding with Side Information
On Secure Index Coding with Side Information Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological University 21 Nanyang Link, Singapore 637371 Email:
More informationOn Linear Subspace Codes Closed under Intersection
On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F
More informationAssume that the follow string of bits constitutes one of the segments we which to transmit.
Cyclic Redundancy Checks( CRC) Cyclic Redundancy Checks fall into a class of codes called Algebraic Codes; more specifically, CRC codes are Polynomial Codes. These are error-detecting codes, not error-correcting
More informationIN this paper, we consider the capacity of sticky channels, a
72 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 1, JANUARY 2008 Capacity Bounds for Sticky Channels Michael Mitzenmacher, Member, IEEE Abstract The capacity of sticky channels, a subclass of insertion
More informationNetwork Coding and Schubert Varieties over Finite Fields
Network Coding and Schubert Varieties over Finite Fields Anna-Lena Horlemann-Trautmann Algorithmics Laboratory, EPFL, Schweiz October 12th, 2016 University of Kentucky What is this talk about? 1 / 31 Overview
More informationMultimedia Systems WS 2010/2011
Multimedia Systems WS 2010/2011 15.11.2010 M. Rahamatullah Khondoker (Room # 36/410 ) University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de
More informationChapter 2: Linear Independence and Bases
MATH20300: Linear Algebra 2 (2016 Chapter 2: Linear Independence and Bases 1 Linear Combinations and Spans Example 11 Consider the vector v (1, 1 R 2 What is the smallest subspace of (the real vector space
More informationchannel of communication noise Each codeword has length 2, and all digits are either 0 or 1. Such codes are called Binary Codes.
5 Binary Codes You have already seen how check digits for bar codes (in Unit 3) and ISBN numbers (Unit 4) are used to detect errors. Here you will look at codes relevant for data transmission, for example,
More informationChapter 3 Linear Block Codes
Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and
More informationEfficient Decoding of Permutation Codes Obtained from Distance Preserving Maps
2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical
More informationWe showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true.
Dimension We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true. Lemma If a vector space V has a basis B containing n vectors, then any set containing more
More informationLinear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 26 Linear Block Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay July 28, 2014 Binary Block Codes 3 / 26 Let F 2 be the set
More informationLecture 21: P vs BPP 2
Advanced Complexity Theory Spring 206 Prof. Dana Moshkovitz Lecture 2: P vs BPP 2 Overview In the previous lecture, we began our discussion of pseudorandomness. We presented the Blum- Micali definition
More informationMath Linear algebra, Spring Semester Dan Abramovich
Math 52 0 - Linear algebra, Spring Semester 2012-2013 Dan Abramovich Fields. We learned to work with fields of numbers in school: Q = fractions of integers R = all real numbers, represented by infinite
More informationNew constructions of WOM codes using the Wozencraft ensemble
New constructions of WOM codes using the Wozencraft ensemble Amir Shpilka Abstract In this paper we give several new constructions of WOM codes. The novelty in our constructions is the use of the so called
More informationLinear Algebra. Paul Yiu. 6D: 2-planes in R 4. Department of Mathematics Florida Atlantic University. Fall 2011
Linear Algebra Paul Yiu Department of Mathematics Florida Atlantic University Fall 2011 6D: 2-planes in R 4 The angle between a vector and a plane The angle between a vector v R n and a subspace V is the
More informationLecture 12: November 6, 2017
Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and
More informationConstructing network codes using Möbius transformations
Constructing network codes using Möbius transformations Andreas-Stephan Elsenhans and Axel Kohnert November 26, 2010 Abstract We study error correcting constant dimension subspace codes for network coding.
More informationFamily Feud Review. Linear Algebra. October 22, 2013
Review Linear Algebra October 22, 2013 Question 1 Let A and B be matrices. If AB is a 4 7 matrix, then determine the dimensions of A and B if A has 19 columns. Answer 1 Answer A is a 4 19 matrix, while
More informationMATH 112 QUADRATIC AND BILINEAR FORMS NOVEMBER 24, Bilinear forms
MATH 112 QUADRATIC AND BILINEAR FORMS NOVEMBER 24,2015 M. J. HOPKINS 1.1. Bilinear forms and matrices. 1. Bilinear forms Definition 1.1. Suppose that F is a field and V is a vector space over F. bilinear
More informationAn Introduction to (Network) Coding Theory
An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network
More informationCapacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity
Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity Henry D. Pfister, Member, Igal Sason, Member, and Rüdiger Urbanke Abstract We present two sequences of ensembles of non-systematic
More informationCorrecting Bursty and Localized Deletions Using Guess & Check Codes
Correcting Bursty and Localized Deletions Using Guess & Chec Codes Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University serge..hanna@rutgers.edu, salim.elrouayheb@rutgers.edu Abstract
More information2018 Fall 2210Q Section 013 Midterm Exam II Solution
08 Fall 0Q Section 0 Midterm Exam II Solution True or False questions points 0 0 points) ) Let A be an n n matrix. If the equation Ax b has at least one solution for each b R n, then the solution is unique
More informationCorrecting Localized Deletions Using Guess & Check Codes
55th Annual Allerton Conference on Communication, Control, and Computing Correcting Localized Deletions Using Guess & Check Codes Salim El Rouayheb Rutgers University Joint work with Serge Kas Hanna and
More informationMATH3302. Coding and Cryptography. Coding Theory
MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................
