Skip to main content

Showing 1–27 of 27 results for author: Duursma, I

  1. Accelerating Polarization via Alphabet Extension

    Authors: Iwan Duursma, Ryan Gabrys, Venkatesan Guruswami, Ting-Chun Lin, Hsin-Po Wang

    Abstract: Polarization is an unprecedented coding technique in that it not only achieves channel capacity, but also does so at a faster speed of convergence than any other coding technique. This speed is measured by the ``scaling exponent'' and its importance is three-fold. Firstly, estimating the scaling exponent is challenging and demands a deeper understanding of the dynamics of communication channels. S… ▽ More

    Submitted 15 July, 2023; v1 submitted 10 July, 2022; originally announced July 2022.

    Comments: 22 pages, 4 figures. Accepted to RANDOM 2022. v2: 29 pages, 5 figures, 1 table; address comments from JSAIT

    MSC Class: 94B65

  2. arXiv:2011.15082  [pdf, other

    cs.IT math.CO

    Parity-Checked Strassen Algorithm

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: To multiply astronomic matrices using parallel workers subject to straggling, we recommend interleaving checksums with some fast matrix multiplication algorithms. Nesting the parity-checked algorithms, we weave a product code flavor protection. Two demonstrative configurations are as follows: (A) $9$ workers multiply two $2\times 2$ matrices; each worker multiplies two linear combinations of ent… ▽ More

    Submitted 11 January, 2022; v1 submitted 30 November, 2020; originally announced November 2020.

    Comments: 40 pages, 18 figures, 2 tables; v2 adds MSC and applies corrections; v3 applies corrections

    MSC Class: 94B05; 68W10 (Primary) 05B35 (Secondary)

  3. Multilinear Algebra for Minimum Storage Regenerating Codes

    Authors: Iwan Duursma, Hsin-Po Wang

    Abstract: An $(n, k, d, α)$-MSR (minimum storage regeneration) code is a set of $n$ nodes used to store a file. For a file of total size $kα$, each node stores $α$ symbols, any $k$ nodes recover the file, and any $d$ nodes can repair any other node via each sending out $α/(d-k+1)$ symbols. In this work, we explore various ways to re-express the infamous product-matrix construction using skew-symmetric mat… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

    Comments: 36 pages, 9 figures, 3 tables

    MSC Class: 94B27 (Primary) 15A69 (Secondary)

  4. arXiv:2006.08911  [pdf, ps, other

    cs.IT math.AC

    Multilinear Algebra for Distributed Storage

    Authors: Iwan Duursma, Xiao Li, Hsin-Po Wang

    Abstract: An $(n, k, d, α, β, M)$-ERRC (exact-repair regenerating code) is a collection of $n$ nodes used to store a file. For a file of total size $M$, each node stores $α$ symbols, any $k$ nodes recover the file, and any $d$ nodes repair any other node via sending out $β$ symbols. We establish a multilinear algebra foundation to assemble $(n, k, d, α, β, M)$-ERRCs for all meaningful $(n, k, d)$ tuples. Ou… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

    Comments: 33 pages, 6 figures, 1 table

    MSC Class: 94B27 (Primary); 15A75 (Secondary)

  5. arXiv:1912.10388  [pdf, ps, other

    math.CO cs.IT

    Johnson Graph Codes

    Authors: Iwan Duursma, Xiao Li

    Abstract: We define a Johnson graph code as a subspace of labelings of the vertices in a Johnson graph with the property that labelings are uniquely determined by their restriction to vertex neighborhoods specified by the parameters of the code. We give a construction and main properties for the codes and show their role in the concatenation of layered codes that are used in distributed storage systems. A s… ▽ More

    Submitted 22 December, 2019; originally announced December 2019.

    Comments: 33 pages

  6. Polar Codes' Simplicity, Random Codes' Durability

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: Over any discrete memoryless channel, we build codes such that: for one, their block error probabilities and code rates scale like random codes'; and for two, their encoding and decoding complexities scale like polar codes'. Quantitatively, for any constants $π,ρ>0$ such that $π+2ρ<1$, we construct a sequence of error correction codes with block length $N$ approaching infinity, block error probabi… ▽ More

    Submitted 18 December, 2019; originally announced December 2019.

    Comments: 55 pages, 8 figures, 2 tables

  7. arXiv:1906.10620  [pdf, ps, other

    cs.IT math.AG

    Isometry-Dual Flags of AG Codes

    Authors: Maria Bras-Amorós, Iwan Duursma, Euijin Hong

    Abstract: Consider a complete flag $\{0\} = C_0 < C_1 < \cdots < C_n = \mathbb{F}^n$ of one-point AG codes of length $n$ over the finite field $\mathbb{F}$. The codes are defined by evaluating functions with poles at a given point $Q$ in points $P_1,\dots,P_n$ distinct from $Q$. A flag has the isometry-dual property if the given flag and the corresponding dual flag are the same up to isometry. For several c… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.

