-
arXiv:2208.05699 [pdf, ps, other]
Quantum Deletion Codes derived from Classical Deletion Codes (Extended Abstract)
Abstract: This manuscript is an extended abstract version of the paper entitled ``Quantum Deletion Codes derived from Classical Deletion Codes.'' The paper contributes to the fundamental theory for quantum deletion error-correcting codes. The paper proposes a code construction condition for a partition of classical deletion error-correcting codes to derive quantum deletion error-correcting codes. The constr… ▽ More
Submitted 11 August, 2022; originally announced August 2022.
-
arXiv:1910.06740 [pdf, ps, other]
Perfect Multi Deletion Codes Achieve the Asymptotic Optimality of Code Size
Abstract: This paper studies on the cardinality of perfect multi deletion binary codes. The lower bound for any perfect deletion code with the fixed code length and the number of deletions, and the asymptotic achievable of Levenshtein's upper bound are shown.
Submitted 13 October, 2019; originally announced October 2019.
Comments: 17 pages, no figures, no conference presentation
-
Perfect Codes for Generalized Deletions from Minuscule Elements of Weyl Groups
Abstract: This paper discusses a connection between insertion/deletion (ID) codes and minuscule elements of Weyl groups.
Submitted 23 October, 2018; originally announced October 2018.
Comments: 34 pages, 3 figures
MSC Class: 05E10 94B50 94B25 ACM Class: E.4
-
arXiv:1701.03896 [pdf, ps, other]
Multipermutation Ulam Sphere Analysis Toward Characterizing Maximal Code Size
Abstract: Permutation codes, in the form of rank modulation, have shown promise for applications such as flash memory. One of the metrics recently suggested as appropriate for rank modulation is the Ulam metric, which measures the minimum translocation distance between permutations. Multipermutation codes have also been proposed as a generalization of permutation codes that would improve code size (and cons… ▽ More
Submitted 14 January, 2017; originally announced January 2017.
-
arXiv:1202.0521 [pdf, ps, other]
On ML-Certificate Linear Constraints for Rank Modulation with Linear Programming Decoding and its Application to Compact Graphs
Abstract: Linear constraints for a matrix polytope with no fractional vertex are investigated as intersecting research among permutation codes, rank modulations, and linear programming methods. By focusing the discussion to the block structure of matrices, new classes of such polytopes are obtained from known small polytopes. This concept, called "consolidation", is applied to find a new compact graph which… ▽ More
Submitted 5 February, 2012; v1 submitted 2 February, 2012; originally announced February 2012.
Comments: Submitted to ISIT 2012
-
LP Decodable Permutation Codes based on Linearly Constrained Permutation Matrices
Abstract: A set of linearly constrained permutation matrices are proposed for constructing a class of permutation codes. Making use of linear constraints imposed on the permutation matrices, we can formulate a minimum Euclidian distance decoding problem for the proposed class of permutation codes as a linear programming (LP) problem. The main feature of this class of permutation codes, called LP decodable p… ▽ More
Submitted 8 July, 2011; v1 submitted 29 November, 2010; originally announced November 2010.
Comments: 29 pages, 7 figures, submitted to IEEE Transactions on Information Theory
-
Quantum Quasi-Cyclic LDPC Codes
Abstract: In this paper, a construction of a pair of "regular" quasi-cyclic LDPC codes as ingredient codes for a quantum error-correcting code is proposed. That is, we find quantum regular LDPC codes with various weight distributions. Furthermore our proposed codes have lots of variations for length, code rate. These codes are obtained by a descrete mathematical characterization for model matrices of quasi-… ▽ More
Submitted 28 August, 2010; v1 submitted 5 January, 2007; originally announced January 2007.
Comments: 18 pages, 1 figures, published in proc. of ISIT 2007, (2007 IEEE International Symposium on Information Theory)
-
arXiv:cs/0610036 [pdf, ps, other]
Optimization of Memory Usage in Tardos's Fingerprinting Codes
Abstract: It is known that Tardos's collusion-secure probabilistic fingerprinting code (Tardos code; STOC'03) has length of theoretically minimal order with respect to the number of colluding users. However, Tardos code uses certain continuous probability distribution in codeword generation, which creates some problems for practical use, in particular, it requires large extra memory. A solution proposed s… ▽ More
Submitted 15 January, 2008; v1 submitted 6 October, 2006; originally announced October 2006.
Comments: 12 pages, 1 figure; (v2) tables revised, typos corrected, comments on some recent works added; (v3) submitted version, title changed from "Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature"
ACM Class: K.4.4; G.1.4