Skip to main content

Showing 1–39 of 39 results for author: Skachek, V

  1. arXiv:2110.07421  [pdf, ps, other

    cs.IT math.CO

    On some batch code properties of the simplex code

    Authors: Henk D. L. Hollmann, Karan Khathuria, Ago-Erik Riet, Vitaly Skachek

    Abstract: The binary $k$-dimensional simplex code is known to be a $2^{k-1}$-batch code and is conjectured to be a $2^{k-1}$-functional batch code. Here, we offer a simple, constructive proof of a result that is "in between" these two properties. Our approach is to relate these properties to certain (old and new) additive problems in finite abelian groups. We also formulate a conjecture for finite abelian g… ▽ More

    Submitted 22 January, 2023; v1 submitted 14 October, 2021; originally announced October 2021.

  2. arXiv:2108.08716  [pdf, other

    cs.IT

    NB QC-LDPC Coded QAM Signals with Optimized Mapping: Bounds and Simulation Results

    Authors: Irina E. Bocharova, Boris D. Kudryashov, Evgenii P. Ovsyannikov, Vitaly Skachek

    Abstract: The goal of the paper is to study specific properties of nonbinary low-density parity-check (NB LDPC) codes when used in coded modulation systems. The paper is focused on the practically important NB LDPC codes over extensions of the Galois field GF$(2^m)$ with $m \le 6$ used with QAM signaling. Performance of NB QC LDPC coded transmission strongly depends on mapping of nonbinary symbols to signal… ▽ More

    Submitted 23 May, 2022; v1 submitted 19 August, 2021; originally announced August 2021.

    Comments: arXiv admin note: text overlap with arXiv:2006.12147

  3. arXiv:2008.00879  [pdf, ps, other

    cs.IT cs.DC

    Failure Probability Analysis for Partial Extraction from Invertible Bloom Filters

    Authors: Ivo Kubjas, Vitaly Skachek

    Abstract: Invertible Bloom Filter (IBF) is a data structure, which employs a small set of hash functions. An IBF allows for an efficient insertion and, with high probability, for an efficient extraction of the data. However, the success probability of the extraction depends on the storage overhead of an IBF and the amount of the data stored. In an application, such as set reconciliation, where there is a ne… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

  4. arXiv:2006.12147  [pdf, other

    cs.IT

    Optimization of NB QC-LDPC Block Codes and Their Performance Analysis

    Authors: Irina E. Bocharova, Boris D. Kudryashov, Evgenii P. Ovsyannikov, Vitaly Skachek, Tähvend Uustalu

    Abstract: We propose an approach for optimizing nonbinary (NB) quasi-cyclic (QC) LDPC codes. This approach combines constructing of base parity-check matrices by simulated annealing and labeling the obtained base matrices aimed at maximizing the so-called generalized girth of the NB LDPC code Tanner graph. Tightened random coding bounds based on the average binary spectra for ensembles of "almost regular" N… ▽ More

    Submitted 22 October, 2020; v1 submitted 22 June, 2020; originally announced June 2020.

    Comments: 26 pages

  5. arXiv:1907.02944  [pdf

    cs.IT

    Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory

    Authors: A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, J. H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hasimoto, O. Ytrehus, Shigeaki Kuzuoaka, Mikihiko Nishiara, Han Mao Kiah , et al. (2 additional authors not shown)

    Abstract: This year, 2019 we celebrate 30 years of our friendship between Asian and European scientists at the AEW11 in Rotterdam, the Netherlands. Many of the 1989 participants are also present at the 2019 event. This year we have many participants from different parts of Asia and Europe. It shows the importance of this event. It is a good tradition to pay a tribute to a special lecturer in our community.… ▽ More

    Submitted 26 June, 2019; originally announced July 2019.

