Skip to main content

Showing 1–50 of 60 results for author: Kiah, H M

  1. arXiv:2405.07180  [pdf, other

    cs.IT

    Repairing Reed-Solomon Codes with Side Information

    Authors: Thi Xinh Dinh, Ba Thong Le, Son Hoang Dau, Serdar Boztas, Stanislav Kruglik, Han Mao Kiah, Emanuele Viterbo, Tuvi Etzion, Yeow Meng Chee

    Abstract: We generalize the problem of recovering a lost/erased symbol in a Reed-Solomon code to the scenario in which some side information about the lost symbol is known. The side information is represented as a set $S$ of linearly independent combinations of the sub-symbols of the lost symbol. When $S = \varnothing$, this reduces to the standard problem of repairing a single codeword symbol. When $S$ is… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    MSC Class: 94B05; 94B60 ACM Class: E.4

  2. arXiv:2405.06870  [pdf, other

    cs.IT

    Noise-Tolerant Codebooks for Semi-Quantitative Group Testing: Application to Spatial Genomics

    Authors: Kok Hao Chen, Duc Tu Dao, Han Mao Kiah, Van Long Phuoc Pham, Eitan Yaakobi

    Abstract: Motivated by applications in spatial genomics, we revisit group testing (Dorfman~1943) and propose the class of $λ$-{\sf ADD}-codes, studying such codes with certain distance $d$ and codelength $n$. When $d$ is constant, we provide explicit code constructions with rates close to $1/2$. When $d$ is proportional to $n$, we provide a GV-type lower bound whose rates are efficiently computable. Upper b… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: To appear in ISIT 2024 Proceedings

  3. arXiv:2405.06583  [pdf, other

    cs.IT

    Private Repair of a Single Erasure in Reed-Solomon Codes

    Authors: Stanislav Kruglik, Han Mao Kiah, Son Hoang Dau, Eitan Yaakobi

    Abstract: We investigate the problem of privately recovering a single erasure for Reed-Solomon codes with low communication bandwidths. For an $[n,k]_{q^\ell}$ code with $n-k\geq q^{m}+t-1$, we construct a repair scheme that allows a client to recover an arbitrary codeword symbol without leaking its index to any set of $t$ colluding helper nodes at a repair bandwidth of $(n-1)(\ell-m)$ sub-symbols in… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: Full version of the paper accepted for the 2024 IEEE International Symposium on Information Theory (ISIT)

  4. arXiv:2405.03614  [pdf, ps, other

    cs.IT

    Repairing with Zero Skip Cost

    Authors: Wenqin Zhang, Yeow Meng Chee, Son Hoang Dau, Tuvi Etzion, Han Mao Kiah, Yuan Luo

    Abstract: To measure repair latency at helper nodes, we introduce a new metric called skip cost that quantifies the number of contiguous sections accessed on a disk. We provide explicit constructions of zigzag codes and fractional repetition codes that incur zero skip cost

    Submitted 6 May, 2024; originally announced May 2024.

  5. arXiv:2405.02080  [pdf, ps, other

    cs.IT

    Coding for Synthesis Defects

    Authors: Ziyang Lu, Han Mao Kiah, Yiwei Zhang, Robert N. Grass, Eitan Yaakobi

    Abstract: Motivated by DNA based data storage system, we investigate the errors that occur when synthesizing DNA strands in parallel, where each strand is appended one nucleotide at a time by the machine according to a template supersequence. If there is a cycle such that the machine fails, then the strands meant to be appended at this cycle will not be appended, and we refer to this as a synthesis defect.… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

  6. arXiv:2403.20170  [pdf, ps, other

    cs.IT

    Recovery Sets of Subspaces from a Simplex Code

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Hui Zhang

    Abstract: Recovery sets for vectors and subspaces are important in the construction of distributed storage system codes. These concepts are also interesting in their own right. In this paper, we consider the following very basic recovery question: what is the maximum number of possible pairwise disjoint recovery sets for each recovered element? The recovered elements in this work are d-dimensional subspaces… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

  7. arXiv:2403.15827  [pdf, ps, other

    cs.IT

    Permutation Recovery Problem against Deletion Errors for DNA Data Storage

    Authors: Shubhransh Singhvi, Charchit Gupta, Avital Boruchovsky, Yuval Goldberg, Han Mao Kiah, Eitan Yaakobi

