Skip to main content

Showing 1–50 of 53 results for author: Bruck, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.08751  [pdf, other

    cs.CC cs.DM cs.LG cs.NE

    Nearest Neighbor Representations of Neural Circuits

    Authors: Kordag Mehmet Kilic, Jin Sima, Jehoshua Bruck

    Abstract: Neural networks successfully capture the computational power of the human brain for many tasks. Similarly inspired by the brain architecture, Nearest Neighbor (NN) representations is a novel approach of computation. We establish a firmer correspondence between NN representations and neural networks. Although it was known how to represent a single neuron using NN representations, there were no resu… ▽ More

    Submitted 9 May, 2024; v1 submitted 13 February, 2024; originally announced February 2024.

    Comments: This paper is accepted to ISIT 2024. 2nd version has revisions for better clarity, more citations, and more explanation in the proofs. No results are changed

  2. arXiv:2402.08748  [pdf, ps, other

    cs.CC cs.DM cs.LG cs.NE

    Nearest Neighbor Representations of Neurons

    Authors: Kordag Mehmet Kilic, Jin Sima, Jehoshua Bruck

    Abstract: The Nearest Neighbor (NN) Representation is an emerging computational model that is inspired by the brain. We study the complexity of representing a neuron (threshold function) using the NN representations. It is known that two anchors (the points to which NN is computed) are sufficient for a NN representation of a threshold function, however, the resolution (the maximum number of bits required fo… ▽ More

    Submitted 9 May, 2024; v1 submitted 13 February, 2024; originally announced February 2024.

    Comments: This paper is accepted to ISIT 2024. 2nd version had revisions for better clarity, fixing of typos. No results are changed

  3. arXiv:2311.06840  [pdf, ps, other

    cs.LG cs.AI cs.IT cs.SI stat.ME

    Omitted Labels Induce Nontransitive Paradoxes in Causality

    Authors: Bijan Mazaheri, Siddharth Jain, Matthew Cook, Jehoshua Bruck

    Abstract: We explore "omitted label contexts," in which training data is limited to a subset of the possible labels. This setting is standard among specialized human experts or specific, focused studies. By studying Simpson's paradox, we observe that ``correct'' adjustments sometimes require non-exchangeable treatment and control groups. A generalization of Simpson's paradox leads us to study networks of co… ▽ More

    Submitted 30 April, 2025; v1 submitted 12 November, 2023; originally announced November 2023.

    Comments: Accepted to appear in CLeaR 2025

  4. arXiv:2310.01729  [pdf, other

    cs.IT

    Error Correction for DNA Storage

    Authors: Jin Sima, Netanel Raviv, Moshe Schwartz, Jehoshua Bruck

    Abstract: DNA-based storage is an emerging storage technology that provides high information density and long duration. Due to the physical constraints in the reading and writing processes, error correction in DNA storage poses several interesting coding theoretic challenges, some of which are new. In this paper, we give a brief introduction to some of the coding challenges for DNA-based storage, including… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

  5. arXiv:2308.07793  [pdf, ps, other

    cs.IT

    Robust Indexing for the Sliced Channel: Almost Optimal Codes for Substitutions and Deletions

    Authors: Jin Sima, Netanel Raviv, Jehoshua Bruck

    Abstract: Encoding data as a set of unordered strings is receiving great attention as it captures one of the basic features of DNA storage systems. However, the challenge of constructing optimal redundancy codes for this channel remained elusive. In this paper, we address this problem and present an order-wise optimal construction of codes that are capable of correcting multiple substitution, deletion, and… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

  6. arXiv:2305.05808  [pdf, ps, other

    cs.CC cs.DM cs.IT cs.LG cs.NE

    On the Information Capacity of Nearest Neighbor Representations

    Authors: Kordag Mehmet Kilic, Jin Sima, Jehoshua Bruck

    Abstract: The $\textit{von Neumann Computer Architecture}$ has a distinction between computation and memory. In contrast, the brain has an integrated architecture where computation and memory are indistinguishable. Motivated by the architecture of the brain, we propose a model of $\textit{associative computation}$ where memory is defined by a set of vectors in $\mathbb{R}^n$ (that we call… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: The conference version is submitted to and accepted by ISIT 2023

