Skip to main content

Showing 1–17 of 17 results for author: Elishco, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.12274  [pdf, other

    cs.IT

    Making it to First: The Random Access Problem in DNA Storage

    Authors: Avital Boruchovsky, Ohad Elishco, Ryan Gabrys, Anina Gruica, Itzhak Tamo, Eitan Yaakobi

    Abstract: We study the Random Access Problem in DNA storage, which addresses the challenge of retrieving a specific information strand from a DNA-based storage system. Given that $k$ information strands, representing the data, are encoded into $n$ strands using a code. The goal under this paradigm is to identify and analyze codes that minimize the expected number of reads required to retrieve any of the… ▽ More

    Submitted 21 January, 2025; originally announced January 2025.

  2. arXiv:2408.03113  [pdf, ps, other

    cs.IT

    Codes Correcting Two Bursts of Exactly $b$ Deletions

    Authors: Zuo Ye, Yubo Sun, Wenjun Yu, Gennian Ge, Ohad Elishco

    Abstract: In this paper, we investigate codes designed to correct two bursts of deletions, where each burst has a length of exactly $b$, where $b>1$. The previous best construction, achieved through the syndrome compression technique, had a redundancy of at most $7\log n+O\left(\log n/\log\log n\right)$ bits. In contrast, our work introduces a novel approach for constructing $q$-ary codes that attain a redu… ▽ More

    Submitted 8 September, 2024; v1 submitted 6 August, 2024; originally announced August 2024.

    Comments: Redundancy is improved to $5\log n+O(\log\log n)$

  3. arXiv:2401.04020  [pdf, ps, other

    cs.IT math.PR

    On the Long-Term behavior of $k$-tuples Frequencies in Mutation Systems

    Authors: Ohad Elishco

    Abstract: In response to the evolving landscape of data storage, researchers have increasingly explored non-traditional platforms, with DNA-based storage emerging as a cutting-edge solution. Our work is motivated by the potential of in-vivo DNA storage, known for its capacity to store vast amounts of information efficiently and confidentially within an organism's native DNA. While promising, in-vivo DNA sto… ▽ More

    Submitted 8 January, 2024; originally announced January 2024.

  4. arXiv:2309.06806  [pdf, ps, other

    cs.IT

    Bounds and Constructions for Generalized Batch Codes

    Authors: Xiangliang Kong, Ohad Elishco

    Abstract: Private information retrieval (PIR) codes and batch codes are two important types of codes that are designed for coded distributed storage systems and private information retrieval protocols. These codes have been the focus of much attention in recent years, as they enable efficient and secure storage and retrieval of data in distributed systems. In this paper, we introduce a new class of codes… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    Comments: 25 pages

    MSC Class: 68P30; 94B65 ACM Class: E.4.2

  5. arXiv:2308.14558  [pdf, other

    cs.IT math.CO

    Storage codes and recoverable systems on lines and grids

    Authors: Alexander Barg, Ohad Elishco, Ryan Gabrys, Geyang Wang, Eitan Yaakobi

    Abstract: A storage code is an assignment of symbols to the vertices of a connected graph $G(V,E)$ with the property that the value of each vertex is a function of the values of its neighbors, or more generally, of a certain neighborhood of the vertex in $G$. In this work we introduce a new construction method of storage codes, enabling one to construct new codes from known ones via an interleaving procedur… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  6. arXiv:2302.09842  [pdf, other

    cs.IT

    Codes Over Absorption Channels

    Authors: Zuo Ye, Ohad Elishco

    Abstract: In this paper, we present a novel communication channel, called the absorption channel, inspired by information transmission in neurons. Our motivation comes from in-vivo nano-machines, emerging medical applications, and brain-machine interfaces that communicate over the nervous system. Another motivation comes from viewing our model as a specific deletion channel, which may provide a new perspect… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

  7. arXiv:2211.11658   

    cs.IT

    Binary $t_1$-Deletion-$t_2$-Insertion-Burst Correcting Codes and Codes Correcting a Burst of Deletions

    Authors: Zuo Ye, Ohad Elishco

    Abstract: We first give a construction of binary $t_1$-deletion-$t_2$-insertion-burst correcting codes with redundancy at most $\log(n)+(t_1-t_2-1)\log\log(n)+O(1)$, where $t_1\ge 2t_2$. Then we give an improved construction of binary codes capable of correcting a burst of $4$ non-consecutive deletions, whose redundancy is reduced from $7\log(n)+2\log\log(n)+O(1)$ to $4\log(n)+6\log\log(n)+O(1)$. Lastly, by… ▽ More

    Submitted 22 November, 2022; v1 submitted 21 November, 2022; originally announced November 2022.

    Comments: Results are covered by others' work

  8. arXiv:2208.14963  [pdf, ps, other

    cs.IT math.CO

    Reconstruction of a Single String from a Part of its Composition Multiset

    Authors: Zuo Ye, Ohad Elishco

    Abstract: Motivated by applications in polymer-based data storage, we study the problem of reconstructing a string from part of its composition multiset. We give a full description of the structure of the strings that cannot be uniquely reconstructed (up to reversal) from their multiset of all of their prefix-suffix compositions. Leveraging this description, we prove that for all $n\ge 6$, there exists a st… ▽ More

    Submitted 15 October, 2022; v1 submitted 31 August, 2022; originally announced August 2022.

