Sciweavers

TIT
2010
112views Education» more  TIT 2010»
13 years 2 months ago
Codes for deletion and insertion channels with segmented errors
Abstract-- We consider deletion channels and insertion channels under an additional segmentation assumption: the input consists of disjoint segments of b consecutive bits, with at ...
Zhenming Liu, Michael Mitzenmacher
TIT
2010
125views Education» more  TIT 2010»
13 years 2 months ago
Target detection via network filtering
A method of `network filtering' has been proposed recently to detect the effects of certain external perturbations on the interacting members in a network. However, with larg...
Shu Yang, Eric D. Kolaczyk
TIT
2010
86views Education» more  TIT 2010»
13 years 2 months ago
Distributed lossy averaging
Han-I Su, Abbas El Gamal
TIT
2010
129views Education» more  TIT 2010»
13 years 2 months ago
Channel-optimized quantum error correction
We develop a theory for finding quantum error correction (QEC) procedures which are optimized for given noise channels. Our theory accounts for uncertainties in the noise channel, ...
Soraya Taghavi, Robert L. Kosut, Daniel A. Lidar
TIT
2010
103views Education» more  TIT 2010»
13 years 2 months ago
Knuth's balanced codes revisited
Abstract--In 1986, Don Knuth published a very simple algorithm for constructing sets of bipolar codewords with equal numbers of "1"s and "01"s, called balanced ...
Jos H. Weber, Kees A. Schouhamer Immink
TIT
2010
112views Education» more  TIT 2010»
13 years 2 months ago
Asymmetric multilevel diversity coding and asymmetric Gaussian multiple descriptions
We consider the asymmetric multilevel diversity (A-MLD) coding problem, where a set of 2 K 1 information sources, ordered in a decreasing level of importance, is encoded into K me...
Soheil Mohajer, Chao Tian, Suhas N. Diggavi
TIT
2010
90views Education» more  TIT 2010»
13 years 2 months ago
Correcting limited-magnitude errors in the rank-modulation scheme
We study error-correcting codes for permutations under the infinity norm, motivated the rank-modulation scheme for flash memories. In this scheme, a set of n flash cells are combin...
Itzhak Tamo, Moshe Schwartz
TIT
2010
61views Education» more  TIT 2010»
13 years 2 months ago
Tunstall code, Khodak variations, and random walks
A variable-to-fixed length encoder partitions the source string into variable-length phrases that belong to a given and fixed dictionary. Tunstall, and independently Khodak, desig...
Michael Drmota, Yuriy A. Reznik, Wojciech Szpankow...
TIT
2010
146views Education» more  TIT 2010»
13 years 2 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
TIT
2010
81views Education» more  TIT 2010»
13 years 2 months ago
On the construction of skew quasi-cyclic codes
Taher Abualrub, Ali Ghrayeb, Nuh Aydin, Irfan Siap