Skip to main content

Showing 1–6 of 6 results for author: Horovitz, M

  1. arXiv:2303.00364  [pdf, other

    cs.CV cs.LG

    Lessons Learned Report: Super-Resolution for Detection Tasks in Engineering Problem-Solving

    Authors: Martin Feder, Michal Horovitz, Assaf Chen, Raphael Linker, Ofer M. Shir

    Abstract: We describe the lessons learned from targeting agricultural detection problem-solving, when subject to low resolution input maps, by means of Machine Learning-based super-resolution approaches. The underlying domain is the so-called agro-detection class of problems, and the specific objective is to learn a complementary ensemble of sporadic input maps. While super-resolution algorithms are branded… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

  2. arXiv:2109.09932  [pdf, other

    cs.IT

    Endurance-Limited Memories: Capacity and Codes

    Authors: Yeow Meng Chee, Michal Horovitz, Alexander Vardy, Van Khu Vu, Eitan Yaakobi

    Abstract: \emph{Resistive memories}, such as \emph{phase change memories} and \emph{resistive random access memories} have attracted significant attention in recent years due to their better scalability, speed, rewritability, and yet non-volatility. However, their \emph{limited endurance} is still a major drawback that has to be improved before they can be widely adapted in large-scale systems. In this wo… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

  3. arXiv:1901.03084  [pdf, other

    cs.IT

    Iterative Programming of Noisy Memory Cells

    Authors: Michal Horovitz, Eitan Yaakobi, Eyal En Gad, Jehoshua Bruck

    Abstract: In this paper, we study a model, which was first presented by Bunte and Lapidoth, that mimics the programming operation of memory cells. Under this paradigm we assume that cells are programmed sequentially and individually. The programming process is modeled as transmission over a channel, while it is possible to read the cell state in order to determine its programming success, and in case of pro… ▽ More

    Submitted 10 January, 2019; originally announced January 2019.

    Comments: 10 pages, 2 figures

  4. arXiv:1404.5021  [pdf, ps, other

    cs.IT

    Local Rank Modulation for Flash Memories II

    Authors: Michal Horovitz, Tuvi Etzion

    Abstract: Local rank modulation scheme was suggested recently for representing information in flash memories in order to overcome drawbacks of rank modulation. For $0 < s\leq t\leq n$ with $s$ divides $n$, an $(s,t,n)$-LRM scheme is a local rank modulation scheme where the $n$ cells are locally viewed cyclically through a sliding window of size $t$ resulting in a sequence of small permutations which require… ▽ More

    Submitted 20 April, 2014; originally announced April 2014.

    Comments: submitted to ITW2014

  5. arXiv:1311.4864  [pdf, other

    cs.IT

    Local Rank Modulation for Flash Memories

    Authors: Michal Horovitz

    Abstract: Local rank modulation scheme was suggested recently for representing information in flash memories in order to overcome drawbacks of rank modulation. For $s\leq t\leq n$ with $s|n$, $(s,t,n)$-LRM scheme is a local rank modulation scheme where the $n$ cells are locally viewed through a sliding window of size $t$ resulting in a sequence of small permutations which requires less comparisons and less… ▽ More

    Submitted 19 November, 2013; originally announced November 2013.

    Comments: arXiv admin note: text overlap with arXiv:1310.5515 by other authors without attribution

  6. arXiv:1311.4703  [pdf, other

    cs.IT math.CO

    Constructions of Snake-in-the-Box Codes for Rank Modulation

    Authors: Michal Horovitz, Tuvi Etzion

    Abstract: Snake-in-the-box code is a Gray code which is capable of detecting a single error. Gray codes are important in the context of the rank modulation scheme which was suggested recently for representing information in flash memories. For a Gray code in this scheme the codewords are permutations, two consecutive codewords are obtained by using the "push-to-the-top" operation, and the distance measure i… ▽ More

    Submitted 14 September, 2014; v1 submitted 19 November, 2013; originally announced November 2013.

    Comments: IEEE Transactions on Information Theory