Skip to main content

Showing 1–35 of 35 results for author: Duursma, I

.
  1. Accelerating Polarization via Alphabet Extension

    Authors: Iwan Duursma, Ryan Gabrys, Venkatesan Guruswami, Ting-Chun Lin, Hsin-Po Wang

    Abstract: Polarization is an unprecedented coding technique in that it not only achieves channel capacity, but also does so at a faster speed of convergence than any other coding technique. This speed is measured by the ``scaling exponent'' and its importance is three-fold. Firstly, estimating the scaling exponent is challenging and demands a deeper understanding of the dynamics of communication channels. S… ▽ More

    Submitted 15 July, 2023; v1 submitted 10 July, 2022; originally announced July 2022.

    Comments: 22 pages, 4 figures. Accepted to RANDOM 2022. v2: 29 pages, 5 figures, 1 table; address comments from JSAIT

    MSC Class: 94B65

  2. arXiv:2011.15082  [pdf, other

    cs.IT math.CO

    Parity-Checked Strassen Algorithm

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: To multiply astronomic matrices using parallel workers subject to straggling, we recommend interleaving checksums with some fast matrix multiplication algorithms. Nesting the parity-checked algorithms, we weave a product code flavor protection. Two demonstrative configurations are as follows: (A) $9$ workers multiply two $2\times 2$ matrices; each worker multiplies two linear combinations of ent… ▽ More

    Submitted 11 January, 2022; v1 submitted 30 November, 2020; originally announced November 2020.

    Comments: 40 pages, 18 figures, 2 tables; v2 adds MSC and applies corrections; v3 applies corrections

    MSC Class: 94B05; 68W10 (Primary) 05B35 (Secondary)

  3. Multilinear Algebra for Minimum Storage Regenerating Codes

    Authors: Iwan Duursma, Hsin-Po Wang

    Abstract: An $(n, k, d, α)$-MSR (minimum storage regeneration) code is a set of $n$ nodes used to store a file. For a file of total size $kα$, each node stores $α$ symbols, any $k$ nodes recover the file, and any $d$ nodes can repair any other node via each sending out $α/(d-k+1)$ symbols. In this work, we explore various ways to re-express the infamous product-matrix construction using skew-symmetric mat… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

    Comments: 36 pages, 9 figures, 3 tables

    MSC Class: 94B27 (Primary) 15A69 (Secondary)

  4. arXiv:2006.08911  [pdf, ps, other

    cs.IT math.AC

    Multilinear Algebra for Distributed Storage

    Authors: Iwan Duursma, Xiao Li, Hsin-Po Wang

    Abstract: An $(n, k, d, α, β, M)$-ERRC (exact-repair regenerating code) is a collection of $n$ nodes used to store a file. For a file of total size $M$, each node stores $α$ symbols, any $k$ nodes recover the file, and any $d$ nodes repair any other node via sending out $β$ symbols. We establish a multilinear algebra foundation to assemble $(n, k, d, α, β, M)$-ERRCs for all meaningful $(n, k, d)$ tuples. Ou… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

    Comments: 33 pages, 6 figures, 1 table

    MSC Class: 94B27 (Primary); 15A75 (Secondary)

  5. arXiv:1912.10388  [pdf, ps, other

    math.CO cs.IT

    Johnson Graph Codes

    Authors: Iwan Duursma, Xiao Li

    Abstract: We define a Johnson graph code as a subspace of labelings of the vertices in a Johnson graph with the property that labelings are uniquely determined by their restriction to vertex neighborhoods specified by the parameters of the code. We give a construction and main properties for the codes and show their role in the concatenation of layered codes that are used in distributed storage systems. A s… ▽ More

    Submitted 22 December, 2019; originally announced December 2019.

    Comments: 33 pages

  6. Polar Codes' Simplicity, Random Codes' Durability

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: Over any discrete memoryless channel, we build codes such that: for one, their block error probabilities and code rates scale like random codes'; and for two, their encoding and decoding complexities scale like polar codes'. Quantitatively, for any constants $π,ρ>0$ such that $π+2ρ<1$, we construct a sequence of error correction codes with block length $N$ approaching infinity, block error probabi… ▽ More

    Submitted 18 December, 2019; originally announced December 2019.