    Abstract: Owing to its immense storage density and durability, DNA has emerged as a promising storage medium. However, due to technological constraints, data can only be written onto many short DNA molecules called data blocks that are stored in an unordered way. To handle the unordered nature of DNA data storage systems, a unique address is typically prepended to each data block to form a DNA strand. Howev… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.04597

  8. arXiv:2403.07754  [pdf, other

    cs.IT

    An Optimal Sequence Reconstruction Algorithm for Reed-Solomon Codes

    Authors: Shubhransh Singhvi, Roni Con, Han Mao Kiah, Eitan Yaakobi

    Abstract: The sequence reconstruction problem, introduced by Levenshtein in 2001, considers a scenario where the sender transmits a codeword from some codebook, and the receiver obtains $N$ noisy outputs of the codeword. We study the problem of efficient reconstruction using $N$ outputs that are each corrupted by at most $t$ substitutions. Specifically, for the ubiquitous Reed-Solomon codes, we adapt the Ko… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: Submitted to IEEE ISIT 2024

  9. arXiv:2402.18869  [pdf, other

    cs.IT cs.DM math.CO

    Evaluating the Gilbert-Varshamov Bound for Constrained Systems

    Authors: Keshav Goyal, Han Mao Kiah

    Abstract: We revisit the well-known Gilbert-Varshamov (GV) bound for constrained systems. In 1991, Kolesnik and Krachkovsky showed that GV bound can be determined via the solution of some optimization problem. Later, Marcus and Roth (1992) modified the optimization problem and improved the GV bound in many instances. In this work, we provide explicit numerical procedures to solve these two optimization prob… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

    Comments: 27 Pages, 5 figures, submitted to Entropy

  10. arXiv:2402.14712  [pdf, other

    cs.IT cs.DM math.CO

    Gilbert-Varshamov Bound for Codes in $L_1$ Metric using Multivariate Analytic Combinatorics

    Authors: Keshav Goyal, Duc Tu Dao, Mladen Kovačević, Han Mao Kiah

    Abstract: Analytic combinatorics in several variables refers to a suite of tools that provide sharp asymptotic estimates for certain combinatorial quantities. In this paper, we apply these tools to determine the Gilbert--Varshamov lower bound on the rate of optimal codes in $L_1$ metric. Several different code spaces are analyzed, including the simplex and the hypercube in $\mathbb{Z^n}$, all of which are i… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

    Comments: 33 pages, 3 figures, submitted to IEEE Transactions on Information Theory

  11. arXiv:2305.07274  [pdf, other

    cs.IT

    Deletion Correcting Codes for Efficient DNA Synthesis

    Authors: Johan Chrisnata, Han Mao Kiah, Van Long Phuoc Pham

    Abstract: The synthesis of DNA strands remains the most costly part of the DNA storage system. Thus, to make DNA storage system more practical, the time and materials used in the synthesis process have to be optimized. We consider the most common type of synthesis process where multiple DNA strands are synthesized in parallel from a common alternating supersequence, one nucleotide at a time. The synthesis t… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: A shorter version of this paper will be presented in in ISIT 2023

  12. arXiv:2305.04597  [pdf, other

    cs.IT

    Data-Driven Bee Identification for DNA Strands

    Authors: Shubhransh Singhvi, Avital Boruchovsky, Han Mao Kiah, Eitan Yaakobi

    Abstract: We study a data-driven approach to the bee identification problem for DNA strands. The bee-identification problem, introduced by Tandon et al. (2019), requires one to identify $M$ bees, each tagged by a unique barcode, via a set of $M$ noisy measurements. Later, Chrisnata et al. (2022) extended the model to case where one observes $N$ noisy measurements of each bee, and applied the model to addres… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

    Comments: Conference paper accepted at ISIT 2023

  13. arXiv:2305.03442  [pdf, other

    cs.IT

    Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes

    Authors: Stanislav Kruglik, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling, Huaxiong Wang

    Abstract: We consider the repair scheme of Guruswami-Wootters for the Reed-Solomon code and ask: can we correctly repair a failed node in the presence of erroneous nodes? Equivalently, we consider the collection of downloaded traces as a code and investigate its code-distance properties. We propose three lower bounds on its minimum distance and study methods to efficiently correct errors close to these boun… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

