-
A Group Theoretic Construction of Batch Codes
Authors:
Eldho K. Thomas
Abstract:
Batch codes serve as critical tools for load balancing in distributed storage systems. While numerous constructions exist for specific batch sizes t, current methodologies predominantly rely on code dimension parameters, limiting their adaptability. Practical implementations, however, demand versatile batch code designs capable of accommodating arbitrary batch sizes-a challenge that remains unders…
▽ More
Batch codes serve as critical tools for load balancing in distributed storage systems. While numerous constructions exist for specific batch sizes t, current methodologies predominantly rely on code dimension parameters, limiting their adaptability. Practical implementations, however, demand versatile batch code designs capable of accommodating arbitrary batch sizes-a challenge that remains understudied in the literature. This paper introduces a novel framework for constructing batch codes through finite groups and their subgroup structures, building on the quasi-uniform group code framework proposed by Chan et al. By leveraging algebraic properties of groups, the proposed method enables systematic code construction, streamlined decoding procedures, and efficient reconstruction of information symbols. Unlike traditional linear codes, quasi-uniform codes exhibit broader applicability due to their inherent structural flexibility.
Focusing on abelian 2-groups, the work investigates their subgroup lattices and demonstrates their utility in code design-a contribution of independent theoretical interest. The resulting batch codes achieve near-optimal code lengths and exhibit potential for dual application as locally repairable codes (LRCs), addressing redundancy and fault tolerance in distributed systems. This study not only advances batch code construction but also establishes group-theoretic techniques as a promising paradigm for future research in coded storage systems. By bridging algebraic structures with practical coding demands, the approach opens new directions for optimizing distributed storage architectures.
△ Less
Submitted 26 April, 2025;
originally announced April 2025.
-
Batch Codes for Asynchronous Recovery of Data
Authors:
Ago-Erik Riet,
Vitaly Skachek,
Eldho K. Thomas
Abstract:
We propose a new model of asynchronous batch codes that allow for parallel recovery of information symbols from a coded database in an asynchronous manner, i.e. when queries arrive at random times and they take varying time to process. We show that the graph-based batch codes studied by et al. are asynchronous. Further, we demonstrate that hypergraphs of Berge girth larger or equal to 4, respectiv…
▽ More
We propose a new model of asynchronous batch codes that allow for parallel recovery of information symbols from a coded database in an asynchronous manner, i.e. when queries arrive at random times and they take varying time to process. We show that the graph-based batch codes studied by et al. are asynchronous. Further, we demonstrate that hypergraphs of Berge girth larger or equal to 4, respectively larger or equal to 3, yield graph-based asynchronous batch codes, respectively private information retrieval (PIR) codes. We prove the hypergraph-theoretic proposition that the maximum number of hyperedges in a hypergraph of a fixed Berge girth equals the quantity in a certain generalization of the hypergraph-theoretic (6,3)-problem, first posed by Brown, Erdős and Sós. We then apply the constructions and bounds by Erdős, Frankl and Rödl about this generalization of the (6,3)-problem, known as the (3$\varrho$-3,$\varrho$)-problem, to obtain batch code constructions and bounds on the redundancy of the graph-based asynchronous batch and PIR codes. We derive bounds on the optimal redundancy of several families of asynchronous batch codes with the query size $t=2$. In particular, we show that the optimal redundancy $ρ(k)$ of graph-based asynchronous batch codes of dimension $k$ for $t=2$ is $2\sqrt{k}$. Moreover, for graph-based asynchronous batch codes with $t \ge 3$, $ρ(k) = O\left({k}^{1/(2-ε)}\right)$ for any small $ε>0$.
△ Less
Submitted 5 September, 2020; v1 submitted 2 June, 2018;
originally announced June 2018.
-
Explicit Constructions and Bounds for Batch Codes with Restricted Size of Reconstruction Sets
Authors:
Eldho K. Thomas,
Vitaly Skachek
Abstract:
Linear batch codes and codes for private information retrieval (PIR) with a query size $t$ and a restricted size $r$ of the reconstruction sets are studied. New bounds on the parameters of such codes are derived for small values of $t$ or of $r$ by providing corresponding constructions. By building on the ideas of Cadambe and Mazumdar, a new bound in a recursive form is derived for batch codes and…
▽ More
Linear batch codes and codes for private information retrieval (PIR) with a query size $t$ and a restricted size $r$ of the reconstruction sets are studied. New bounds on the parameters of such codes are derived for small values of $t$ or of $r$ by providing corresponding constructions. By building on the ideas of Cadambe and Mazumdar, a new bound in a recursive form is derived for batch codes and PIR codes.