  7. arXiv:2207.08372  [pdf, ps, other

    cs.IT

    Correcting $k$ Deletions and Insertions in Racetrack Memory

    Authors: Jin Sima, Jehoshua Bruck

    Abstract: One of the main challenges in developing racetrack memory systems is the limited precision in controlling the track shifts, that in turn affects the reliability of reading and writing the data. A current proposal for combating deletions in racetrack memories is to use redundant heads per-track resulting in multiple copies (potentially erroneous) and recovering the data by solving a specialized ver… ▽ More

    Submitted 18 July, 2022; originally announced July 2022.

  8. arXiv:2205.08032  [pdf, ps, other

    cs.CC cs.DM cs.IT cs.LG cs.NE

    On Algebraic Constructions of Neural Networks with Small Weights

    Authors: Kordag Mehmet Kilic, Jin Sima, Jehoshua Bruck

    Abstract: Neural gates compute functions based on weighted sums of the input variables. The expressive power of neural gates (number of distinct functions it can compute) depends on the weight sizes and, in general, large weights (exponential in the number of inputs) are required. Studying the trade-offs among the weight sizes, circuit size and depth is a well-studied topic both in circuit complexity theory… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

  9. arXiv:2107.07054  [pdf, other

    cs.LG cs.AI cs.DM cs.IT econ.TH

    Expert Graphs: Synthesizing New Expertise via Collaboration

    Authors: Bijan Mazaheri, Siddharth Jain, Jehoshua Bruck

    Abstract: Consider multiple experts with overlapping expertise working on a classification problem under uncertain input. What constitutes a consistent set of opinions? How can we predict the opinions of experts on missing sub-domains? In this paper, we define a framework of to analyze this problem, termed "expert graphs." In an expert graph, vertices represent classes and edges represent binary opinions on… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

    Comments: 13 pages, 11 figures

  10. arXiv:2102.05372  [pdf, ps, other

    cs.IT math.CO math.PR

    Trace Reconstruction with Bounded Edit Distance

    Authors: Jin Sima, Jehoshua Bruck

    Abstract: The trace reconstruction problem studies the number of noisy samples needed to recover an unknown string $\boldsymbol{x}\in\{0,1\}^n$ with high probability, where the samples are independently obtained by passing $\boldsymbol{x}$ through a random deletion channel with deletion probability $q$. The problem is receiving significant attention recently due to its applications in DNA sequencing and DNA… ▽ More

    Submitted 14 April, 2021; v1 submitted 10 February, 2021; originally announced February 2021.

  11. arXiv:2010.12687  [pdf, other

    stat.ML cs.IT cs.LG

    Robust Correction of Sampling Bias Using Cumulative Distribution Functions

    Authors: Bijan Mazaheri, Siddharth Jain, Jehoshua Bruck

    Abstract: Varying domains and biased datasets can lead to differences between the training and the target distributions, known as covariate shift. Current approaches for alleviating this often rely on estimating the ratio of training and target probability density functions. These techniques require parameter tuning and can be unstable across different datasets. We present a new method for handling covariat… ▽ More

    Submitted 23 October, 2020; originally announced October 2020.

    Comments: Accepted in Neurips 2020

  12. arXiv:2005.03248  [pdf, other

    cs.IT

    Coding for Optimized Writing Rate in DNA Storage

    Authors: Siddharth Jain, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck

    Abstract: A method for encoding information in DNA sequences is described. The method is based on the precision-resolution framework, and is aimed to work in conjunction with a recently suggested terminator-free template independent DNA synthesis method. The suggested method optimizes the amount of information bits per synthesis time unit, namely, the writing rate. Additionally, the encoding scheme studied… ▽ More

    Submitted 13 May, 2020; v1 submitted 7 May, 2020; originally announced May 2020.