  6. arXiv:1806.00592  [pdf, ps, other

    cs.IT cs.DM math.CO

    Batch Codes for Asynchronous Recovery of Data

    Authors: Ago-Erik Riet, Vitaly Skachek, Eldho K. Thomas

    Abstract: We propose a new model of asynchronous batch codes that allow for parallel recovery of information symbols from a coded database in an asynchronous manner, i.e. when queries arrive at random times and they take varying time to process. We show that the graph-based batch codes studied by et al. are asynchronous. Further, we demonstrate that hypergraphs of Berge girth larger or equal to 4, respectiv… ▽ More

    Submitted 5 September, 2020; v1 submitted 2 June, 2018; originally announced June 2018.

    Comments: 18 pages

    MSC Class: 68P30 (primary) 05D99; 05B40 (secondary) ACM Class: E.4; G.2

  7. arXiv:1804.06770  [pdf, other

    cs.IT

    Stopping Redundancy Hierarchy Beyond the Minimum Distance

    Authors: Yauhen Yakimenka, Vitaly Skachek, Irina E. Bocharova, Boris D. Kudryashov

    Abstract: Stopping sets play a crucial role in failure events of iterative decoders over a binary erasure channel (BEC). The $\ell$-th stopping redundancy is the minimum number of rows in the parity-check matrix of a code, which contains no stopping sets of size up to $\ell$. In this work, a notion of coverable stopping sets is defined. In order to achieve maximum-likelihood performance under iterative deco… ▽ More

    Submitted 29 September, 2018; v1 submitted 18 April, 2018; originally announced April 2018.

    Comments: Accepted for publication in IEEE Transactions on Information Theory

    MSC Class: 94B65

  8. arXiv:1709.01455  [pdf, other

    cs.IT

    ML and Near-ML Decoding of LDPC Codes Over the BEC: Bounds and Decoding Algorithms

    Authors: Irina E. Bocharova, Boris D. Kudryashov, Vitaly Skachek, Eirik Rosnes, Øyvind Ytrehus

    Abstract: The performance of maximum-likelihood (ML) decoding on the binary erasure channel for finite-length low-density parity-check (LDPC) codes from two random ensembles is studied. The theoretical average spectrum of the Gallager ensemble is computed by using a recurrent procedure and compared to the empirically found average spectrum for the same ensemble as well as to the empirical average spectrum o… ▽ More

    Submitted 20 November, 2018; v1 submitted 5 September, 2017; originally announced September 2017.

    Comments: To appear in IEEE Transactions on Communications

  9. arXiv:1707.01025  [pdf, other

    cs.IT

    Distance Properties of Short LDPC Codes and their Impact on the BP, ML and Near-ML Decoding Performance

    Authors: Irina E. Bocharova, Boris D. Kudryashov, Vitaly Skachek, Yauhen Yakimenka

    Abstract: Parameters of LDPC codes, such as minimum distance, stopping distance, stopping redundancy, girth of the Tanner graph, and their influence on the frame error rate performance of the BP, ML and near-ML decoding over a BEC and an AWGN channel are studied. Both random and structured LDPC codes are considered. In particular, the BP decoding is applied to the code parity-check matrices with an increasi… ▽ More

    Submitted 4 July, 2017; originally announced July 2017.

  10. arXiv:1705.09507  [pdf, other

    cs.IT

    BP-LED decoding algorithm for LDPC codes over AWGN channels

    Authors: Irina E. Bocharova, Boris D. Kudryashov, Vitaly Skachek, Yauhen Yakimenka

    Abstract: A new method for low-complexity near-maximum-likelihood (ML) decoding of low-density parity-check (LDPC) codes over the additive white Gaussian noise channel is presented. The proposed method termed belief-propagation--list erasure decoding (BP-LED) is based on erasing carefully chosen unreliable bits performed in case of BP decoding failure. A strategy of introducing erasures into the received ve… ▽ More

    Submitted 26 May, 2017; originally announced May 2017.