    Comments: 25 pages

  8. Log-logarithmic Time Pruned Polar Coding

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: A pruned variant of polar coding is proposed for binary erasure channels. For sufficiently small $\varepsilon>0$, we construct a series of capacity achieving codes with block length $N=\varepsilon^{-5}$, code rate $R=\text{Capacity}-\varepsilon$, error probability $P=\varepsilon$, and encoding and decoding time complexity $\text{bC}=O(\log\left|\log\varepsilon\right|)$ per information bit. The g… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

    Comments: 13 pages, 13 figures; we extend arXiv:1812.08106 and remove "BEC" from title

  9. arXiv:1812.08112  [pdf, ps, other

    cs.IT

    Polar-like Codes and Asymptotic Tradeoff among Block Length, Code Rate, and Error Probability

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: A general framework is proposed that includes polar codes over arbitrary channels with arbitrary kernels. The asymptotic tradeoff among block length $N$, code rate $R$, and error probability $P$ is analyzed. Given a tradeoff between $N,P$ and a tradeoff between $N,R$, we return an interpolating tradeoff among $N,R,P$ (Theorem 5). $\def\Capacity{\text{Capacity}}$Quantitatively, if… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Comments: 25 pages, 106 figures

  10. arXiv:1812.08106  [pdf, ps, other

    cs.IT

    Log-logarithmic Time Pruned Polar Coding on Binary Erasure Channels

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: A pruned variant of polar coding is reinvented for all binary erasure channels. For small $\varepsilon>0$, we construct codes with block length $\varepsilon^{-5}$, code rate $\text{Capacity}-\varepsilon$, error probability $\varepsilon$, and encoding and decoding time complexity $O(N\log|\log\varepsilon|)$ per block, equivalently $O(\log|\log\varepsilon|)$ per information bit (Propositions 5 to 8)… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Comments: 16 pages, 144 figures

  11. arXiv:1806.02405  [pdf, other

    cs.IT

    Polar Code Moderate Deviation: Recovering the Scaling Exponent

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: In 2008 Arikan proposed polar coding [arXiv:0807.3917] which we summarize as follows: (a) From the root channel $W$ synthesize recursively a series of channels $W_N^{(1)},\dotsc,W_N^{(N)}$. (b) Select sophisticatedly a subset $A$ of synthetic channels. (c) Transmit information using synthetic channels indexed by $A$ and freeze the remaining synthetic channels. Arikan gives each synthetic channel… ▽ More

    Submitted 6 June, 2018; originally announced June 2018.

    Comments: 17 pages, 33 figures

  12. arXiv:1801.05101  [pdf, other

    cs.IT

    On the I/O Costs of Some Repair Schemes for Full-Length Reed-Solomon Codes

    Authors: Hoang Dau, Iwan Duursma, Hien Chu

    Abstract: Network transfer and disk read are the most time consuming operations in the repair process for node failures in erasure-code-based distributed storage systems. Recent developments on Reed-Solomon codes, the most widely used erasure codes in practical storage systems, have shown that efficient repair schemes specifically tailored to these codes can significantly reduce the network bandwidth spent… ▽ More

    Submitted 9 May, 2018; v1 submitted 15 January, 2018; originally announced January 2018.

    Comments: Accepted by the ISIT'18

  13. arXiv:1707.05944  [pdf, ps, other

    cs.IT

    Codes with Locality in the Rank and Subspace Metrics

    Authors: Swanand Kadhe, Salim El Rouayheb, Iwan Duursma, Alex Sprintson

    Abstract: We extend the notion of locality from the Hamming metric to the rank and subspace metrics. Our main contribution is to construct a class of array codes with locality constraints in the rank metric. Our motivation for constructing such codes stems from designing codes for efficient data recovery from correlated and/or mixed (i.e., complete and partial) failures in distributed storage systems. Speci… ▽ More

    Submitted 5 May, 2019; v1 submitted 19 July, 2017; originally announced July 2017.