    Comments: Accepted to IEEE International Symposium on Information Theory 2023

  14. arXiv:2302.13714  [pdf, other

    cs.IT math.CO

    On the Design of Codes for DNA Computing: Secondary Structure Avoidance Codes

    Authors: Tuan Thanh Nguyen, Kui Cai, Han Mao Kiah, Duc Tu Dao, Kees A. Schouhamer Immink

    Abstract: In this work, we investigate a challenging problem, which has been considered to be an important criterion in designing codewords for DNA computing purposes, namely secondary structure avoidance in single-stranded DNA molecules. In short, secondary structure refers to the tendency of a single-stranded DNA sequence to fold back upon itself, thus becoming inactive in the computation process. While s… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

  15. arXiv:2302.02230  [pdf, ps, other

    cs.IT cs.CR

    $k$-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size

    Authors: Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang

    Abstract: We consider the problem of designing a Private Information Retrieval (PIR) scheme on $m$ files replicated on $k$ servers that can collude or, even worse, can return incorrect answers. Our goal is to correctly retrieve a specific message while keeping its identity private from the database servers. We consider the asymptotic information-theoretic capacity of this problem defined as the maximum rati… ▽ More

    Submitted 5 May, 2023; v1 submitted 4 February, 2023; originally announced February 2023.

    Comments: Accepted to IEEE International Symposium on Information Theory 2023

  16. arXiv:2302.01733  [pdf, other

    cs.CR cs.DB cs.IR

    Committed Private Information Retrieval

    Authors: Quang Cao, Hong Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah

    Abstract: A private information retrieval (PIR) scheme allows a client to retrieve a data item $x_i$ among $n$ items $x_1,x_2,\ldots,x_n$ from $k$ servers, without revealing what $i$ is even when $t < k$ servers collude and try to learn $i$. Such a PIR scheme is said to be $t$-private. A PIR scheme is $v$-verifiable if the client can verify the correctness of the retrieved $x_i$ even when $v \leq k$ servers… ▽ More

    Submitted 25 September, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: Accepted at ESORICS 2023

  17. arXiv:2301.11730  [pdf, ps, other

    cs.IT cs.CR

    Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification

    Authors: Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang

    Abstract: Private Information Retrieval (PIR) schemes allow a client to retrieve any file of interest, while hiding the file identity from the database servers. In contrast to most existing PIR schemes that assume honest-but-curious servers, we study the case of dishonest servers. The latter provide incorrect answers and try to persuade the client to output the wrong result. We introduce several PIR schemes… ▽ More

    Submitted 8 June, 2023; v1 submitted 27 January, 2023; originally announced January 2023.

    Comments: Accepted to IEEE International Symposium on Information Theory 2023

  18. arXiv:2212.09952  [pdf, other

    cs.IT

    Efficient Algorithms for the Bee-Identification Problem

    Authors: Han Mao Kiah, Alexander Vardy, Hanwen Yao

    Abstract: The bee-identification problem, formally defined by Tandon, Tan and Varshney (2019), requires the receiver to identify "bees" using a set of unordered noisy measurements. In this previous work, Tandon, Tan, and Varshney studied error exponents and showed that decoding the measurements jointly results in a significantly smaller error exponent. In this work, we study algorithms related to this joi… ▽ More

    Submitted 19 December, 2022; originally announced December 2022.

    MSC Class: 94B99

  19. arXiv:2212.07091  [pdf, other

    cs.IT

    Verifiable Coded Computation of Multiple Functions

    Authors: Wilton Kim, Stanislav Kruglik, Han Mao Kiah

    Abstract: We consider the problem of evaluating distinct multivariate polynomials over several massive datasets in a distributed computing system with a single master node and multiple worker nodes. We focus on the general case when each multivariate polynomial is evaluated over its corresponding dataset and propose a generalization of the Lagrange Coded Computing framework (Yu et al. 2019) to perform all c… ▽ More

    Submitted 22 August, 2023; v1 submitted 14 December, 2022; originally announced December 2022.