    Comments: Submitted to IEEE Transactions on Information Theory

  11. arXiv:1701.07579  [pdf, ps, other

    cs.IT

    Explicit Constructions and Bounds for Batch Codes with Restricted Size of Reconstruction Sets

    Authors: Eldho K. Thomas, Vitaly Skachek

    Abstract: Linear batch codes and codes for private information retrieval (PIR) with a query size $t$ and a restricted size $r$ of the reconstruction sets are studied. New bounds on the parameters of such codes are derived for small values of $t$ or of $r$ by providing corresponding constructions. By building on the ideas of Cadambe and Mazumdar, a new bound in a recursive form is derived for batch codes and… ▽ More

    Submitted 4 July, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

    Comments: To appear in 5ICMCTA

  12. arXiv:1701.07495  [pdf, ps, other

    cs.IT cs.DC

    Two-Party Function Computation on the Reconciled Data

    Authors: Ivo Kubjas, Vitaly Skachek

    Abstract: In this paper, we initiate a study of a new problem termed function computation on the reconciled data, which generalizes a set reconciliation problem in the literature. Assume a distributed data storage system with two users $A$ and $B$. The users possess a collection of binary vectors $S_{A}$ and $S_{B}$, respectively. They are interested in computing a function $φ$ of the reconciled data… ▽ More

    Submitted 10 July, 2017; v1 submitted 25 January, 2017; originally announced January 2017.

  13. arXiv:1611.09914  [pdf, ps, other

    cs.IT

    Batch and PIR Codes and Their Connections to Locally Repairable Codes

    Authors: Vitaly Skachek

    Abstract: In this survey, two related families of codes are discussed: batch codes and codes for private information retrieval. These two families can be viewed as natural generalizations of locally repairable codes, which were extensively studied in the context of coding for fault tolerance in distributed data storage systems. Bounds on the parameters of the codes, as well as basic constructions, are prese… ▽ More

    Submitted 5 September, 2017; v1 submitted 29 November, 2016; originally announced November 2016.

    Comments: Survey

  14. CONDENSE: A Reconfigurable Knowledge Acquisition Architecture for Future 5G IoT

    Authors: Dejan Vukobratovic, Dusan Jakovetic, Vitaly Skachek, Dragana Bajovic, Dino Sejdinovic, Gunes Karabulut Kurt, Camilla Hollanti, Ingo Fischer

    Abstract: In forthcoming years, the Internet of Things (IoT) will connect billions of smart devices generating and uploading a deluge of data to the cloud. If successfully extracted, the knowledge buried in the data can significantly improve the quality of life and foster economic growth. However, a critical bottleneck for realising the efficient IoT is the pressure it puts on the existing communication inf… ▽ More

    Submitted 12 September, 2016; originally announced September 2016.

    Comments: 17 pages, 7 figures in IEEE Access, Vol. 4, 2016

  15. arXiv:1510.08883  [pdf, ps, other

    cs.IT

    Bounds for Batch Codes with Restricted Query Size

    Authors: Hui Zhang, Vitaly Skachek

    Abstract: We present new upper bounds on the parameters of batch codes with restricted query size. These bounds are an improvement on the Singleton bound. The techniques for derivations of these bounds are based on the ideas in the literature for codes with locality. By employing additional ideas, we obtain further improvements, which are specific for batch codes.

    Submitted 9 February, 2016; v1 submitted 29 October, 2015; originally announced October 2015.

    Comments: Submitted to ISIT 2016

  16. arXiv:1504.05100  [pdf, ps, other

    cs.IT math.CO

    New Bounds for Permutation Codes in Ulam Metric

    Authors: Faruk Göloğlu, Jüri Lember, Ago-Erik Riet, Vitaly Skachek

    Abstract: New bounds on the cardinality of permutation codes equipped with the Ulam distance are presented. First, an integer-programming upper bound is derived, which improves on the Singleton-type upper bound in the literature for some lengths. Second, several probabilistic lower bounds are developed, which improve on the known lower bounds for large minimum distances. The results of a computer search for… ▽ More

    Submitted 20 April, 2015; originally announced April 2015.

