{"title":"Reliable Memories with Subline Accesses","authors":"Junsheng Han, L. A. Lastras-Montaño","doi":"10.1109/ISIT.2007.4557599","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557599","url":null,"abstract":"We study memories protected with error control codes, in which the memory's contents are organized in lines which are read and written to in isolation from other lines. In these memories the available redundancy is structured so as to protect individual lines rather than the entire memory as a whole. Often designers wish to read and write only parts of the memory line, as in some instances this leads to various favorable system design tradeoffs, including better power consumption, increased data access concurrency, etc. (alternatively one may say that designers sometimes would prefer smaller line sizes). Nevertheless when designing systems with such subline accesses it is often found that in order to mantain a given level of reliability, the total amount of redundancy allocated in the memory needs to be increased beyond desirable levels. In this work, we initiate a study of the problem of structuring error control codes to allow subline accesses with good tradeoffs between reliability and redundancy. We motivate and explore a setting in which a \"double-lookup\" protocol is used in conjunction with certain types of two-level codes, whereby error detection is attained in a first level and error correction using the second level is performed whenever errors are detected in the first level. We obtain lower bounds on redundancy for a given level of reliability and offer a code construction that attains this bound for a certain important class of parameters. We also introduce an alternate construction which allows us to find longer codes under restrictions of the Galois field size used in the codes.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theory and Performance of ML Decoding for Turbo Codes using Genetic Algorithm","authors":"Tsun-chih Hsueh, D. Shiu","doi":"10.1109/ISIT.2007.4557298","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557298","url":null,"abstract":"Although yielding the lowest error probability, ML decoding of turbo codes has been considered unrealistic so far because efficient ML decoders have not been discovered. In this paper, we propose the Genetic Decoding Algorithm (GDA) for turbo codes. GDA combines the principles of perturbed decoding and genetic algorithm. In GDA, chromosomes are random additive perturbation noises. A conventional turbo decoder is used to assign fitness values to the chromosomes in the population. After generations of evolution, good chromosomes that correspond to decoded codewords of very good likelihood emerge. GDA can be used as a practical decoder for turbo codes in certain contexts. It is also a natural multiple-output decoder. The most important aspect of GDA, in our opinion, is that one can utilize GDA to empirically determine a lower bound on the error probability with ML decoding. Our results show that, at a word error probability of 10-4, GDA achieves the performance of ML decoding. Using GDA, we establish that an ML decoder only slightly outperforms a MAP-based iterative decoder at this word error probability for the block size we used and the turbo code defined for WCDMA.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122839381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Construction of Two Classes of Efficient Quantum Error-Correction Codes","authors":"P. Tan, Jing Li","doi":"10.1109/ISIT.2007.4557531","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557531","url":null,"abstract":"Stabilizer codes are an important branch of quantum codes, but the existing stabilizer codes constructed from the classical binary codes almost exclusively belong to the special subclass of CSS codes. This paper develops simple and systematic constructions for two rich classes of non-CSS quantum stabilizer codes: quantum low density parity check (LDPC) codes based on classical quasi-cyclic LDPC codes and quantum convolutional codes based on classical LDPC-convolutional codes. Both classes enjoy a wide range of lengths and rates, and offer stronger error correction capability than the existing codes.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Optical Orthogonal, Cyclically Permutable, and Super Optical Orthogonal Codes","authors":"S. Martirosyan, A. Vinck, A. Harutyunyan","doi":"10.1109/ISIT.2007.4557579","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557579","url":null,"abstract":"Optical orthogonal codes (OOC) are special classes of codes for applications in code division multi-access (CDMA) transmission using an optical carrier. We show a new relationship between constant weight cyclically permutable codes (CPC) and OOC's which can be investigated further. The main result ties together the CPC's and the solution of an algebraic system of congruences. For a particular case, there is a recurrence relationship for the code cardinality. More general cases need to be elaborated in coming research. We discuss also so-called super OOC's, which are codes with stronger correlation properties, and show several examples of such codes derivable from CPC's designed by applying the method proposed.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using zero-rate feedback on binary additive channels with individual noise sequences","authors":"K. Eswaran, A. Sarwate, A. Sahai, M. Gastpar","doi":"10.1109/ISIT.2007.4557423","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557423","url":null,"abstract":"Recently, Shayevitz and Feeler introduced an individual sequence formulation of channel coding under model uncertainty and an elegant coding strategy that adapts Horstein's scheme to this setting to achieve the empirical capacity of the channel. Their scheme requires both full-rate output feedback and common randomness. We present a strategy in the style of Hybrid ARQ that requires no output feedback by using common randomness and zero-rate active feedback. This strategy still asymptotically achieves the empirical capacity.