    Comments: 13 pages, 1 figure, 2 tables

  20. arXiv:2209.03251  [pdf, other

    cs.IT

    Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols

    Authors: Han Mao Kiah, Wilton Kim, Stanislav Kruglik, San Ling, Huaxiong Wang

    Abstract: Motivated by applications in distributed storage, distributed computing, and homomorphic secret sharing, we study communication-efficient schemes for computing linear combinations of coded symbols. Specifically, we design low-bandwidth schemes that evaluate the weighted sum of $\ell$ coded symbols in a codeword $\pmb{c}\in\mathbb{F}^n$, when we are given access to $d$ of the remaining components i… ▽ More

    Submitted 7 May, 2023; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: Accepted to 2023 IEEE International Symposium on Information Theory

  21. arXiv:2208.09138  [pdf, ps, other

    cs.IT

    Two dimensional RC/Subarray Constrained Codes: Bounded Weight and Almost Balanced Weight

    Authors: Tuan Thanh Nguyen, Kui Cai, Han Mao Kiah, Kees A. Schouhamer Immink, Yeow Meng Chee

    Abstract: In this work, we study two types of constraints on two-dimensional binary arrays. In particular, given $p,ε>0$, we study (i) The $p$-bounded constraint: a binary vector of size $m$ is said to be $p$-bounded if its weight is at most $pm$, and (ii) The $ε$-balanced constraint: a binary vector of size $m$ is said to be $ε$-balanced if its weight is within $[(0.5-ε)*m,(0.5+ε)*m]$. Such constraints are… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

  22. arXiv:2204.13831  [pdf, other

    cs.IT math.CO

    Average Redundancy of Variable-Length Balancing Schemes à la Knuth

    Authors: Duc Tu Dao, Han Mao Kiah, Tuan Thanh Nguyen

    Abstract: We study and propose schemes that map messages onto constant-weight codewords using variable-length prefixes. We provide polynomial-time computable formulas that estimate the average number of redundant bits incurred by our schemes. In addition to the exact formulas, we also perform an asymptotic analysis and demonstrate that our scheme uses $\frac12 \log n+O(1)$ redundant bits to encode messages… ▽ More

    Submitted 3 July, 2023; v1 submitted 28 April, 2022; originally announced April 2022.

    Comments: Extended version with new results

  23. arXiv:2111.04255  [pdf, ps, other

    cs.IT math.CO

    Sequence Reconstruction Problem for Deletion Channels: A Complete Asymptotic Solution

    Authors: Van Long Phuoc Pham, Keshav Goyal, Han Mao Kiah

    Abstract: Transmit a codeword $x$, that belongs to an $(\ell-1)$-deletion-correcting code of length $n$, over a $t$-deletion channel for some $1\le \ell\le t<n$. Levenshtein, in 2001, proposed the problem of determining $N(n,\ell,t)+1$, the minimum number of distinct channel outputs required to uniquely reconstruct $x$. Prior to this work, $N(n,\ell,t)$ is known only when $\ell\in\{1,2\}$. Here, we provide… ▽ More

    Submitted 7 November, 2021; originally announced November 2021.

    MSC Class: 94B99

  24. arXiv:2107.07377  [pdf, other

    cs.IT math.CO

    Computing Permanents on a Trellis

    Authors: Han Mao Kiah, Alexander Vardy, Hanwen Yao

    Abstract: The problem of computing the permanent of a matrix has attracted interest since the work of Ryser(1963) and Valiant(1979). On the other hand, trellises were extensively studied in coding theory since the 1960s. In this work, we establish a connection between the two domains. We introduce the canonical trellis $T_n$ that represents all permutations, and show that the permanent of a $n$ by $n$ matri… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

  25. arXiv:2007.15253  [pdf, other

    cs.IT

    Repairing Reed-Solomon Codes via Subspace Polynomials

    Authors: Hoang Dau, Dinh Thi Xinh, Han Mao Kiah, Tran Thi Luong, Olgica Milenkovic

    Abstract: We propose new repair schemes for Reed-Solomon codes that use subspace polynomials and hence generalize previous works in the literature that employ trace polynomials. The Reed-Solomon codes are over $\mathbb{F}_{q^\ell}$ and have redundancy $r = n-k \geq q^m$, $1\leq m\leq \ell$, where $n$ and $k$ are the code length and dimension, respectively. In particular, for one erasure, we show that our sc… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