    Comments: To be presented at ISIT 2015, 5 pages

  17. arXiv:1504.00481  [pdf, ps, other

    cs.IT

    Data Dissemination Problem in Wireless Networks

    Authors: Ivo Kubjas, Vitaly Skachek

    Abstract: In this work, we formulate and study a data dissemination problem, which can be viewed as a generalization of the index coding problem and of the data exchange problem to networks with an arbitrary topology. We define $r$-solvable networks, in which data dissemination can be achieved in $r > 0$ communications rounds. We show that the optimum number of transmissions for any one-round communications… ▽ More

    Submitted 9 October, 2015; v1 submitted 2 April, 2015; originally announced April 2015.

    Comments: Notation clarification

  18. Refined Upper Bounds on Stopping Redundancy of Binary Linear Codes

    Authors: Yauhen Yakimenka, Vitaly Skachek

    Abstract: The $l$-th stopping redundancy $ρ_l(\mathcal C)$ of the binary $[n, k, d]$ code $\mathcal C$, $1 \le l \le d$, is defined as the minimum number of rows in the parity-check matrix of $\mathcal C$, such that the smallest stopping set is of size at least $l$. The stopping redundancy $ρ(\mathcal C)$ is defined as $ρ_d(\mathcal C)$. In this work, we improve on the probabilistic analysis of stopping red… ▽ More

    Submitted 27 February, 2015; v1 submitted 31 October, 2014; originally announced October 2014.

    Comments: 5 pages; ITW 2015

  19. arXiv:1404.2796  [pdf, ps, other

    cs.IT

    Linear Batch Codes

    Authors: Helger Lipmaa, Vitaly Skachek

    Abstract: In an application, where a client wants to obtain many elements from a large database, it is often desirable to have some load balancing. Batch codes (introduced by Ishai et al. in STOC 2004) make it possible to do exactly that: the large database is divided between many servers, so that the client has to only make a small number of queries to every server to obtain sufficient information to recon… ▽ More

    Submitted 10 April, 2014; originally announced April 2014.

  20. arXiv:1208.2936  [pdf, ps, other

    cs.DC cs.DS

    Forwarding Without Repeating: Efficient Rumor Spreading in Bounded-Degree Graphs

    Authors: Vincent Gripon, Vitaly Skachek, Michael Rabbat

    Abstract: We study a gossip protocol called forwarding without repeating (FWR). The objective is to spread multiple rumors over a graph as efficiently as possible. FWR accomplishes this by having nodes record which messages they have forwarded to each neighbor, so that each message is forwarded at most once to each neighbor. We prove that FWR spreads a rumor over a strongly connected digraph, with high prob… ▽ More

    Submitted 14 August, 2012; originally announced August 2012.

    Comments: 16 pages

  21. arXiv:1202.1150  [pdf, ps, other

    cs.IT

    Optimal Index Codes with Near-Extreme Rates

    Authors: Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee

    Abstract: The min-rank of a digraph was shown by Bar-Yossef et al. (2006) to represent the length of an optimal scalar linear solution of the corresponding instance of the Index Coding with Side Information (ICSI) problem. In this work, the graphs and digraphs of near-extreme min-ranks are characterized. Those graphs and digraphs correspond to the ICSI instances having near-extreme transmission rates when u… ▽ More

    Submitted 18 March, 2013; v1 submitted 6 February, 2012; originally announced February 2012.

    Comments: 15 pages, submitted to IEEE Transactions on Information Theory

  22. arXiv:1202.0932  [pdf, ps, other

    cs.IT

    Error-Correction in Flash Memories via Codes in the Ulam Metric

    Authors: Farzad Farnoud, Vitaly Skachek, Olgica Milenkovic

    Abstract: We consider rank modulation codes for flash memories that allow for handling arbitrary charge-drop errors. Unlike classical rank modulation codes used for correcting errors that manifest themselves as swaps of two adjacently ranked elements, the proposed \emph{translocation rank codes} account for more general forms of errors that arise in storage systems. Translocations represent a natural extens… ▽ More

    Submitted 21 April, 2013; v1 submitted 4 February, 2012; originally announced February 2012.