    Comments: 55 pages, 8 figures, 2 tables

  7. arXiv:1906.10620  [pdf, ps, other

    cs.IT math.AG

    Isometry-Dual Flags of AG Codes

    Authors: Maria Bras-Amorós, Iwan Duursma, Eui** Hong

    Abstract: Consider a complete flag $\{0\} = C_0 < C_1 < \cdots < C_n = \mathbb{F}^n$ of one-point AG codes of length $n$ over the finite field $\mathbb{F}$. The codes are defined by evaluating functions with poles at a given point $Q$ in points $P_1,\dots,P_n$ distinct from $Q$. A flag has the isometry-dual property if the given flag and the corresponding dual flag are the same up to isometry. For several c… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.

    Comments: 25 pages

  8. Log-logarithmic Time Pruned Polar Coding

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: A pruned variant of polar coding is proposed for binary erasure channels. For sufficiently small $\varepsilon>0$, we construct a series of capacity achieving codes with block length $N=\varepsilon^{-5}$, code rate $R=\text{Capacity}-\varepsilon$, error probability $P=\varepsilon$, and encoding and decoding time complexity $\text{bC}=O(\log\left|\log\varepsilon\right|)$ per information bit. The g… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

    Comments: 13 pages, 13 figures; we extend arXiv:1812.08106 and remove "BEC" from title

  9. arXiv:1812.08112  [pdf, ps, other

    cs.IT

    Polar-like Codes and Asymptotic Tradeoff among Block Length, Code Rate, and Error Probability

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: A general framework is proposed that includes polar codes over arbitrary channels with arbitrary kernels. The asymptotic tradeoff among block length $N$, code rate $R$, and error probability $P$ is analyzed. Given a tradeoff between $N,P$ and a tradeoff between $N,R$, we return an interpolating tradeoff among $N,R,P$ (Theorem 5). $\def\Capacity{\text{Capacity}}$Quantitatively, if… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Comments: 25 pages, 106 figures

  10. arXiv:1812.08106  [pdf, ps, other

    cs.IT

    Log-logarithmic Time Pruned Polar Coding on Binary Erasure Channels

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: A pruned variant of polar coding is reinvented for all binary erasure channels. For small $\varepsilon>0$, we construct codes with block length $\varepsilon^{-5}$, code rate $\text{Capacity}-\varepsilon$, error probability $\varepsilon$, and encoding and decoding time complexity $O(N\log|\log\varepsilon|)$ per block, equivalently $O(\log|\log\varepsilon|)$ per information bit (Propositions 5 to 8)… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Comments: 16 pages, 144 figures

  11. arXiv:1806.02405  [pdf, other

    cs.IT

    Polar Code Moderate Deviation: Recovering the Scaling Exponent

    Authors: Hsin-Po Wang, Iwan Duursma

    Abstract: In 2008 Arikan proposed polar coding [arXiv:0807.3917] which we summarize as follows: (a) From the root channel $W$ synthesize recursively a series of channels $W_N^{(1)},\dotsc,W_N^{(N)}$. (b) Select sophisticatedly a subset $A$ of synthetic channels. (c) Transmit information using synthetic channels indexed by $A$ and freeze the remaining synthetic channels. Arikan gives each synthetic channel… ▽ More

    Submitted 6 June, 2018; originally announced June 2018.

    Comments: 17 pages, 33 figures

  12. arXiv:1801.05101  [pdf, other

    cs.IT

    On the I/O Costs of Some Repair Schemes for Full-Length Reed-Solomon Codes

    Authors: Hoang Dau, Iwan Duursma, Hien Chu

    Abstract: Network transfer and disk read are the most time consuming operations in the repair process for node failures in erasure-code-based distributed storage systems. Recent developments on Reed-Solomon codes, the most widely used erasure codes in practical storage systems, have shown that efficient repair schemes specifically tailored to these codes can significantly reduce the network bandwidth spent… ▽ More

    Submitted 9 May, 2018; v1 submitted 15 January, 2018; originally announced January 2018.