More informationOrthogonal Arrays & Codes
Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible
More informationRepresentation of Correlated Sources into Graphs for Transmission over Broadcast Channels
Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu
More informationInformation Leakage of Correlated Source Coded Sequences over a Channel with an Eavesdropper
Information Leakage of Correlated Source Coded Sequences over a Channel with an Eavesdropper Reevana Balmahoon and Ling Cheng School of Electrical and Information Engineering University of the Witwatersrand
More informationTHIS paper is aimed at designing efficient decoding algorithms
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used
More informationExplicit Receivers for Optical Communication and Quantum Reading
Explicit Receivers for Optical Communication and Quantum Reading Mark M. Wilde School of Computer Science, McGill University Joint work with Saikat Guha, Si-Hui Tan, and Seth Lloyd arxiv:1202.0518 ISIT
More information(a). W contains the zero vector in R n. (b). W is closed under addition. (c). W is closed under scalar multiplication.
. Subspaces of R n Bases and Linear Independence Definition. Subspaces of R n A subset W of R n is called a subspace of R n if it has the following properties: (a). W contains the zero vector in R n. (b).
More informationMTH5102 Spring 2017 HW Assignment 3: Sec. 1.5, #2(e), 9, 15, 20; Sec. 1.6, #7, 13, 29 The due date for this assignment is 2/01/17.
MTH5102 Spring 2017 HW Assignment 3: Sec. 1.5, #2(e), 9, 15, 20; Sec. 1.6, #7, 13, 29 The due date for this assignment is 2/01/17. Sec. 1.5, #2(e). Determine whether the following sets are linearly dependent
More informationNew constructions of WOM codes using the Wozencraft ensemble
New constructions of WOM codes using the Wozencraft ensemble Amir Shpilka Abstract In this paper we give several new constructions of WOM codes. The novelty in our constructions is the use of the so called
More informationEnhancing Binary Images of Non-Binary LDPC Codes
Enhancing Binary Images of Non-Binary LDPC Codes Aman Bhatia, Aravind R Iyengar, and Paul H Siegel University of California, San Diego, La Jolla, CA 92093 0401, USA Email: {a1bhatia, aravind, psiegel}@ucsdedu
More informationPolar Code Construction for List Decoding
1 Polar Code Construction for List Decoding Peihong Yuan, Tobias Prinz, Georg Böcherer arxiv:1707.09753v1 [cs.it] 31 Jul 2017 Abstract A heuristic construction of polar codes for successive cancellation
More informationAn Introduction to (Network) Coding Theory
An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history
More informationIndex Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan
Index Coding Trivandrum School on Communication, Coding and Networking 2017 Prasad Krishnan Signal Processing and Communications Research Centre, International Institute of Information Technology, Hyderabad
More informationOptimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction
Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes
More informationApproximately achieving the feedback interference channel capacity with point-to-point codes
Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used
More informationUnordered Error-Correcting Codes and their Applications
Unordered Error-Correcting Codes and their Applications Mario Blaum and Jehoshua Bruck IBM Research Division Almaden Research Center San Jose, CA 95120 Abstract We give efficient constructions for error
More informationX 1 : X Table 1: Y = X X 2
ECE 534: Elements of Information Theory, Fall 200 Homework 3 Solutions (ALL DUE to Kenneth S. Palacio Baus) December, 200. Problem 5.20. Multiple access (a) Find the capacity region for the multiple-access
More informationAlgebraic Codes for Error Control
little -at- mathcs -dot- holycross -dot- edu Department of Mathematics and Computer Science College of the Holy Cross SACNAS National Conference An Abstract Look at Algebra October 16, 2009 Outline Coding
More informationLocally Encodable and Decodable Codes for Distributed Storage Systems
Locally Encodable and Decodable Codes for Distributed Storage Systems Son Hoang Dau, Han Mao Kiah, Wentu Song, Chau Yuen Singapore University of Technology and Design, Nanyang Technological University,
More information4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE
4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,
More informationSecure RAID Schemes from EVENODD and STAR Codes
Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity
More informationLECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem
LECTURE 15 Last time: Feedback channel: setting up the problem Perfect feedback Feedback capacity Data compression Lecture outline Joint source and channel coding theorem Converse Robustness Brain teaser
More information4 An Introduction to Channel Coding and Decoding over BSC
4 An Introduction to Channel Coding and Decoding over BSC 4.1. Recall that channel coding introduces, in a controlled manner, some redundancy in the (binary information sequence that can be used at the
More informationREPRESENTATION THEORY OF S n
REPRESENTATION THEORY OF S n EVAN JENKINS Abstract. These are notes from three lectures given in MATH 26700, Introduction to Representation Theory of Finite Groups, at the University of Chicago in November
More informationQuantum Error-Correcting Codes by Concatenation
Second International Conference on Quantum Error Correction University of Southern California, Los Angeles, USA December 5 9, 2011 Quantum Error-Correcting Codes by Concatenation Markus Grassl joint work
More informationA Comparison of Two Achievable Rate Regions for the Interference Channel
A Comparison of Two Achievable Rate Regions for the Interference Channel Hon-Fah Chong, Mehul Motani, and Hari Krishna Garg Electrical & Computer Engineering National University of Singapore Email: {g030596,motani,eleghk}@nus.edu.sg
More informationChapter 3. Directions: For questions 1-11 mark each statement True or False. Justify each answer.
