Skip to main content

Showing 1–7 of 7 results for author: Dabak, B

  1. arXiv:2405.14783  [pdf, other

    cs.HC

    Low-Energy Line Codes for On-Chip Networks

    Authors: Beyza Dabak, Major Glenn, Jingyang Liu, Alexander Buck, Siyi Yang, Robert Calderbank, Natalie Enright Jerger, Daniel J. Sorin

    Abstract: Energy is a primary constraint in processor design, and much of that energy is consumed in on-chip communication. Communication can be intra-core (e.g., from a register file to an ALU) or inter-core (e.g., over the on-chip network). In this paper, we use the on-chip network (OCN) as a case study for saving on-chip communication energy. We have identified a new way to reduce the OCN's link energy c… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    ACM Class: C.1.2

  2. arXiv:2402.09551  [pdf, ps, other

    cs.IT eess.SP

    Zak-OTFS and LDPC Codes

    Authors: Beyza Dabak, Venkatesh Khammammetti, Saif Khan Mohammed, Robert Calderbank

    Abstract: Orthogonal Time Frequency Space (OTFS) is a framework for communications and active sensing that processes signals in the delay-Doppler (DD) domain. It is informed by 6G propagation environments, where Doppler spreads measured in kHz make it more and more difficult to estimate channels, and the standard model-dependent approach to wireless communication is starting to break down. We consider Zak-O… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: 7 pages (double column), 6 figures, accepted at 2024 IEEE International Conference on Communications (ICC)

  3. arXiv:2304.14278  [pdf, other

    cs.IT

    LDPC Decoders Prefer More Reliable Parity Bits: Unequal Data Protection Over BSC

    Authors: Beyza Dabak, Ece Tiryaki, Robert Calderbank, Ahmed Hareedy

    Abstract: Low-density parity-check (LDPC) codes are specified by graphs, and are the error correction technique of choice in many communications and data storage contexts. Message passing decoders diffuse information carried by parity bits into the payload, and this paper measures the value of engineering parity bits to be more reliable than message bits. We consider the binary symmetric channel (BSC) and m… ▽ More

    Submitted 30 April, 2023; v1 submitted 27 April, 2023; originally announced April 2023.

    Comments: 8 pages (double column), 1 figure, submitted to the International Symposium on Topics in Coding (ISTC)

  4. arXiv:2101.09238  [pdf, other

    cs.IT eess.SP

    Unequal Error Protection Achieves Threshold Gains on BEC and BSC via Higher Fidelity Messages

    Authors: Beyza Dabak, Ahmed Hareedy, Alexei Ashikhmin, Robert Calderbank

    Abstract: Because of their capacity-approaching performance, graph-based codes have a wide range of applications, including communications and storage. In these codes, unequal error protection (UEP) can offer performance gains with limited rate loss. Recent empirical results in magnetic recording (MR) systems show that extra protection for the parity bits of a low-density parity-check (LDPC) code via constr… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

    Comments: 8 pages (double column), 3 figures, submitted to the IEEE International Symposium on Information Theory (ISIT)

  5. The Secret Arithmetic of Patterns: A General Method for Designing Constrained Codes Based on Lexicographic Indexing

    Authors: Ahmed Hareedy, Beyza Dabak, Robert Calderbank

    Abstract: Constrained codes are used to prevent errors from occurring in various data storage and data transmission systems. They can help in increasing the storage density of magnetic storage devices, in managing the lifetime of electronic storage devices, and in increasing the reliability of data transmission over wires. We recently introduced families of lexicographically-ordered constrained (LOCO) codes… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

    Comments: 35 pages (single column), 6 figures, submitted to the IEEE Transactions on Information Theory (TIT)

  6. Non-Binary Constrained Codes for Two-Dimensional Magnetic Recording

    Authors: Beyza Dabak, Ahmed Hareedy, Robert Calderbank

    Abstract: The two-dimensional magnetic recording (TDMR) technology promises storage densities of $10$ terabits per square inch. However, when tracks are squeezed together, a bit stored in the two-dimensional (TD) grid suffers inter-symbol interference (ISI) from adjacent bits in the same track, and inter-track interference (ITI) from nearby bits in the adjacent tracks. A bit is highly likely to be read inco… ▽ More

    Submitted 22 May, 2020; originally announced May 2020.

    Comments: 9 pages (double column), 2 figures, submitted to the IEEE Transactions on Magnetics (TMAG)

  7. Managing Device Lifecycle: Reconfigurable Constrained Codes for M/T/Q/P-LC Flash Memories

    Authors: Ahmed Hareedy, Beyza Dabak, Robert Calderbank

    Abstract: Flash memory devices are winning the competition for storage density against magnetic recording devices. This outcome results from advances in physics that allow storage of more than one bit per cell, coupled with advances in signal processing that reduce the effect of physical instabilities. Constrained codes are used in storage to avoid problematic patterns. Recently, we introduced binary symmet… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

    Comments: 10 pages (double column), 0 figures, to be submitted to the IEEE Transactions on Information Theory (TIT), a short version is to be submitted to the IEEE International Symposium on Information Theory (ISIT)

    Journal ref: IEEE Transactions on Information Theory, 2020