    Comments: Accepted by the ISIT'18

  13. arXiv:1707.05944  [pdf, ps, other

    cs.IT

    Codes with Locality in the Rank and Subspace Metrics

    Authors: Swanand Kadhe, Salim El Rouayheb, Iwan Duursma, Alex Sprintson

    Abstract: We extend the notion of locality from the Hamming metric to the rank and subspace metrics. Our main contribution is to construct a class of array codes with locality constraints in the rank metric. Our motivation for constructing such codes stems from designing codes for efficient data recovery from correlated and/or mixed (i.e., complete and partial) failures in distributed storage systems. Speci… ▽ More

    Submitted 5 May, 2019; v1 submitted 19 July, 2017; originally announced July 2017.

    Comments: Presented in part at the 2016 Allerton Conference (see version 1). The second version additionally contains the notion of locality in the subspace metric. The third version additionally contains an application of subspace-locality to distributed storage systems, where nodes can be accessed over a noisy network

  14. arXiv:1705.08397  [pdf, other

    math.CO

    Rank-Metric Codes and Zeta Functions

    Authors: I. Blanco-Chacón, E. Byrne, I. Duursma, J. Sheekey

    Abstract: We define the rank-metric zeta function of a code as a generating function of its normalized $q$-binomial moments. We show that, as in the Hamming case, the zeta function gives a generating function for the weight enumerators of rank-metric codes. We further prove a functional equation and derive an upper bound for the minimum distance in terms of the reciprocal roots of the zeta function. Finally… ▽ More

    Submitted 23 May, 2017; originally announced May 2017.

  15. arXiv:1701.07118  [pdf, other

    cs.IT

    Repairing Reed-Solomon Codes With Two Erasures

    Authors: Hoang Dau, Iwan Duursma, Han Mao Kiah, Olgica Milenkovic

    Abstract: Despite their exceptional error-correcting properties, Reed-Solomon (RS) codes have been overlooked in distributed storage applications due to the common belief that they have poor repair bandwidth: A naive repair approach would require the whole file to be reconstructed in order to recover a single erased codeword symbol. In a recent work, Guruswami and Wootters (STOC'16) proposed a single-erasur… ▽ More

    Submitted 14 May, 2017; v1 submitted 24 January, 2017; originally announced January 2017.

    Comments: ISIT'17 (accepted), 5 pages. arXiv admin note: substantial text overlap with arXiv:1612.01361

  16. Repairing Reed-Solomon Codes With Multiple Erasures

    Authors: Hoang Dau, Iwan Duursma, Han Mao Kiah, Olgica Milenkovic

    Abstract: Despite their exceptional error-correcting properties, Reed-Solomon codes have been overlooked in distributed storage applications due to the common belief that they have poor repair bandwidth: A naive repair approach would require the whole file to be reconstructed in order to recover a single erased codeword symbol. In a recent work, Guruswami and Wootters (STOC'16) proposed a single-erasure rep… ▽ More

    Submitted 2 May, 2020; v1 submitted 28 November, 2016; originally announced December 2016.

    Comments: 15 pages

    Journal ref: IEEE Transactions on Information Theory (2018) 64(10) 6567-6582

  17. arXiv:1509.08376  [pdf, ps, other

    cs.IT

    Matrix Theory for Minimal Trellises

    Authors: Iwan M. Duursma

    Abstract: Trellises provide a graphical representation for the row space of a matrix. The product construction of Kschischang and Sorokine builds minimal conventional trellises from matrices in minimal span form. Koetter and Vardy showed that minimal tail-biting trellises can be obtained by applying the product construction to submatrices of a characteristic matrix. We introduce the unique reduced minimal… ▽ More

    Submitted 28 September, 2015; originally announced September 2015.

  18. arXiv:1505.00178  [pdf, ps, other

    cs.IT

    Shortened regenerating codes

    Authors: Iwan M. Duursma

    Abstract: For general exact repair regenerating codes, the optimal trade-offs between storage size and repair bandwith remain undetermined. Various outer bounds and partial results have been proposed. Using a simple chain rule argument we identify nonnegative differences between the functional repair and the exact repair outer bounds. One of the differences is then bounded from below by the repair data of a… ▽ More

    Submitted 1 May, 2015; originally announced May 2015.