Chapter 3 Directions: For questions 1-11 mark each statement True or False. Justify each answer. 1. (True False) Asking whether the linear system corresponding to an augmented matrix [ a 1 a 2 a 3 b ]
More informationVector spaces. EE 387, Notes 8, Handout #12
Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is
More informationCovert Communication with Channel-State Information at the Transmitter
Covert Communication with Channel-State Information at the Transmitter Si-Hyeon Lee Joint Work with Ligong Wang, Ashish Khisti, and Gregory W. Wornell July 27, 2017 1 / 21 Covert Communication Transmitter
More information6.4 BASIS AND DIMENSION (Review) DEF 1 Vectors v 1, v 2,, v k in a vector space V are said to form a basis for V if. (a) v 1,, v k span V and
6.4 BASIS AND DIMENSION (Review) DEF 1 Vectors v 1, v 2,, v k in a vector space V are said to form a basis for V if (a) v 1,, v k span V and (b) v 1,, v k are linearly independent. HMHsueh 1 Natural Basis
More informationTilings of Binary Spaces
Tilings of Binary Spaces Gérard Cohen Département Informatique ENST, 46 rue Barrault 75634 Paris, France Simon Litsyn Department of Electrical Engineering Tel-Aviv University Ramat-Aviv 69978, Israel Alexander
More informationEfficient Bounded Distance Decoders for Barnes-Wall Lattices
Efficient Bounded Distance Decoders for Barnes-Wall Lattices Daniele Micciancio Antonio Nicolosi April 30, 2008 Abstract We describe a new family of parallelizable bounded distance decoding algorithms
More information9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise
9 THEORY OF CODES Chapter 9 Theory of Codes After studying this chapter you should understand what is meant by noise, error detection and correction; be able to find and use the Hamming distance for a
More informationEntropies & Information Theory
Entropies & Information Theory LECTURE I Nilanjana Datta University of Cambridge,U.K. See lecture notes on: http://www.qi.damtp.cam.ac.uk/node/223 Quantum Information Theory Born out of Classical Information
More informationFlip-N-Write: A Simple Deterministic Technique to Improve PRAM Write Performance, Energy and Endurance. Presenter: Brian Wongchaowart March 17, 2010
Flip-N-Write: A Simple Deterministic Technique to Improve PRAM Write Performance, Energy and Endurance Sangyeun Cho Hyunjin Lee Presenter: Brian Wongchaowart March 17, 2010 Motivation Suppose that you
More informationCapacity achieving multiwrite WOM codes
Capacity achieving multiwrite WOM codes Amir Shpilka Abstract arxiv:1209.1128v1 [cs.it] 5 Sep 2012 In this paper we give an explicit construction of a capacity achieving family of binary t-write WOM codes
More informationLET F q be the finite field of size q. For two k l matrices
1 Codes and Designs Related to Lifted MRD Codes Tuvi Etzion, Fellow, IEEE and Natalia Silberstein arxiv:1102.2593v5 [cs.it 17 ug 2012 bstract Lifted maximum ran distance (MRD) codes, which are constant
More informationMath 54. Selected Solutions for Week 5
Math 54. Selected Solutions for Week 5 Section 4. (Page 94) 8. Consider the following two systems of equations: 5x + x 3x 3 = 5x + x 3x 3 = 9x + x + 5x 3 = 4x + x 6x 3 = 9 9x + x + 5x 3 = 5 4x + x 6x 3
More information6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory
6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of
More informationexercise in the previous class (1)
exercise in the previous class () Consider an odd parity check code C whose codewords are (x,, x k, p) with p = x + +x k +. Is C a linear code? No. x =, x 2 =x =...=x k = p =, and... is a codeword x 2
More informationLower Bounds on the Graphical Complexity of Finite-Length LDPC Codes
Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International
More informationcommunication complexity lower bounds yield data structure lower bounds
communication complexity lower bounds yield data structure lower bounds Implementation of a database - D: D represents a subset S of {...N} 2 3 4 Access to D via "membership queries" - Q for each i, can
More information