    Comments: To appear in ISIT 2020

  13. arXiv:2004.10700  [pdf, ps, other

    cs.LG cs.CR cs.IT stat.ML

    CodNN -- Robust Neural Networks From Coded Classification

    Authors: Netanel Raviv, Siddharth Jain, Pulakesh Upadhyaya, Jehoshua Bruck, Anxiao Jiang

    Abstract: Deep Neural Networks (DNNs) are a revolutionary force in the ongoing information revolution, and yet their intrinsic properties remain a mystery. In particular, it is widely known that DNNs are highly sensitive to noise, whether adversarial or random. This poses a fundamental challenge for hardware implementations of DNNs, and for their deployment in critical applications such as autonomous drivin… ▽ More

    Submitted 29 April, 2020; v1 submitted 22 April, 2020; originally announced April 2020.

    Comments: To appear in ISIT '20

  14. arXiv:2001.03464  [pdf, other

    cs.LG cs.IT stat.ML

    What is the Value of Data? On Mathematical Methods for Data Quality Estimation

    Authors: Netanel Raviv, Siddharth Jain, Jehoshua Bruck

    Abstract: Data is one of the most important assets of the information age, and its societal impact is undisputed. Yet, rigorous methods of assessing the quality of data are lacking. In this paper, we propose a formal definition for the quality of a given dataset. We assess a dataset's quality by a quantity we call the expected diameter, which measures the expected disagreement between two randomly chosen hy… ▽ More

    Submitted 12 May, 2020; v1 submitted 9 January, 2020; originally announced January 2020.

  15. arXiv:1910.12247  [pdf, ps, other

    cs.IT

    Optimal $k$-Deletion Correcting Codes

    Authors: Jin Sima, Jehoshua Bruck

    Abstract: Levenshtein introduced the problem of constructing $k$-deletion correcting codes in 1966, proved that the optimal redundancy of those codes is $O(k\log N)$, and proposed an optimal redundancy single-deletion correcting code (using the so-called VT construction). However, the problem of constructing optimal redundancy $k$-deletion correcting codes remained open. Our key contribution is a solution t… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

  16. arXiv:1901.03084  [pdf, other

    cs.IT

    Iterative Programming of Noisy Memory Cells

    Authors: Michal Horovitz, Eitan Yaakobi, Eyal En Gad, Jehoshua Bruck

    Abstract: In this paper, we study a model, which was first presented by Bunte and Lapidoth, that mimics the programming operation of memory cells. Under this paradigm we assume that cells are programmed sequentially and individually. The programming process is modeled as transmission over a channel, while it is possible to read the cell state in order to determine its programming success, and in case of pro… ▽ More

    Submitted 10 January, 2019; originally announced January 2019.

    Comments: 10 pages, 2 figures

  17. arXiv:1812.02250  [pdf, other

    cs.IT

    Evolution of $k$-mer Frequencies and Entropy in Duplication and Substitution Mutation Systems

    Authors: Hao Lou, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck

    Abstract: Genomic evolution can be viewed as string-editing processes driven by mutations. An understanding of the statistical properties resulting from these mutation processes is of value in a variety of tasks related to biological sequence data, e.g., estimation of model parameters and compression. At the same time, due to the complexity of these processes, designing tractable stochastic models and analy… ▽ More

    Submitted 5 December, 2018; originally announced December 2018.

  18. arXiv:1809.02716  [pdf, ps, other

    cs.IT

    On Coding over Sliced Information

    Authors: Jin Sima, Netanel Raviv, Jehoshua Bruck

    Abstract: The interest in channel models in which the data is sent as an unordered set of binary strings has increased lately, due to emerging applications in DNA storage, among others. In this paper we analyze the minimal redundancy of binary codes for this channel under substitution errors, and provide several constructions, some of which are shown to be asymptotically optimal up to constants. The surpris… ▽ More

    Submitted 27 October, 2019; v1 submitted 7 September, 2018; originally announced September 2018.

  19. arXiv:1808.06062  [pdf, ps, other

    cs.IT math.CO

    The Capacity of Some Pólya String Models

    Authors: Ohad Elishco, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck

    Abstract: We study random string-duplication systems, which we call Pólya string models. These are motivated by DNA storage in living organisms, and certain random mutation processes that affect their genome. Unlike previous works that study the combinatorial capacity of string-duplication systems, or various string statistics, this work provides exact capacity or bounds on it, for several probabilistic mod… ▽ More

    Submitted 18 August, 2018; originally announced August 2018.