    Comments: 25 pages; errors corrected

  9. arXiv:2204.07013  [pdf, other

    cs.IT

    Optimal Reference for DNA Synthesis

    Authors: Ohad Elishco, Wasim Huleihel

    Abstract: In the recent years, DNA has emerged as a potentially viable storage technology. DNA synthesis, which refers to the task of writing the data into DNA, is perhaps the most costly part of existing storage systems. Accordingly, this high cost and low throughput limits the practical use in available DNA synthesis technologies. It has been found that the homopolymer run (i.e., the repetition of the sam… ▽ More

    Submitted 14 April, 2022; originally announced April 2022.

    Comments: 21 pages

  10. arXiv:2010.00589  [pdf, other

    cs.IT

    Recoverable Systems

    Authors: Ohad Elishco, Alexander Barg

    Abstract: Motivated by the established notion of storage codes, we consider sets of infinite sequences over a finite alphabet such that every $k$-tuple of consecutive entries is uniquely recoverable from its $l$-neighborhood in the sequence. We address the problem of finding the maximum growth rate of the set, which we term capacity, as well as constructions of explicit families that approach the optimal ra… ▽ More

    Submitted 6 March, 2022; v1 submitted 1 October, 2020; originally announced October 2020.

    Comments: Minor changes from v1. This is a final version (to appear in IEEE Transactions on Information Theory)

  11. arXiv:1909.05694  [pdf, ps, other

    cs.IT

    Repeat-Free Codes

    Authors: Ohad Elishco, Ryan Gabrys, Eitan Yaakobi, Muriel Médard

    Abstract: In this paper we consider the problem of encoding data into \textit{repeat-free} sequences in which sequences are imposed to contain any $k$-tuple at most once (for predefined $k$). First, the capacity of the repeat-free constraint are calculated. Then, an efficient algorithm, which uses two bits of redundancy, is presented to encode length-$n$ sequences for $k=2+2\log (n)$. This algorithm is then… ▽ More

    Submitted 21 June, 2021; v1 submitted 12 September, 2019; originally announced September 2019.

    Comments: 21 pages

  12. arXiv:1908.09900  [pdf, other

    cs.IT

    Capacity of dynamical storage systems

    Authors: Ohad Elishco, Alexander Barg

    Abstract: We introduce a dynamical model of node repair in distributed storage systems wherein the storage nodes are subjected to failures according to independent Poisson processes. The main parameter that we study is the time-average capacity of the network in the scenario where a fixed subset of the nodes support a higher repair bandwidth than the other nodes. The sequence of node failures generates rand… ▽ More

    Submitted 20 September, 2020; v1 submitted 26 August, 2019; originally announced August 2019.

    Comments: 27 pages; final version

  13. arXiv:1808.06062  [pdf, ps, other

    cs.IT math.CO

    The Capacity of Some Pólya String Models

    Authors: Ohad Elishco, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck

    Abstract: We study random string-duplication systems, which we call Pólya string models. These are motivated by DNA storage in living organisms, and certain random mutation processes that affect their genome. Unlike previous works that study the combinatorial capacity of string-duplication systems, or various string statistics, this work provides exact capacity or bounds on it, for several probabilistic mod… ▽ More

    Submitted 18 August, 2018; originally announced August 2018.

  14. arXiv:1709.05105  [pdf, other

    math.DS cs.IT

    On Independence and Capacity of Multidimensional Semiconstrained Systems

    Authors: Ohad Elishco, Tom Meyerovitch, Moshe Schwartz

    Abstract: We find a new formula for the limit of the capacity of certain sequences of multidimensional semiconstrained systems as the dimension tends to infinity. We do so by generalizing the notion of independence entropy, originally studied in the context of constrained systems, to the study of semiconstrained systems. Using the independence entropy, we obtain new lower bounds on the capacity of multidime… ▽ More

    Submitted 15 September, 2017; originally announced September 2017.

    Comments: 31 pages

  15. arXiv:1601.05594  [pdf, ps, other

    cs.IT

    Encoding Semiconstrained Systems

    Authors: Ohad Elishco, Tom Meyerovitch, Moshe Schwartz

    Abstract: Semiconstrained systems were recently suggested as a generalization of constrained systems, commonly used in communication and data-storage applications that require certain offending subsequences be avoided. In an attempt to apply techniques from constrained systems, we study sequences of constrained systems that are contained in, or contain, a given semiconstrained system, while approaching its… ▽ More

    Submitted 24 October, 2016; v1 submitted 21 January, 2016; originally announced January 2016.

    Comments: 15 pages

  16. arXiv:1401.2612  [pdf, ps, other

    cs.IT

    Semi-constrained Systems

    Authors: Ohad Elishco, Tom Meyerovitch, Moshe Schwartz

    Abstract: When transmitting information over a noisy channel, two approaches, dating back to Shannon's work, are common: assuming the channel errors are independent of the transmitted content and devising an error-correcting code, or assuming the errors are data dependent and devising a constrained-coding scheme that eliminates all offending data patterns. In this paper we analyze a middle road, which we ca… ▽ More

    Submitted 21 January, 2015; v1 submitted 12 January, 2014; originally announced January 2014.

  17. arXiv:1205.4674  [pdf, ps, other

    cs.IT

    Capacity and coding for the Ising Channel with Feedback

    Authors: Ohad Elishco, Haim Permuter

    Abstract: The Ising channel, which was introduced in 1990, is a channel with memory that models Inter-Symbol interference. In this paper we consider the Ising channel with feedback and find the capacity of the channel together with a capacity-achieving coding scheme. To calculate the channel capacity, an equivalent dynamic programming (DP) problem is formulated and solved. Using the DP solution, we establis… ▽ More

    Submitted 21 May, 2012; originally announced May 2012.