  23. arXiv:1107.4581  [pdf, ps, other

    cs.IT

    Hybrid Noncoherent Network Coding

    Authors: Vitaly Skachek, Olgica Milenkovic, Angelia Nedic

    Abstract: We describe a novel extension of subspace codes for noncoherent networks, suitable for use when the network is viewed as a communication system that introduces both dimension and symbol errors. We show that when symbol erasures occur in a significantly large number of different basis vectors transmitted through the network and when the min-cut of the networks is much smaller then the length of the… ▽ More

    Submitted 23 September, 2012; v1 submitted 22 July, 2011; originally announced July 2011.

    Comments: 15 pages

  24. arXiv:1105.2865  [pdf, ps, other

    cs.IT

    Error Correction for Index Coding with Side Information

    Authors: Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee

    Abstract: A problem of index coding with side information was first considered by Y. Birk and T. Kol (IEEE INFOCOM, 1998). In the present work, a generalization of index coding scheme, where transmitted symbols are subject to errors, is studied. Error-correcting methods for such a scheme, and their parameters, are investigated. In particular, the following question is discussed: given the side information h… ▽ More

    Submitted 14 May, 2011; originally announced May 2011.

    Comments: 14 pages

  25. arXiv:1103.3641  [pdf, ps, other

    cs.IT

    On the Pseudocodeword Redundancy of Binary Linear Codes

    Authors: Jens Zumbrägel, Vitaly Skachek, Mark F. Flanagan

    Abstract: The AWGNC, BSC, and max-fractional pseudocodeword redundancies of a binary linear code are defined to be the smallest number of rows in a parity-check matrix such that the corresponding minimum pseudoweight is equal to the minimum Hamming distance of the code. It is shown that most codes do not have a finite pseudocodeword redundancy. Also, upper bounds on the pseudocodeword redundancy for some fa… ▽ More

    Submitted 6 March, 2012; v1 submitted 18 March, 2011; originally announced March 2011.

    Comments: 14 pages. arXiv admin note: substantial text overlap with arXiv:1005.3486

  26. arXiv:1102.2797  [pdf, ps, other

    cs.IT

    On the Security of Index Coding with Side Information

    Authors: Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee

    Abstract: Security aspects of the Index Coding with Side Information (ICSI) problem are investigated. Building on the results of Bar-Yossef et al. (2006), the properties of linear index codes are further explored. The notion of weak security, considered by Bhattad and Narayanan (2005) in the context of network coding, is generalized to block security. It is shown that the linear index code based on a matrix… ▽ More

    Submitted 14 February, 2011; originally announced February 2011.

    Comments: 14 pages

  27. arXiv:1101.2728  [pdf, ps, other

    cs.IT

    Index Coding and Error Correction

    Authors: Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee

    Abstract: A problem of index coding with side information was first considered by Y. Birk and T. Kol (IEEE INFOCOM, 1998). In the present work, a generalization of index coding scheme, where transmitted symbols are subject to errors, is studied. Error-correcting methods for such a scheme, and their parameters, are investigated. In particular, the following question is discussed: given the side information h… ▽ More

    Submitted 14 January, 2011; originally announced January 2011.

    Comments: 5 pages, submitted

  28. arXiv:1011.5566  [pdf, other

    cs.IT cs.CR cs.NI

    Secure Index Coding with Side Information

    Authors: Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee

    Abstract: Security aspects of the Index Coding with Side Information (ICSI) problem are investigated. Building on the results of Bar-Yossef et al. (2006), the properties of linear coding schemes for the ICSI problem are further explored. The notion of weak security, considered by Bhattad and Narayanan (2005) in the context of network coding, is generalized to block security. It is shown that the coding sche… ▽ More

    Submitted 25 November, 2010; originally announced November 2010.