  26. arXiv:2005.03102  [pdf, ps, other

    cs.IT

    Constrained de Bruijn Codes: Properties, Enumeration, Constructions, and Applications

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Van Khu Vu, Eitan yaakobi

    Abstract: The de Bruijn graph, its sequences, and their various generalizations, have found many applications in information theory, including many new ones in the last decade. In this paper, motivated by a coding problem for emerging memory technologies, a set of sequences which generalize sequences in the de Bruijn graph are defined. These sequences can be also defined and viewed as constrained sequences.… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

  27. arXiv:2004.06032  [pdf, ps, other

    cs.IT

    Optimal Reconstruction Codes for Deletion Channels

    Authors: Johan Chrisnata, Han Mao Kiah, Eitan Yaakobi

    Abstract: The sequence reconstruction problem, introduced by Levenshtein in 2001, considers a communication scenario where the sender transmits a codeword from some codebook and the receiver obtains multiple noisy reads of the codeword. Motivated by modern storage devices, we introduced a variant of the problem where the number of noisy reads $N$ is fixed (Kiah et al. 2020). Of significance, for the single-… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

  28. arXiv:2001.02839  [pdf, other

    cs.IT

    Capacity-Approaching Constrained Codes with Error Correction for DNA-Based Data Storage

    Authors: Tuan Thanh Nguyen, Kui Cai, Kees A. Schouhamer Immink, Han Mao Kiah

    Abstract: We propose coding techniques that limit the length of homopolymers runs, ensure the GC-content constraint, and are capable of correcting a single edit error in strands of nucleotides in DNA-based data storage systems. In particular, for given $\ell, ε > 0$, we propose simple and efficient encoders/decoders that transform binary sequences into DNA base sequences (codewords), namely sequences of the… ▽ More

    Submitted 8 January, 2020; originally announced January 2020.

  29. arXiv:2001.01376  [pdf, other

    cs.IT

    Coding for Sequence Reconstruction for Single Edits

    Authors: Kui Cai, Han Mao Kiah, Tuan Thanh Nguyen, Eitan Yaakobi

    Abstract: The sequence reconstruction problem, introduced by Levenshtein in 2001, considers a communication scenario where the sender transmits a codeword from some codebook and the receiver obtains multiple noisy reads of the codeword. The common setup assumes the codebook to be the entire space and the problem is to determine the minimum number of distinct reads that is required to reconstruct the transmi… ▽ More

    Submitted 14 June, 2020; v1 submitted 5 January, 2020; originally announced January 2020.

  30. arXiv:1912.13301  [pdf, other

    cs.IT

    Robust Positioning Patterns with Low Redundancy

    Authors: Yeow Meng Chee, Duc Tu Dao, Han Mao Kiah, San Ling, Hengjia Wei

    Abstract: A robust positioning pattern is a large array that allows a mobile device to locate its position by reading a possibly corrupted small window around it. In this paper, we provide constructions of binary positioning patterns, equipped with efficient locating algorithms, that are robust to a constant number of errors and have redundancy within a constant factor of optimality. Furthermore, we modify… ▽ More

    Submitted 31 December, 2019; originally announced December 2019.

    Comments: Extended Version of SODA 2019 Paper

    MSC Class: 05B30; 94C30

  31. arXiv:1912.11617  [pdf, ps, other

    cs.CR cs.SC

    Efficient Algorithm for the Linear Complexity of Sequences and Some Related Consequences

    Authors: Yeow Meng Chee, Johan Chrisnata, Tuvi Etzion, Han Mao Kiah

    Abstract: The linear complexity of a sequence $s$ is one of the measures of its predictability. It represents the smallest degree of a linear recursion which the sequence satisfies. There are several algorithms to find the linear complexity of a periodic sequence $s$ of length $N$ (where $N$ is of some given form) over a finite field $F_q$ in $O(N)$ symbol field operations. The first such algorithm is The G… ▽ More

    Submitted 25 December, 2019; originally announced December 2019.