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127807357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Capacity Bounds of Undirected Networks","authors":"A. Al-Bashabsheh, A. Yongaçoğlu","doi":"10.1109/ISIT.2007.4557081","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557081","url":null,"abstract":"\"Eligible for the student paper award.\" In this work we improve on the bounds presented in Z. Li and B. Li (2004) for network coding gain in the undirected case. A tightened bound for the undirected multicast problem with three terminals is derived. An interesting result shows that with fractional routing, routing throughput can achieve at least 75 % of the coding throughput. A tighter bound for the general multicast problem with any number of terminals shows that coding gain is strictly less than 2. Our derived bound depends on the number of terminals in the multicast network and approaches 2 for arbitrarily large number of terminals.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Combining Schemes for MIMO Systems with Hybrid ARQ","authors":"E. W. Jang, Jungwon Lee, H. Lou, J. Cioffi","doi":"10.1109/ISIT.2007.4557560","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557560","url":null,"abstract":"This paper proposes and analyzes receiver schemes for multiple-input multiple-output (MIMO) systems with hybrid automatic-repeat-request (HARQ). It is shown by means of analysis as well as computer simulations that the proposed receiver schemes have optimal decoding performance in the sense that all the relevant information is fully used. Also complexity-wise, the proposed receiver schemes are found beneficial when designing MIMO systems, because the same decoding architecture can be re-used regardless of the number of retransmissions.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134132872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Watermark Embedding and Detection Strategies Under General Worst Case Attacks","authors":"E. Sabbag, N. Merhav","doi":"10.1109/ISIT.2007.4557586","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557586","url":null,"abstract":"We revisit the problem of optimal watermark embedding and detection for computationally limited detectors under general attack channels. First, a formal definition of the problem is given for general attack channels under the Neyman-Pearson criterion of optimality. Later, asymptotically optimal decision regions are offered, assuming that the detector is computationally limited and that the attack channel is strongly exchangeable. These results are extended to general attack channels where random watermark sequences are considered. The optimal embedding rule is offered and the worst attack channel is identified.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134456874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Value of Frame-Delays in the Sequential Coding of Correlated Sources","authors":"N. Ma, P. Ishwar","doi":"10.1109/ISIT.2007.4557434","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557434","url":null,"abstract":"The problem of sequential coding of correlated sources with causal encoding and noncausal decoding frame- delays is studied. The fundamental tradeoffs between individual frame rates, individual frame distortions, and decoding frame-delays are stated in terms of a single-letter information-theoretic characterization of the rate-distortion region for general inter- frame source correlations and certain types of (potentially frame- specific and coupled) single-letter fidelity criteria. For sources which are spatially stationary memoryless and temporally Gauss-Markov, mean squared error (MSE) frame distortions, and a sum-rate constraint, it is shown that causal sequential encoding with one-step delayed noncausal sequential decoding exactly matches the sum-rate-MSE performance of joint coding for all nontrivial MSE-tuples satisfying certain positive semi-definiteness conditions. Generalizations to multiple frames and arbitrary frame-delays are also presented and discussed.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"585 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133118995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synchronizing block codes with a decoder for variable-length codes","authors":"U. Speidel, T. Gulliver","doi":"10.1109/ISIT.2007.4557460","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557460","url":null,"abstract":"It is well known that any two non-identical codewords from a fixed-length code must belong to different non- periodic equivalence classes under cyclic shift for the code to have a bounded synchronization delay (BSD). Subsets of fixed- length codewords from T-codes, a family of variable-length codes (VLCs) known for strong statistical self-synchronization and a well-explained synchronization model, also follow this rule, albeit with some periodic exceptions. This paper shows how the T-code construction algorithm may be used for the simple construction of maximal block codes with bounded synchronization delay. These self-synchronizing codes are subsets of T-codes and thus resynchronization under decoding with a T-code decoder is both automatic and detectable.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133384609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}