  20. arXiv:1806.09240  [pdf, ps, other

    cs.IT

    Two Deletion Correcting Codes from Indicator Vectors

    Authors: Jin Sima, Netanel Raviv, Jehoshua Bruck

    Abstract: Construction of capacity achieving deletion correcting codes has been a baffling challenge for decades. A recent breakthrough by Brakensiek $et~al$., alongside novel applications in DNA storage, have reignited the interest in this longstanding open problem. In spite of recent advances, the amount of redundancy in existing codes is still orders of magnitude away from being optimal. In this paper, a… ▽ More

    Submitted 24 June, 2018; originally announced June 2018.

  21. arXiv:1706.00500  [pdf, other

    cs.IT cs.CR

    Generic Secure Repair for Distributed Storage

    Authors: Wentao Huang, Jehoshua Bruck

    Abstract: This paper studies the problem of repairing secret sharing schemes, i.e., schemes that encode a message into $n$ shares, assigned to $n$ nodes, so that any $n-r$ nodes can decode the message but any colluding $z$ nodes cannot infer any information about the message. In the event of node failures so that shares held by the failed nodes are lost, the system needs to be repaired by reconstructing and… ▽ More

    Submitted 1 June, 2017; originally announced June 2017.

  22. arXiv:1611.05537  [pdf, other

    cs.IT cs.DM q-bio.GN

    Duplication Distance to the Root for Binary Sequences

    Authors: Noga Alon, Jehoshua Bruck, Farzad Farnoud, Siddharth Jain

    Abstract: We study the tandem duplication distance between binary sequences and their roots. In other words, the quantity of interest is the number of tandem duplication operations of the form $\seq x = \seq a \seq b \seq c \to \seq y = \seq a \seq b \seq b \seq c$, where $\seq x$ and $\seq y$ are sequences and $\seq a$, $\seq b$, and $\seq c$ are their substrings, needed to generate a binary sequence of le… ▽ More

    Submitted 16 November, 2016; originally announced November 2016.

    Comments: submitted to IEEE Transactions on Information Theory

  23. Duplication-Correcting Codes for Data Storage in the DNA of Living Organisms

    Authors: Siddharth Jain, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck

    Abstract: The ability to store data in the DNA of a living organism has applications in a variety of areas including synthetic biology and watermarking of patented genetically-modified organisms. Data stored in this medium is subject to errors arising from various mutations, such as point mutations, indels, and tandem duplication, which need to be corrected to maintain data integrity. In this paper, we prov… ▽ More

    Submitted 1 June, 2016; originally announced June 2016.

    Comments: Submitted to IEEE Transactions on Information Theory

  24. arXiv:1603.01213  [pdf, ps, other

    cs.IT

    Optimal Rebuilding of Multiple Erasures in MDS Codes

    Authors: Zhiying Wang, Itzhak Tamo, Jehoshua Bruck

    Abstract: MDS array codes are widely used in storage systems due to their computationally efficient encoding and decoding procedures. An MDS code with $r$ redundancy nodes can correct any $r$ node erasures by accessing all the remaining information in the surviving nodes. However, in practice, $e$ erasures is a more likely failure event, for $1\le e<r$. Hence, a natural question is how much information do w… ▽ More

    Submitted 3 March, 2016; originally announced March 2016.

    Comments: There is an overlap of this work with our two previous submissions: Zigzag Codes: MDS Array Codes with Optimal Rebuilding; On Codes for Optimal Rebuilding Access. arXiv admin note: text overlap with arXiv:1112.0371

  25. arXiv:1509.06029  [pdf, other

    cs.IT cs.DM cs.FL q-bio.GN

    Capacity and Expressiveness of Genomic Tandem Duplication

    Authors: Siddharth Jain, Farzad Farnoud, Jehoshua Bruck

    Abstract: The majority of the human genome consists of repeated sequences. An important type of repeated sequences common in the human genome are tandem repeats, where identical copies appear next to each other. For example, in the sequence $AGTC\underline{TGTG}C$, $TGTG$ is a tandem repeat, that may be generated from $AGTCTGC$ by a tandem duplication of length $2$. In this work, we investigate the possibil… ▽ More

    Submitted 20 September, 2015; originally announced September 2015.