    Comments: Presented in part at the 2016 Allerton Conference (see version 1). The second version additionally contains the notion of locality in the subspace metric. The third version additionally contains an application of subspace-locality to distributed storage systems, where nodes can be accessed over a noisy network

  14. arXiv:1701.07118  [pdf, other

    cs.IT

    Repairing Reed-Solomon Codes With Two Erasures

    Authors: Hoang Dau, Iwan Duursma, Han Mao Kiah, Olgica Milenkovic

    Abstract: Despite their exceptional error-correcting properties, Reed-Solomon (RS) codes have been overlooked in distributed storage applications due to the common belief that they have poor repair bandwidth: A naive repair approach would require the whole file to be reconstructed in order to recover a single erased codeword symbol. In a recent work, Guruswami and Wootters (STOC'16) proposed a single-erasur… ▽ More

    Submitted 14 May, 2017; v1 submitted 24 January, 2017; originally announced January 2017.

    Comments: ISIT'17 (accepted), 5 pages. arXiv admin note: substantial text overlap with arXiv:1612.01361

  15. Repairing Reed-Solomon Codes With Multiple Erasures

    Authors: Hoang Dau, Iwan Duursma, Han Mao Kiah, Olgica Milenkovic

    Abstract: Despite their exceptional error-correcting properties, Reed-Solomon codes have been overlooked in distributed storage applications due to the common belief that they have poor repair bandwidth: A naive repair approach would require the whole file to be reconstructed in order to recover a single erased codeword symbol. In a recent work, Guruswami and Wootters (STOC'16) proposed a single-erasure rep… ▽ More

    Submitted 2 May, 2020; v1 submitted 28 November, 2016; originally announced December 2016.

    Comments: 15 pages

    Journal ref: IEEE Transactions on Information Theory (2018) 64(10) 6567-6582

  16. arXiv:1509.08376  [pdf, ps, other

    cs.IT

    Matrix Theory for Minimal Trellises

    Authors: Iwan M. Duursma

    Abstract: Trellises provide a graphical representation for the row space of a matrix. The product construction of Kschischang and Sorokine builds minimal conventional trellises from matrices in minimal span form. Koetter and Vardy showed that minimal tail-biting trellises can be obtained by applying the product construction to submatrices of a characteristic matrix. We introduce the unique reduced minimal… ▽ More

    Submitted 28 September, 2015; originally announced September 2015.

  17. arXiv:1505.00178  [pdf, ps, other

    cs.IT

    Shortened regenerating codes

    Authors: Iwan M. Duursma

    Abstract: For general exact repair regenerating codes, the optimal trade-offs between storage size and repair bandwith remain undetermined. Various outer bounds and partial results have been proposed. Using a simple chain rule argument we identify nonnegative differences between the functional repair and the exact repair outer bounds. One of the differences is then bounded from below by the repair data of a… ▽ More

    Submitted 1 May, 2015; originally announced May 2015.

    Comments: 11 pages

  18. arXiv:1406.4852  [pdf, ps, other

    cs.IT

    Outer bounds for exact repair codes

    Authors: Iwan M. Duursma

    Abstract: We address the open problem of establishing the rate region for exact-repair regenerating codes for given parameters (n,k,d). Tian determined the rate region for a (4,3,3) code and found that it lies strictly within the functional-repair rate region. Using different methods, Sasidharan, Senthoor and Kumar proved a non-vanishing gap between the functional-repair outer bound and the exact-repair out… ▽ More

    Submitted 18 June, 2014; originally announced June 2014.

    Comments: 14 pages, 1 figure

  19. arXiv:1310.7159  [pdf, other

    cs.IT math.AG

    Using concatenated algebraic geometry codes in channel polarization

    Authors: Abdulla Eid, Iwan Duursma

    Abstract: Polar codes were introduced by Arikan in 2008 and are the first family of error-correcting codes achieving the symmetric capacity of an arbitrary binary-input discrete memoryless channel under low complexity encoding and using an efficient successive cancellation decoding strategy. Recently, non-binary polar codes have been studied, in which one can use different algebraic geometry codes to achiev… ▽ More

    Submitted 27 October, 2013; originally announced October 2013.

    Comments: 8 pages, 6 figures

  20. arXiv:1310.5187  [pdf, ps, other

    cs.IT

    Distributed Reed-Solomon Codes for Simple Multiple Access Networks

    Authors: Wael Halbawi, Tracey Ho, Hongyi Yao, Iwan Duursma

    Abstract: We consider a simple multiple access network in which a destination node receives information from multiple sources via a set of relay nodes. Each relay node has access to a subset of the sources, and is connected to the destination by a unit capacity link. We also assume that $z$ of the relay nodes are adversarial. We propose a computationally efficient distributed coding scheme and show that it… ▽ More

    Submitted 18 October, 2013; originally announced October 2013.