    Comments: 11 pages

  19. arXiv:1406.4852  [pdf, ps, other

    cs.IT

    Outer bounds for exact repair codes

    Authors: Iwan M. Duursma

    Abstract: We address the open problem of establishing the rate region for exact-repair regenerating codes for given parameters (n,k,d). Tian determined the rate region for a (4,3,3) code and found that it lies strictly within the functional-repair rate region. Using different methods, Sasidharan, Senthoor and Kumar proved a non-vanishing gap between the functional-repair outer bound and the exact-repair out… ▽ More

    Submitted 18 June, 2014; originally announced June 2014.

    Comments: 14 pages, 1 figure

  20. arXiv:1311.1999  [pdf, ps, other

    math.AG

    Smooth Embeddings for the Suzuki and Ree Curves

    Authors: Abdulla Eid, Iwan Duursma

    Abstract: The Hermitian, Suzuki and Ree curves form three special families of curves with unique properties. They arise as the Deligne-Lusztig varieties of dimension one and their automorphism groups are the algebraic groups of type 2A2, 2B2 and 2G2, respectively. For the Hermitian and Suzuki curves very ample divisors are known that yield smooth projective embeddings of the curves. In this paper we establi… ▽ More

    Submitted 8 November, 2013; originally announced November 2013.

    Comments: Submitted to the proceedings of the conference on Arithmetic, Geometry and Coding Theory (AGCT 2013). 40 Pages, 15 Tables, 12 Figure

  21. arXiv:1310.7159  [pdf, other

    cs.IT math.AG

    Using concatenated algebraic geometry codes in channel polarization

    Authors: Abdulla Eid, Iwan Duursma

    Abstract: Polar codes were introduced by Arikan in 2008 and are the first family of error-correcting codes achieving the symmetric capacity of an arbitrary binary-input discrete memoryless channel under low complexity encoding and using an efficient successive cancellation decoding strategy. Recently, non-binary polar codes have been studied, in which one can use different algebraic geometry codes to achiev… ▽ More

    Submitted 27 October, 2013; originally announced October 2013.

    Comments: 8 pages, 6 figures

  22. arXiv:1310.5187  [pdf, ps, other

    cs.IT

    Distributed Reed-Solomon Codes for Simple Multiple Access Networks

    Authors: Wael Halbawi, Tracey Ho, Hongyi Yao, Iwan Duursma

    Abstract: We consider a simple multiple access network in which a destination node receives information from multiple sources via a set of relay nodes. Each relay node has access to a subset of the sources, and is connected to the destination by a unit capacity link. We also assume that $z$ of the relay nodes are adversarial. We propose a computationally efficient distributed coding scheme and show that it… ▽ More

    Submitted 18 October, 2013; originally announced October 2013.

    Comments: 12 pages, 1 figure

  23. On lower bounds for the Ihara constants A(2) and A(3)

    Authors: Iwan Duursma, Kit-Ho Mak

    Abstract: Let X be a curve over the finite field of q elements and let N(X), g(X) be its number of rational points and genus respectively. The Ihara constant A(q) is defined by the limit superior of N(X)/g(X) as the genus of X goes to infinity. In this paper, we employ a variant of Serre's class field tower method to obtain an improvement of the best known lower bounds on A(2) and A(3).

    Submitted 14 October, 2012; v1 submitted 20 February, 2011; originally announced February 2011.

    Comments: 22 pages; to appear in Compos. Math

    MSC Class: 11G20

    Journal ref: Compositio Math. 149 (2013) 1108-1128

  24. arXiv:1101.4603  [pdf, ps, other

    cs.IT math.AG math.NT

    Evaluation Codes from smooth Quadric Surfaces and Twisted Segre Varieties

    Authors: Alain Couvreur, Iwan Duursma

    Abstract: We give the parameters of any evaluation code on a smooth quadric surface. For hyperbolic quadrics the approach uses elementary results on product codes and the parameters of codes on elliptic quadrics are obtained by detecting a BCH structure of these codes and using the BCH bound. The elliptic quadric is a twist of the surface P^1 x P^1 and we detect a similar BCH structure on twists of the Segr… ▽ More

    Submitted 12 June, 2012; v1 submitted 24 January, 2011; originally announced January 2011.