    Comments: 19 pages, 3 figures, submitted to IEEE Transactions on Information Theory

  26. arXiv:1505.07515  [pdf, other

    cs.IT cs.CR

    Communication Efficient Secret Sharing

    Authors: Wentao Huang, Michael Langberg, Joerg Kliewer, Jehoshua Bruck

    Abstract: A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into $n$ shares, such that any set of at least $t_1$ shares suffice to decode the secret, and any set of at most $t_2 < t_1$ shares reveal no information about the secret. Assuming that each party holds a share and a user wishes to decode the secre… ▽ More

    Submitted 1 April, 2016; v1 submitted 27 May, 2015; originally announced May 2015.

    Comments: submitted to the IEEE Transactions on Information Theory. New references and a new construction added

  27. arXiv:1502.00189  [pdf, ps, other

    cs.IT

    Rewriting Flash Memories by Message Passing

    Authors: Eyal En Gad, Wentao Huang, Yue Li, Jehoshua Bruck

    Abstract: This paper constructs WOM codes that combine rewriting and error correction for mitigating the reliability and the endurance problems in flash memory. We consider a rewriting model that is of practical interest to flash applications where only the second write uses WOM codes. Our WOM code construction is based on binary erasure quantization with LDGM codes, where the rewriting uses message passing… ▽ More

    Submitted 31 January, 2015; originally announced February 2015.

    Comments: Submitted to ISIT 2015

  28. arXiv:1411.6328  [pdf, ps, other

    cs.IT

    Explicit MDS Codes for Optimal Repair Bandwidth

    Authors: Zhiying Wang, Itzhak Tamo, Jehoshua Bruck

    Abstract: MDS codes are erasure-correcting codes that can correct the maximum number of erasures for a given number of redundancy or parity symbols. If an MDS code has $r$ parities and no more than $r$ erasures occur, then by transmitting all the remaining data in the code, the original information can be recovered. However, it was shown that in order to recover a single symbol erasure, only a fraction of… ▽ More

    Submitted 23 November, 2014; originally announced November 2014.

    Comments: 17 pages

  29. arXiv:1410.3542  [pdf, ps, other

    cs.IT

    Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

    Authors: Eyal En Gad, Yue Li, Joerg Kliewer, Michael Langberg, Anxiao Jiang, Jehoshua Bruck

    Abstract: We propose efficient coding schemes for two communication settings: 1. asymmetric channels, and 2. channels with an informed encoder. These settings are important in non-volatile memories, as well as optical and broadcast communication. The schemes are based on non-linear polar codes, and they build on and improve recent work on these settings. In asymmetric channels, we tackle the exponential sto… ▽ More

    Submitted 28 December, 2015; v1 submitted 13 October, 2014; originally announced October 2014.

    Comments: Submitted to IEEE Transactions on Information Theory. Partially presented at ISIT 2014

  30. arXiv:1401.4634  [pdf, ps, other

    cs.IT cs.CL

    The Capacity of String-Replication Systems

    Authors: Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck

    Abstract: It is known that the majority of the human genome consists of repeated sequences. Furthermore, it is believed that a significant part of the rest of the genome also originated from repeated sequences and has mutated to its current form. In this paper, we investigate the possibility of constructing an exponentially large number of sequences from a short initial sequence and simple replication rules… ▽ More

    Submitted 18 January, 2014; originally announced January 2014.

  31. arXiv:1401.3093  [pdf, ps, other

    cs.IT

    Rate-Distortion for Ranking with Incomplete Information

    Authors: Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck

    Abstract: We study the rate-distortion relationship in the set of permutations endowed with the Kendall Tau metric and the Chebyshev metric. Our study is motivated by the application of permutation rate-distortion to the average-case and worst-case analysis of algorithms for ranking with incomplete information and approximate sorting algorithms. For the Kendall Tau metric we provide bounds for small, medium… ▽ More

    Submitted 14 January, 2014; originally announced January 2014.