△ Less
Submitted 4 July, 2017; v1 submitted 26 January, 2017;
originally announced January 2017.
-
Polar Coding for the Binary Erasure Channel with Deletions
Authors:
Eldho K. Thomas,
Vincent Y. F. Tan,
Alexander Vardy,
Mehul Motani
Abstract:
We study the application of polar codes in deletion channels by analyzing the cascade of a binary erasure channel (BEC) and a deletion channel. We show how polar codes can be used effectively on a BEC with a single deletion, and propose a list decoding algorithm with a cyclic redundancy check for this case. The decoding complexity is $O(N^2\log N)$, where $N$ is the blocklength of the code. An imp…
▽ More
We study the application of polar codes in deletion channels by analyzing the cascade of a binary erasure channel (BEC) and a deletion channel. We show how polar codes can be used effectively on a BEC with a single deletion, and propose a list decoding algorithm with a cyclic redundancy check for this case. The decoding complexity is $O(N^2\log N)$, where $N$ is the blocklength of the code. An important contribution is an optimization of the amount of redundancy added to minimize the overall error probability. Our theoretical results are corroborated by numerical simulations which show that the list size can be reduced to one and the original message can be recovered with high probability as the length of the code grows.
△ Less
Submitted 8 January, 2017;
originally announced January 2017.
-
On Group Violations of Inequalities in five Subgroups
Authors:
Nadya Markin,
Eldho K. Thomas,
Frederique Oggier
Abstract:
We consider ten linear rank inequalities, which always hold for ranks of vector subspaces, and look at them as group inequalities. We prove that groups of order pq, for p,q two distinct primes, always satisfy these ten group inequalities. We give partial results for groups of order $p^2q$, and find that the symmetric group $S_4$ is the smallest group that yield violations, for two among the ten gr…
▽ More
We consider ten linear rank inequalities, which always hold for ranks of vector subspaces, and look at them as group inequalities. We prove that groups of order pq, for p,q two distinct primes, always satisfy these ten group inequalities. We give partial results for groups of order $p^2q$, and find that the symmetric group $S_4$ is the smallest group that yield violations, for two among the ten group inequalities.
△ Less
Submitted 18 March, 2015;
originally announced April 2015.
-
Explicit Constructions of Quasi-Uniform Codes from Groups
Authors:
Eldho K. Thomas,
Frederique Oggier
Abstract:
We address the question of constructing explicitly quasi-uniform codes from groups. We determine the size of the codebook, the alphabet and the minimum distance as a function of the corresponding group, both for abelian and some nonabelian groups. Potentials applications comprise the design of almost affine codes and non-linear network codes.
We address the question of constructing explicitly quasi-uniform codes from groups. We determine the size of the codebook, the alphabet and the minimum distance as a function of the corresponding group, both for abelian and some nonabelian groups. Potentials applications comprise the design of almost affine codes and non-linear network codes.
△ Less
Submitted 27 January, 2013;
originally announced January 2013.
-
On Abelian Group Representability of Finite Groups
Authors:
Eldho K. Thomas,
Nadya Markin,
Frédérique Oggier
Abstract:
A set of quasi-uniform random variables $X_1,...,X_n$ may be generated from a finite group $G$ and $n$ of its subgroups, with the corresponding entropic vector depending on the subgroup structure of $G$. It is known that the set of entropic vectors obtained by considering arbitrary finite groups is much richer than the one provided just by abelian groups. In this paper, we start to investigate in…
▽ More
A set of quasi-uniform random variables $X_1,...,X_n$ may be generated from a finite group $G$ and $n$ of its subgroups, with the corresponding entropic vector depending on the subgroup structure of $G$. It is known that the set of entropic vectors obtained by considering arbitrary finite groups is much richer than the one provided just by abelian groups. In this paper, we start to investigate in more detail different families of non-abelian groups with respect to the entropic vectors they yield. In particular, we address the question of whether a given non-abelian group $G$ and some fixed subgroups $G_1,...,G_n$ end up giving the same entropic vector as some abelian group $A$ with subgroups $A_1,...,A_n$, in which case we say that $(A, A_1,..., A_n)$ represents $(G, G_1, ..., G_n)$. If for any choice of subgroups $G_1,...,G_n$, there exists some abelian group $A$ which represents $G$, we refer to $G$ as being abelian (group) representable for $n$. We completely characterize dihedral, quasi-dihedral and dicyclic groups with respect to their abelian representability, as well as the case when $n=2$, for which we show a group is abelian representable if and only if it is nilpotent. This problem is motivated by understanding non-linear coding strategies for network coding, and network information theory capacity regions.
△ Less
Submitted 8 December, 2012; v1 submitted 6 December, 2012;
originally announced December 2012.