  32. arXiv:1910.06501  [pdf, ps, other

    cs.IT

    Optimal Codes Correcting a Single Indel / Edit for DNA-Based Data Storage

    Authors: Kui Cai, Yeow Meng Chee, Ryan Gabrys, Han Mao Kiah, Tuan Thanh Nguyen

    Abstract: An indel refers to a single insertion or deletion, while an edit refers to a single insertion, deletion or substitution. In this paper, we investigate codes that combat either a single indel or a single edit and provide linear-time algorithms that encode binary messages into these codes of length n. Over the quaternary alphabet, we provide two linear-time encoders. One corrects a single edit with… ▽ More

    Submitted 14 October, 2019; originally announced October 2019.

    Comments: 15 pages

  33. arXiv:1907.02944  [pdf

    cs.IT

    Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory

    Authors: A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, J. H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hasimoto, O. Ytrehus, Shigeaki Kuzuoaka, Mikihiko Nishiara, Han Mao Kiah , et al. (2 additional authors not shown)

    Abstract: This year, 2019 we celebrate 30 years of our friendship between Asian and European scientists at the AEW11 in Rotterdam, the Netherlands. Many of the 1989 participants are also present at the 2019 event. This year we have many participants from different parts of Asia and Europe. It shows the importance of this event. It is a good tradition to pay a tribute to a special lecturer in our community.… ▽ More

    Submitted 26 June, 2019; originally announced July 2019.

  34. arXiv:1901.01023  [pdf, ps, other

    cs.IT math.CO

    Efficient and Explicit Balanced Primer Codes

    Authors: Yeow Meng Chee, Han Mao Kiah, Hengjia Wei

    Abstract: To equip DNA-based data storage with random-access capabilities, Yazdi et al. (2018) prepended DNA strands with specially chosen address sequences called primers and provided certain design criteria for these primers. We provide explicit constructions of error-correcting codes that are suitable as primer addresses and equip these constructions with efficient encoding algorithms. Specifically, ou… ▽ More

    Submitted 4 January, 2019; originally announced January 2019.

  35. arXiv:1901.00387  [pdf, ps, other

    cs.IT

    Generalized Sphere-Packing Bound for Subblock-Constrained Codes

    Authors: Han Mao Kiah, Anshoo Tandon, Mehul Motani

    Abstract: We apply the generalized sphere-packing bound to two classes of subblock-constrained codes. A la Fazeli et al. (2015), we made use of automorphism to significantly reduce the number of variables in the associated linear programming problem. In particular, we study binary constant subblock-composition codes (CSCCs), characterized by the property that the number of ones in each subblock is constant,… ▽ More

    Submitted 2 January, 2019; originally announced January 2019.

  36. arXiv:1808.09535  [pdf, ps, other

    cs.IT

    Low-Power Cooling Codes with Efficient Encoding and Decoding

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Hengjia Wei

    Abstract: A class of low-power cooling (LPC) codes, to control simultaneously both the peak temperature and the average power consumption of interconnects, was introduced recently. An $(n,t,w)$-LPC code is a coding scheme over $n$ wires that (A) avoids state transitions on the $t$ hottest wires (cooling), and (B) limits the number of transitions to $w$ in each transmission (low-power). A few constructions… ▽ More

    Submitted 19 March, 2019; v1 submitted 16 August, 2018; originally announced August 2018.

  37. arXiv:1801.02310  [pdf, ps, other

    cs.IT

    Efficient Encoding/Decoding of Irreducible Words for Codes Correcting Tandem Duplications

    Authors: Yeow Meng Chee, Johan Chrisnata, Han Mao Kiah, Tuan Thanh Nguyen

    Abstract: Tandem duplication is the process of inserting a copy of a segment of DNA adjacent to the original position. Motivated by applications that store data in living organisms, Jain et al. (2017) proposed the study of codes that correct tandem duplications. Known code constructions are based on {\em irreducible words}. We study efficient encoding/decoding methods for irreducible words. First, we desc… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.

  38. arXiv:1709.05214  [pdf, other

    cs.IT

    Mutually Uncorrelated Primers for DNA-Based Data Storage

    Authors: S. M. Hossein Tabatabaei Yazdi, Han Mao Kiah, Ryan Gabrys, Olgica Milenkovic

    Abstract: We introduce the notion of weakly mutually uncorrelated (WMU) sequences, motivated by applications in DNA-based data storage systems and for synchronization of communication devices. WMU sequences are characterized by the property that no sufficiently long suffix of one sequence is the prefix of the same or another sequence. WMU sequences used for primer design in DNA-based data storage systems ar… ▽ More

    Submitted 13 September, 2017; originally announced September 2017.