  32. arXiv:1312.0972  [pdf, ps, other

    cs.IT

    Rank-Modulation Rewrite Coding for Flash Memories

    Authors: Eyal En Gad, Eitan Yaakobi, Anxiao, Jiang, Jehoshua Bruck

    Abstract: The current flash memory technology focuses on the cost minimization of its static storage capacity. However, the resulting approach supports a relatively small number of program-erase cycles. This technology is effective for consumer devices (e.g., smartphones and cameras) where the number of program-erase cycles is small. However, it is not economical for enterprise storage systems that require… ▽ More

    Submitted 30 December, 2014; v1 submitted 3 December, 2013; originally announced December 2013.

    Comments: Revised version for IEEE transactions on Information Theory

  33. arXiv:1311.7113  [pdf, ps, other

    cs.IT

    Systematic Codes for Rank Modulation

    Authors: Sarit Buzaglo, Eitan Yaakobi, Tuvi Etzion, Jehoshua Bruck

    Abstract: The goal of this paper is to construct systematic error-correcting codes for permutations and multi-permutations in the Kendall's $τ$-metric. These codes are important in new applications such as rank modulation for flash memories. The construction is based on error-correcting codes for multi-permutations and a partition of the set of permutations into error-correcting codes. For a given large eno… ▽ More

    Submitted 20 April, 2014; v1 submitted 27 November, 2013; originally announced November 2013.

    Comments: to be presented ISIT2014

  34. arXiv:1310.6817  [pdf, ps, other

    cs.IT

    Systematic Error-Correcting Codes for Rank Modulation

    Authors: Hongchao Zhou, Moshe Schwartz, Anxiao Jiang, Jehoshua Bruck

    Abstract: The rank-modulation scheme has been recently proposed for efficiently storing data in nonvolatile memories. Error-correcting codes are essential for rank modulation, however, existing results have been limited. In this work we explore a new approach, \emph{systematic error-correcting codes for rank modulation}. Systematic codes have the benefits of enabling efficient information retrieval and pote… ▽ More

    Submitted 25 October, 2013; originally announced October 2013.

  35. Access vs. Bandwidth in Codes for Storage

    Authors: Itzhak Tamo, Zhiying Wang, Jehoshua Bruck

    Abstract: Maximum distance separable (MDS) codes are widely used in storage systems to protect against disk (node) failures. A node is said to have capacity $l$ over some field $\mathbb{F}$, if it can store that amount of symbols of the field. An $(n,k,l)$ MDS code uses $n$ nodes of capacity $l$ to store $k$ information nodes. The MDS property guarantees the resiliency to any $n-k$ node failures. An \emph{o… ▽ More

    Submitted 14 March, 2013; originally announced March 2013.

    Comments: This paper was presented in part at the IEEE International Symposium on Information Theory (ISIT 2012). submitted to IEEE transactions on information theory

  36. arXiv:1209.0744  [pdf, ps, other

    cs.IT

    Balanced Modulation for Nonvolatile Memories

    Authors: Hongchao Zhou, Anxiao, Jiang, Jehoshua Bruck

    Abstract: This paper presents a practical writing/reading scheme in nonvolatile memories, called balanced modulation, for minimizing the asymmetric component of errors. The main idea is to encode data using a balanced error-correcting code. When reading information from a block, it adjusts the reading threshold such that the resulting word is also balanced or approximately balanced. Balanced modulation has… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 2 columns, 15 pages

  37. arXiv:1209.0740  [pdf, ps, other

    cs.IT

    Nonuniform Codes for Correcting Asymmetric Errors in Data Storage

    Authors: Hongchao Zhou, Anxiao, Jiang, Jehoshua Bruck

    Abstract: The construction of asymmetric error correcting codes is a topic that was studied extensively, however, the existing approach for code construction assumes that every codeword should tolerate $t$ asymmetric errors. Our main observation is that in contrast to symmetric errors, asymmetric errors are content dependent. For example, in Z-channels, the all-1 codeword is prone to have more errors than t… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 2 columns, 15 pages