    Comments: 12 pages, 1 figure

  21. arXiv:1101.4603  [pdf, ps, other

    cs.IT math.AG math.NT

    Evaluation Codes from smooth Quadric Surfaces and Twisted Segre Varieties

    Authors: Alain Couvreur, Iwan Duursma

    Abstract: We give the parameters of any evaluation code on a smooth quadric surface. For hyperbolic quadrics the approach uses elementary results on product codes and the parameters of codes on elliptic quadrics are obtained by detecting a BCH structure of these codes and using the BCH bound. The elliptic quadric is a twist of the surface P^1 x P^1 and we detect a similar BCH structure on twists of the Segr… ▽ More

    Submitted 12 June, 2012; v1 submitted 24 January, 2011; originally announced January 2011.

    Comments: 10 pages. Presented at the conference Workshop on Coding theory and Cryptography 2011

    MSC Class: 94B27; 14J20; 94B15

    Journal ref: Des. Codes Cryptogr. 66(1), 291-303. 2013

  22. arXiv:1004.1752  [pdf, ps, other

    cs.IT math.AG math.NT

    Improved Two-Point Codes on Hermitian Curves

    Authors: Iwan Duursma, Radoslav Kirov

    Abstract: One-point codes on the Hermitian curve produce long codes with excellent parameters. Feng and Rao introduced a modified construction that improves the parameters while still using one-point divisors. A separate improvement of the parameters was introduced by Matthews considering the classical construction but with two-point divisors. Those two approaches are combined to describe an elementary cons… ▽ More

    Submitted 17 February, 2011; v1 submitted 10 April, 2010; originally announced April 2010.

  23. arXiv:1001.1374  [pdf, ps, other

    cs.IT math.AG

    Distance bounds for algebraic geometric codes

    Authors: Iwan Duursma, Radoslav Kirov, Seungkook Park

    Abstract: Various methods have been used to obtain improvements of the Goppa lower bound for the minimum distance of an algebraic geometric code. The main methods divide into two categories and all but a few of the known bounds are special cases of either the Lundell-McCullough floor bound or the Beelen order bound. The exceptions are recent improvements of the floor bound by Guneri-Stichtenoth-Taskin, an… ▽ More

    Submitted 8 January, 2010; originally announced January 2010.

    Comments: 29 pages

    MSC Class: 11T71; 14G50; 94B

  24. arXiv:0901.2864  [pdf, ps, other

    math.NT cs.IT math.AG

    An extension of the order bound for AG codes

    Authors: Iwan Duursma, Radoslav Kirov

    Abstract: The most successful method to obtain lower bounds for the minimum distance of an algebraic geometric code is the order bound, which generalizes the Feng-Rao bound. We provide a significant extension of the bound that improves the order bounds by Beelen and by Duursma and Park. We include an exhaustive numerical comparison of the different bounds for 10168 two-point codes on the Suzuki curve of g… ▽ More

    Submitted 19 January, 2009; originally announced January 2009.

    Comments: 11 pages

    MSC Class: 14G50; 11T71; 94B

  25. arXiv:math/0302172  [pdf, ps, other

    math.CO cs.IT math.NT

    Results on zeta functions for codes

    Authors: I. M. Duursma

    Abstract: We give a new and short proof of the Mallows-Sloane upper bound for self-dual codes. We formulate a version of Greene's theorem for normalized weight enumerators. We relate normalized rank-generating polynomials to two-variable zeta functions. And we show that a self-dual code has the Clifford property, but that the same property does not hold in general for formally self-dual codes.

    Submitted 14 February, 2003; originally announced February 2003.

    Comments: 12 pages

    MSC Class: 05B35; 14G15; 94B65

  26. arXiv:math/0302154  [pdf, ps, other

    math.NT cs.IT math.AG

    Twisted Klein curves modulo 2

    Authors: I. M. Duursma

    Abstract: We give an explicit description of all 168 quartic curves over the field of two elements that are isomorphic to the Klein curve over an algebraic extension. Some of the curves have been known for their small class number, others for attaining the maximal number of rational points.

    Submitted 12 February, 2003; originally announced February 2003.

    Comments: 14 pages

    MSC Class: 14H45

  27. arXiv:math/0302132  [pdf, ps, other

    math.CO cs.IT

    Computing Symmetrized Weight Enumerators for Lifted Quadratic Residue Codes

    Authors: I. M. Duursma, M. Greferath

    Abstract: The paper describes a method to determine symmetrized weight enumerators of $p^m$-linear codes based on the notion of a disjoint weight enumerator. Symmetrized weight enumerators are given for the lifted quadratic residue codes of length 24 modulo $2^m$ and modulo $3^m$, for any positive $m$.

    Submitted 11 February, 2003; originally announced February 2003.

    Comments: 9 pages

    MSC Class: 94B60