    Comments: 14 pages, 3 figures, 1 Table. arXiv admin note: text overlap with arXiv:1601.08176

  39. arXiv:1701.07872  [pdf, other

    cs.IT

    Cooling Codes: Thermal-Management Coding for High-Performance Interconnects

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy

    Abstract: High temperatures have dramatic negative effects on interconnect performance and, hence, numerous techniques have been proposed to reduce the power consumption of on-chip buses. However, existing methods fall short of fully addressing the thermal challenges posed by high-performance interconnects. In this paper, we introduce new efficient coding schemes that make it possible to directly control th… ▽ More

    Submitted 23 October, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

  40. arXiv:1701.07118  [pdf, other

    cs.IT

    Repairing Reed-Solomon Codes With Two Erasures

    Authors: Hoang Dau, Iwan Duursma, Han Mao Kiah, Olgica Milenkovic

    Abstract: Despite their exceptional error-correcting properties, Reed-Solomon (RS) codes have been overlooked in distributed storage applications due to the common belief that they have poor repair bandwidth: A naive repair approach would require the whole file to be reconstructed in order to recover a single erased codeword symbol. In a recent work, Guruswami and Wootters (STOC'16) proposed a single-erasur… ▽ More

    Submitted 14 May, 2017; v1 submitted 24 January, 2017; originally announced January 2017.

    Comments: ISIT'17 (accepted), 5 pages. arXiv admin note: substantial text overlap with arXiv:1612.01361

  41. arXiv:1701.06874  [pdf, ps, other

    cs.IT

    Coding for Racetrack Memories

    Authors: Yeow Meng Chee, Han Mao Kiah, Alexander Vardy, Van Khu Vu, Eitan Yaakobi

    Abstract: Racetrack memory is a new technology which utilizes magnetic domains along a nanoscopic wire in order to obtain extremely high storage density. In racetrack memory, each magnetic domain can store a single bit of information, which can be sensed by a reading port (head). The memory has a tape-like structure which supports a shift operation that moves the domains to be read sequentially by the head.… ▽ More

    Submitted 24 January, 2017; originally announced January 2017.

  42. arXiv:1701.04954  [pdf, ps, other

    cs.IT

    Bounds on the Size and Asymptotic Rate of Subblock-Constrained Codes

    Authors: Anshoo Tandon, Han Mao Kiah, Mehul Motani

    Abstract: The study of subblock-constrained codes has recently gained attention due to their application in diverse fields. We present bounds on the size and asymptotic rate for two classes of subblock-constrained codes. The first class is binary constant subblock-composition codes (CSCCs), where each codeword is partitioned into equal sized subblocks, and every subblock has the same fixed weight. The secon… ▽ More

    Submitted 18 January, 2017; originally announced January 2017.

  43. Repairing Reed-Solomon Codes With Multiple Erasures

    Authors: Hoang Dau, Iwan Duursma, Han Mao Kiah, Olgica Milenkovic

    Abstract: Despite their exceptional error-correcting properties, Reed-Solomon codes have been overlooked in distributed storage applications due to the common belief that they have poor repair bandwidth: A naive repair approach would require the whole file to be reconstructed in order to recover a single erased codeword symbol. In a recent work, Guruswami and Wootters (STOC'16) proposed a single-erasure rep… ▽ More

    Submitted 2 May, 2020; v1 submitted 28 November, 2016; originally announced December 2016.

    Comments: 15 pages

    Journal ref: IEEE Transactions on Information Theory (2018) 64(10) 6567-6582

  44. arXiv:1607.02279  [pdf, other

    cs.IT math.CO

    Rates of DNA Sequence Profiles for Practical Values of Read Lengths

    Authors: Zuling Chang, Johan Chrisnata, Martianus Frederic Ezerman, Han Mao Kiah

    Abstract: A recent study by one of the authors has demonstrated the importance of profile vectors in DNA-based data storage. We provide exact values and lower bounds on the number of profile vectors for finite values of alphabet size $q$, read length $\ell$, and word length $n$.Consequently, we demonstrate that for $q\ge 2$ and $n\le q^{\ell/2-1}$, the number of profile vectors is at least $q^{κn}$ with… ▽ More

    Submitted 8 July, 2016; originally announced July 2016.