  38. arXiv:1209.0734  [pdf, ps, other

    cs.IT cs.CR math.PR

    Efficiently Extracting Randomness from Imperfect Stochastic Processes

    Authors: Hongchao Zhou, Jehoshua Bruck

    Abstract: We study the problem of extracting a prescribed number of random bits by reading the smallest possible number of symbols from non-ideal stochastic processes. The related interval algorithm proposed by Han and Hoshi has asymptotically optimal performance; however, it assumes that the distribution of the input stochastic process is known. The motivation for our work is the fact that, in practice, so… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 2 columns, 16 pages

  39. arXiv:1209.0732  [pdf, ps, other

    cs.IT cs.CR math.PR

    Linear Transformations for Randomness Extraction

    Authors: Hongchao Zhou, Jehoshua Bruck

    Abstract: Information-efficient approaches for extracting randomness from imperfect sources have been extensively studied, but simpler and faster ones are required in the high-speed applications of random number generation. In this paper, we focus on linear constructions, namely, applying linear transformation for randomness extraction. We show that linear transformations based on sparse random matrices are… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 2 columns, 14 pages

  40. arXiv:1209.0730  [pdf, ps, other

    cs.IT cs.DS math.PR

    Streaming Algorithms for Optimal Generation of Random Bits

    Authors: Hongchao Zhou, Jehoshua Bruck

    Abstract: Generating random bits from a source of biased coins (the biased is unknown) is a classical question that was originally studied by von Neumann. There are a number of known algorithms that have asymptotically optimal information efficiency, namely, the expected number of generated random bits per input bit is asymptotically close to the entropy of the source. However, only the original von Neumann… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 2 columns, 13 pages

  41. arXiv:1209.0726  [pdf, ps, other

    cs.IT math.PR

    A Universal Scheme for Transforming Binary Algorithms to Generate Random Bits from Loaded Dice

    Authors: Hongchao Zhou, Jehoshua Bruck

    Abstract: In this paper, we present a universal scheme for transforming an arbitrary algorithm for biased 2-face coins to generate random bits from the general source of an m-sided die, hence enabling the application of existing algorithms to general sources. In addition, we study approaches of efficiently generating a prescribed number of random bits from an arbitrary biased coin. This contrasts with most… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 2 columns, 10 pages

  42. arXiv:1209.0724  [pdf, ps, other

    cs.IT cs.NE math.PR

    Synthesis of Stochastic Flow Networks

    Authors: Hongchao Zhou, Ho-Lin Chen, Jehoshua Bruck

    Abstract: A stochastic flow network is a directed graph with incoming edges (inputs) and outgoing edges (outputs), tokens enter through the input edges, travel stochastically in the network, and can exit the network through the output edges. Each node in the network is a splitter, namely, a token can enter a node through an incoming edge and exit on one of the output edges according to a predefined probabil… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 2 columns, 15 pages

  43. arXiv:1209.0715  [pdf, ps, other

    cs.IT

    The Synthesis and Analysis of Stochastic Switching Circuits

    Authors: Hongchao Zhou, Po-Ling Loh, Jehoshua Bruck

    Abstract: Stochastic switching circuits are relay circuits that consist of stochastic switches called pswitches. The study of stochastic switching circuits has widespread applications in many fields of computer science, neuroscience, and biochemistry. In this paper, we discuss several properties of stochastic switching circuits, including robustness, expressibility, and probability approximation. First, w… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 2 columns, 15 pages

  44. Zigzag Codes: MDS Array Codes with Optimal Rebuilding

    Authors: Itzhak Tamo, Zhiying Wang, Jehoshua Bruck

    Abstract: MDS array codes are widely used in storage systems to protect data against erasures. We address the \emph{rebuilding ratio} problem, namely, in the case of erasures, what is the fraction of the remaining information that needs to be accessed in order to rebuild \emph{exactly} the lost information? It is clear that when the number of erasures equals the maximum number of erasures that an MDS code c… ▽ More

    Submitted 1 December, 2011; originally announced December 2011.