    Comments: 8 pages

  29. arXiv:1007.3808  [pdf, ps, other

    cs.IT

    Characterization of Graph-cover Pseudocodewords of Codes over $F_3$

    Authors: Vitaly Skachek

    Abstract: Linear-programming pseudocodewords play a pivotal role in our understanding of the linear-programming decoding algorithms. These pseudocodewords are known to be equivalent to the graph-cover pseudocodewords. The latter pseudocodewords, when viewed as points in the multidimensional Euclidean space, lie inside a fundamental cone. This fundamental cone depends on the choice of a parity-check matrix o… ▽ More

    Submitted 22 July, 2010; originally announced July 2010.

    Comments: 5 pages, to be presented in ITW 2010, Dublin, Ireland

  30. arXiv:1005.3486  [pdf, ps, other

    cs.IT

    Exploration of AWGNC and BSC Pseudocodeword Redundancy

    Authors: Jens Zumbragel, Mark F. Flanagan, Vitaly Skachek

    Abstract: The AWGNC, BSC, and max-fractional pseudocodeword redundancy of a code is defined as the smallest number of rows in a parity-check matrix such that the corresponding minimum pseudoweight is equal to the minimum Hamming distance of the code. This paper provides new results on the AWGNC, BSC, and max-fractional pseudocodeword redundancies of codes. The pseudocodeword redundancies for all codes of sm… ▽ More

    Submitted 19 May, 2010; originally announced May 2010.

    Comments: 7 pages

  31. arXiv:1001.1705  [pdf, ps, other

    cs.IT

    On the Pseudocodeword Redundancy

    Authors: Jens Zumbragel, Mark F. Flanagan, Vitaly Skachek

    Abstract: We define the AWGNC, BSC, and max-fractional pseudocodeword redundancy of a code as the smallest number of rows in a parity-check matrix such that the corresponding minimum pseudoweight is equal to the minimum Hamming distance. We show that most codes do not have a finite pseudocodeword redundancy. We also provide bounds on the pseudocodeword redundancy for some families of codes, including code… ▽ More

    Submitted 11 January, 2010; originally announced January 2010.

    Comments: 5 pages

  32. Correcting a Fraction of Errors in Nonbinary Expander Codes with Linear Programming

    Authors: Vitaly Skachek

    Abstract: A linear-programming decoder for \emph{nonbinary} expander codes is presented. It is shown that the proposed decoder has the maximum-likelihood certificate properties. It is also shown that this decoder corrects any pattern of errors of a relative weight up to approximately 1/4 δ_A δ_B (where δ_A and δ_B are the relative minimum distances of the constituent codes).

    Submitted 27 October, 2010; v1 submitted 8 June, 2009; originally announced June 2009.

    Comments: Part of this work was presented at the IEEE International Symposium on Information Theory 2009, Seoul, Korea

  33. Recursive Code Construction for Random Networks

    Authors: Vitaly Skachek

    Abstract: A modification of Koetter-Kschischang codes for random networks is presented (these codes were also studied by Wang et al. in the context of authentication problems). The new codes have higher information rate, while maintaining the same error-correcting capabilities. An efficient error-correcting algorithm is proposed for these codes.

    Submitted 16 October, 2009; v1 submitted 23 June, 2008; originally announced June 2008.

    Comments: Submitted to IEEE Transactions on Information Theory

  34. Linear-Programming Decoding of Nonbinary Linear Codes

    Authors: Mark F. Flanagan, Vitaly Skachek, Eimear Byrne, Marcus Greferath

    Abstract: A framework for linear-programming (LP) decoding of nonbinary linear codes over rings is developed. This framework facilitates linear-programming based reception for coded modulation systems which use direct modulation mapping of coded symbols. It is proved that the resulting LP decoder has the 'maximum-likelihood certificate' property. It is also shown that the decoder output is the lowest cost… ▽ More

    Submitted 4 June, 2009; v1 submitted 28 April, 2008; originally announced April 2008.