  45. arXiv:1601.08176  [pdf, ps, other

    cs.IT

    Weakly Mutually Uncorrelated Codes

    Authors: S. M. Hossein Tabatabaei Yazdi, Han Mao Kiah, Olgica Milenkovic

    Abstract: We introduce the notion of weakly mutually uncorrelated (WMU) sequences, motivated by applications in DNA-based storage systems and synchronization protocols. WMU sequences are characterized by the property that no sufficiently long suffix of one sequence is the prefix of the same or another sequence. In addition, WMU sequences used in DNA-based storage systems are required to have balanced compos… ▽ More

    Submitted 29 January, 2016; originally announced January 2016.

    Comments: 1 table

  46. arXiv:1507.01611  [pdf, other

    cs.ET cs.IT

    DNA-Based Storage: Trends and Methods

    Authors: S. M. Hossein Tabatabaei Yazdi, Han Mao Kiah, Eva Ruiz Garcia, Jian Ma, Huimin Zhao, Olgica Milenkovic

    Abstract: We provide an overview of current approaches to DNA-based storage system design and accompanying synthesis, sequencing and editing methods. We also introduce and analyze a suite of new constrained coding schemes for both archival and random access DNA storage channels. The mathematical basis of our work is the construction and design of sequences over discrete alphabets that avoid pre-specified ad… ▽ More

    Submitted 6 July, 2015; originally announced July 2015.

  47. arXiv:1506.03724  [pdf, ps, other

    cs.IT cs.DM

    Product Construction of Affine Codes

    Authors: Yeow Meng Chee, Han Mao Kiah, Punarbasu Purkayastha, Patrick Solé

    Abstract: Binary matrix codes with restricted row and column weights are a desirable method of coded modulation for power line communication. In this work, we construct such matrix codes that are obtained as products of affine codes - cosets of binary linear codes. Additionally, the constructions have the property that they are systematic. Subsequently, we generalize our construction to irregular product of… ▽ More

    Submitted 11 June, 2015; originally announced June 2015.

    Comments: 13 pages, to appear in SIAM Journal on Discrete Mathematics

    MSC Class: 94B05; 94B60 (Primary); 94B20 (Secondary)

  48. arXiv:1506.02349  [pdf, ps, other

    cs.IT

    Local Codes with Addition Based Repair

    Authors: Han Mao Kiah, Son Hoang Dau, Wentu Song, Chau Yuen

    Abstract: We consider the complexities of repair algorithms for locally repairable codes and propose a class of codes that repair single node failures using addition operations only, or codes with addition based repair. We construct two families of codes with addition based repair. The first family attains distance one less than the Singleton-like upper bound, while the second family attains the Singleton-l… ▽ More

    Submitted 8 June, 2015; originally announced June 2015.

  49. arXiv:1506.00740  [pdf, other

    cs.IT

    Asymmetric Lee Distance Codes for DNA-Based Storage

    Authors: Ryan Gabrys, Han Mao Kiah, Olgica Milenkovic

    Abstract: We consider a new family of codes, termed asymmetric Lee distance codes, that arise in the design and implementation of DNA-based storage systems and systems with parallel string transmission protocols. The codewords are defined over a quaternary alphabet, although the results carry over to other alphabet sizes; furthermore, symbol confusability is dictated by their underlying binary representatio… ▽ More

    Submitted 14 December, 2016; v1 submitted 1 June, 2015; originally announced June 2015.

  50. arXiv:1504.04926  [pdf, other

    cs.IT math.CO

    Locally Encodable and Decodable Codes for Distributed Storage Systems

    Authors: Son Hoang Dau, Han Mao Kiah, Wentu Song, Chau Yuen

    Abstract: We consider the locality of encoding and decoding operations in distributed storage systems (DSS), and propose a new class of codes, called locally encodable and decodable codes (LEDC), that provides a higher degree of operational locality compared to currently known codes. For a given locality structure, we derive an upper bound on the global distance and demonstrate the existence of an optimal L… ▽ More

    Submitted 19 April, 2015; originally announced April 2015.

    Comments: 7 pages