    Comments: 10 pages. Presented at the conference Workshop on Coding theory and Cryptography 2011

    MSC Class: 94B27; 14J20; 94B15

    Journal ref: Des. Codes Cryptogr. 66(1), 291-303. 2013

  25. arXiv:1012.3682  [pdf, ps, other

    math.NT

    Two-point coordinate rings for GK-curves

    Authors: Iwan M. Duursma

    Abstract: Giulietti and Korchmáros presented new curves with the maximal number of points over a field of size q^6. Garcia, Güneri, and Stichtenoth extended the construction to curves that are maximal over fields of size q^2n, for odd n >= 3. The generalized GK-curves have affine equations x^q+x = y^{q+1} and y^{q^2}-y^q = z^r, for r=(q^n+1)/(q+1). We give a new proof for the maximality of the generalized G… ▽ More

    Submitted 16 December, 2010; originally announced December 2010.

    Comments: 16 pages

    MSC Class: 11G20

  26. arXiv:1012.2068  [pdf, ps, other

    math.NT math.AG

    On maximal curves which are not Galois subcovers of the Hermitian curve

    Authors: Iwan Duursma, Kit-Ho Mak

    Abstract: We show that the generalized Giulietti-Korchmáros curve is not a Galois subcover of the Hermitian curve over $\mathbb{F}_{q^{2n}}$. This answers a question raised by Garcia, Güneri and Stichtenoth.

    Submitted 7 July, 2011; v1 submitted 9 December, 2010; originally announced December 2010.

    Comments: 10 pages. Version 3 corrected an error in earlier versions

    MSC Class: 11G20

    Journal ref: Bull. Braz. Math. Soc. (N.S.) 43 (2012), no. 03, 453-465

  27. arXiv:1007.3344  [pdf, ps, other

    math.NT

    Bounds for Completely Decomposable Jacobians

    Authors: Iwan Duursma, Jean-Yves Enjalbert

    Abstract: A curve over the field of two elements with completely decomposable Jacobian is shown to have at most six rational points and genus at most 26. The bounds are sharp. The previous upper bound for the genus was 145. We also show that a curve over the field of $q$ elements with more than $q^{m/2}+1$ rational points has at least one Frobenius angle in the open interval $(π/m,3π/m)$. The proofs make us… ▽ More

    Submitted 20 July, 2010; originally announced July 2010.

    Comments: 9 pages, first appeared in 2002, posted for greater accessibility, with an addendum on X(11) mod 2

    MSC Class: 11G20; 14G10; 14G15

    Journal ref: Finite fields with applications to coding theory, cryptography and related areas (Oaxaca, 2001), 86--93, Springer, Berlin, 2002

  28. arXiv:1004.1752  [pdf, ps, other

    cs.IT math.AG math.NT

    Improved Two-Point Codes on Hermitian Curves

    Authors: Iwan Duursma, Radoslav Kirov

    Abstract: One-point codes on the Hermitian curve produce long codes with excellent parameters. Feng and Rao introduced a modified construction that improves the parameters while still using one-point divisors. A separate improvement of the parameters was introduced by Matthews considering the classical construction but with two-point divisors. Those two approaches are combined to describe an elementary cons… ▽ More

    Submitted 17 February, 2011; v1 submitted 10 April, 2010; originally announced April 2010.

  29. arXiv:1001.1374  [pdf, ps, other

    cs.IT math.AG

    Distance bounds for algebraic geometric codes

    Authors: Iwan Duursma, Radoslav Kirov, Seungkook Park

    Abstract: Various methods have been used to obtain improvements of the Goppa lower bound for the minimum distance of an algebraic geometric code. The main methods divide into two categories and all but a few of the known bounds are special cases of either the Lundell-McCullough floor bound or the Beelen order bound. The exceptions are recent improvements of the floor bound by Guneri-Stichtenoth-Taskin, an… ▽ More

    Submitted 8 January, 2010; originally announced January 2010.