    Comments: 23 pages, 5 figures, submitted to IEEE transactions on information theory

  45. arXiv:1108.2741  [pdf, ps, other

    cs.IT

    Compressed Encoding for Rank Modulation

    Authors: Eyal En Gad, Anxiao, Jiang, Jehoshua Bruck

    Abstract: Rank modulation has been recently proposed as a scheme for storing information in flash memories. While rank modulation has advantages in improving write speed and endurance, the current encoding approach is based on the "push to the top" operation that is not efficient in the general case. We propose a new encoding procedure where a cell level is raised to be higher than the minimal necessary sub… ▽ More

    Submitted 12 August, 2011; originally announced August 2011.

  46. arXiv:1107.1627  [pdf, ps, other

    cs.IT cs.DC

    On Codes for Optimal Rebuilding Access

    Authors: Zhiying Wang, Itzhak Tamo, Jehoshua Bruck

    Abstract: MDS (maximum distance separable) array codes are widely used in storage systems due to their computationally efficient encoding and decoding procedures. An MDS code with r redundancy nodes can correct any r erasures by accessing (reading) all the remaining information in both the systematic nodes and the parity (redundancy) nodes. However, in practice, a single erasure is the most likely failure e… ▽ More

    Submitted 8 July, 2011; originally announced July 2011.

    Comments: Submitted to Allerton 2011

  47. arXiv:1103.3737  [pdf, ps, other

    cs.IT cs.DC

    MDS Array Codes with Optimal Rebuilding

    Authors: Itzhak Tamo, Zhiying Wang, Jehoshua Bruck

    Abstract: MDS array codes are widely used in storage systems to protect data against erasures. We address the \emph{rebuilding ratio} problem, namely, in the case of erasures, what is the the fraction of the remaining information that needs to be accessed in order to rebuild \emph{exactly} the lost information? It is clear that when the number of erasures equals the maximum number of erasures that an MDS co… ▽ More

    Submitted 18 March, 2011; originally announced March 2011.

    Comments: 14 pages, 4 figures, a short version submitted to ISIT 2011

  48. arXiv:1103.0317  [pdf, ps, other

    cs.IT

    Generalized Gray Codes for Local Rank Modulation

    Authors: Eyal En Gad, Michael Langberg, Moshe Schwartz, Jehoshua Bruck

    Abstract: We consider the local rank-modulation scheme in which a sliding window going over a sequence of real-valued variables induces a sequence of permutations. Local rank-modulation is a generalization of the rank-modulation scheme, which has been recently suggested as a way of storing information in flash memory. We study Gray codes for the local rank-modulation scheme in order to simulate conventional… ▽ More

    Submitted 1 March, 2011; originally announced March 2011.

    Comments: 7 pages, 1 figure, shorter version was submitted to ISIT 2011

  49. arXiv:1102.1441  [pdf, other

    cs.IT cs.DM

    Generating Probability Distributions using Multivalued Stochastic Relay Circuits

    Authors: David Lee, Jehoshua Bruck

    Abstract: The problem of random number generation dates back to von Neumann's work in 1951. Since then, many algorithms have been developed for generating unbiased bits from complex correlated sources as well as for generating arbitrary distributions from unbiased bits. An equally interesting, but less studied aspect is the structural component of random number generation as opposed to the algorithmic aspec… ▽ More

    Submitted 7 February, 2011; originally announced February 2011.

  50. Trajectory Codes for Flash Memory

    Authors: Anxiao, Jiang, Michael Langberg, Moshe Schwartz, Jehoshua Bruck

    Abstract: Flash memory is well-known for its inherent asymmetry: the flash-cell charge levels are easy to increase but are hard to decrease. In a general rewriting model, the stored data changes its value with certain patterns. The patterns of data updates are determined by the data structure and the application, and are independent of the constraints imposed by the storage medium. Thus, an appropriate codi… ▽ More

    Submitted 24 December, 2010; originally announced December 2010.

    Comments: Submitted to IEEE Trans. on Inform. Theory