    Comments: To appear in the IEEE Transactions on Information Theory. 54 pages, 5 figures

    Report number: CSI-01-01

  35. arXiv:0803.3777  [pdf, ps, other

    cs.IT

    Lower Bounds on the Minimum Pseudodistance for Linear Codes with $q$-ary PSK Modulation over AWGN

    Authors: Vitaly Skachek, Mark F. Flanagan

    Abstract: We present lower bounds on the minimum pseudocodeword effective Euclidean distance (or minimum "pseudodistance") for coded modulation systems using linear codes with $q$-ary phase-shift keying (PSK) modulation over the additive white Gaussian noise (AWGN) channel. These bounds apply to both binary and nonbinary coded modulation systems which use direct modulation mapping of coded symbols. The mi… ▽ More

    Submitted 12 June, 2008; v1 submitted 26 March, 2008; originally announced March 2008.

    Comments: 6 pages, Proceedings 5-th International Symposium on Turbo Codes & related topics

  36. Polytope Representations for Linear-Programming Decoding of Non-Binary Linear Codes

    Authors: Vitaly Skachek, Mark F. Flanagan, Eimear Byrne, Marcus Greferath

    Abstract: In previous work, we demonstrated how decoding of a non-binary linear code could be formulated as a linear-programming problem. In this paper, we study different polytopes for use with linear-programming decoding, and show that for many classes of codes these polytopes yield a complexity advantage for decoding. These representations lead to polynomial-time decoders for a wide variety of classica… ▽ More

    Submitted 17 April, 2008; v1 submitted 25 December, 2007; originally announced December 2007.

    Comments: 5 pages, to appear in 2008 IEEE International Symposium on Information Theory

  37. arXiv:0707.4360  [pdf, ps, other

    cs.IT

    Linear-programming Decoding of Non-binary Linear Codes

    Authors: Mark F. Flanagan, Vitaly Skachek, Eimear Byrne, Marcus Greferath

    Abstract: We develop a framework for linear-programming (LP) decoding of non-binary linear codes over rings. We prove that the resulting LP decoder has the `maximum likelihood certificate' property, and we show that the decoder output is the lowest cost pseudocodeword. Equivalence between pseudocodewords of the linear program and pseudocodewords of graph covers is proved. LP decoding performance is illust… ▽ More

    Submitted 10 October, 2007; v1 submitted 30 July, 2007; originally announced July 2007.

    Comments: 6 pages, 1 figure, 7-th International ITG Conference on Source and Channel Coding (SCC'08)

  38. Improved Nearly-MDS Expander Codes

    Authors: Ron M. Roth, Vitaly Skachek

    Abstract: A construction of expander codes is presented with the following three properties: (i) the codes lie close to the Singleton bound, (ii) they can be encoded in time complexity that is linear in their code length, and (iii) they have a linear-time bounded-distance decoder. By using a version of the decoder that corrects also erasures, the codes can replace MDS outer codes in concatenated const… ▽ More

    Submitted 10 May, 2006; v1 submitted 21 January, 2006; originally announced January 2006.

    Comments: Part of this work was presented at the 2004 IEEE Int'l Symposium on Information Theory (ISIT'2004), Chicago, Illinois (June 2004). This work was submitted to IEEE Transactions on Information Theory on January 21, 2005. To appear in IEEE Transactions on Information Theory, August 2006. 12 pages

  39. arXiv:cs/0508062  [pdf, ps, other

    cs.IT

    Decoding of Expander Codes at Rates Close to Capacity

    Authors: Alexei Ashikhmin, Vitaly Skachek

    Abstract: The decoding error probability of codes is studied as a function of their block length. It is shown that the existence of codes with a polynomially small decoding error probability implies the existence of codes with an exponentially small decoding error probability. Specifically, it is assumed that there exists a family of codes of length N and rate R=(1-ε)C (C is a capacity of a binary symmetr… ▽ More

    Submitted 22 January, 2007; v1 submitted 12 August, 2005; originally announced August 2005.

    Comments: Appears in IEEE Transactions on Information Theory, December 2006. The short version of this paper appears in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005