    Comments: 29 pages

    MSC Class: 11T71; 14G50; 94B

  30. arXiv:0901.2864  [pdf, ps, other

    math.NT cs.IT math.AG

    An extension of the order bound for AG codes

    Authors: Iwan Duursma, Radoslav Kirov

    Abstract: The most successful method to obtain lower bounds for the minimum distance of an algebraic geometric code is the order bound, which generalizes the Feng-Rao bound. We provide a significant extension of the bound that improves the order bounds by Beelen and by Duursma and Park. We include an exhaustive numerical comparison of the different bounds for 10168 two-point codes on the Suzuki curve of g… ▽ More

    Submitted 19 January, 2009; originally announced January 2009.

    Comments: 11 pages

    MSC Class: 14G50; 11T71; 94B

  31. arXiv:0810.2842  [pdf, ps, other

    math.NT math.AG

    Everywhere ramified towers of global function fields

    Authors: Iwan Duursma, Bjorn Poonen, Michael Zieve

    Abstract: We consider a tower of function fields F_0 < F_1 < ... over a finite field such that every place of every F_i ramified in the tower and the sequence genus(F_i)/[F_i:F_0] has a finite limit. We also construct a tower in which every place ramifies and the sequence N_i/[F_i:F_0] has a positive limit, where N_i is the number of degree-one places of F_i. These towers answer questions posed by Stichte… ▽ More

    Submitted 15 October, 2008; originally announced October 2008.

    Comments: 5 pages. This paper was published in 2004. I post it now for greater accessibility

    MSC Class: 11G20; 14G05; 14G15

    Journal ref: Finite Fields and Applications, Springer Lecture Notes in Computer Science 2948 (2004), 148--153

  32. arXiv:0810.2789  [pdf, ps, other

    math.NT math.AG math.CO

    Coset bounds for algebraic geometric codes

    Authors: Iwan M. Duursma, Seungkook Park

    Abstract: For a given curve X and divisor class C, we give lower bounds on the degree of a divisor A such that A and A-C belong to specified semigroups of divisors. For suitable choices of the semigroups we obtain (1) lower bounds for the size of a party A that can recover the secret in an algebraic geometric linear secret sharing scheme with adversary threshold C, and (2) lower bounds for the support A o… ▽ More

    Submitted 15 October, 2008; originally announced October 2008.

    Comments: 36 pages

    MSC Class: 14G50; 11T71; 94B

  33. arXiv:math/0302172  [pdf, ps, other

    math.CO cs.IT math.NT

    Results on zeta functions for codes

    Authors: I. M. Duursma

    Abstract: We give a new and short proof of the Mallows-Sloane upper bound for self-dual codes. We formulate a version of Greene's theorem for normalized weight enumerators. We relate normalized rank-generating polynomials to two-variable zeta functions. And we show that a self-dual code has the Clifford property, but that the same property does not hold in general for formally self-dual codes.

    Submitted 14 February, 2003; originally announced February 2003.

    Comments: 12 pages

    MSC Class: 05B35; 14G15; 94B65

  34. arXiv:math/0302154  [pdf, ps, other

    math.NT cs.IT math.AG

    Twisted Klein curves modulo 2

    Authors: I. M. Duursma

    Abstract: We give an explicit description of all 168 quartic curves over the field of two elements that are isomorphic to the Klein curve over an algebraic extension. Some of the curves have been known for their small class number, others for attaining the maximal number of rational points.

    Submitted 12 February, 2003; originally announced February 2003.

    Comments: 14 pages

    MSC Class: 14H45

  35. arXiv:math/0302132  [pdf, ps, other

    math.CO cs.IT

    Computing Symmetrized Weight Enumerators for Lifted Quadratic Residue Codes

    Authors: I. M. Duursma, M. Greferath

    Abstract: The paper describes a method to determine symmetrized weight enumerators of $p^m$-linear codes based on the notion of a disjoint weight enumerator. Symmetrized weight enumerators are given for the lifted quadratic residue codes of length 24 modulo $2^m$ and modulo $3^m$, for any positive $m$.

    Submitted 11 February, 2003; originally announced February 2003.

    Comments: 9 pages

    MSC Class: 94B60