Skip to main content

Showing 1–36 of 36 results for author: Thangaraj, A

.
  1. arXiv:2404.05819  [pdf, other

    stat.ML cs.IT cs.LG math.PR math.ST

    Just Wing It: Optimal Estimation of Missing Mass in a Markovian Sequence

    Authors: Ashwin Pananjady, Vidya Muthukumar, Andrew Thangaraj

    Abstract: We study the problem of estimating the stationary mass -- also called the unigram mass -- that is missing from a single trajectory of a discrete-time, ergodic Markov chain. This problem has several applications -- for example, estimating the stationary missing mass is critical for accurately smoothing probability estimates in sequence models. While the classical Good--Turing estimator from the 195… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: 40 pages, 5 figures

  2. arXiv:2305.06352  [pdf, other

    cs.IT

    Generalizations and Extensions to Lifting Constructions for Coded Caching

    Authors: V. R. Aravind, Pradeep Kiran Sarvepalli, Andrew Thangaraj

    Abstract: Coded caching is a technique for achieving increased throughput in cached networks during peak hours. Placement delivery arrays (PDAs) capture both placement and delivery scheme requirements in coded caching in a single array. Lifting is a method of constructing PDAs, where entries in a small base PDA are replaced with constituent PDAs that satisfy a property called Blackburn-compatibility. We pro… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: Accepted to ISIT 2023, two figures, one table

  3. arXiv:2305.04155  [pdf, ps, other

    cs.IT eess.SY

    Capacity Achieving Codes for an Erasure Queue-Channel

    Authors: Jaswanthi Mandalapu, Krishna Jagannathan, Avhishek Chatterjee, Andrew Thangaraj

    Abstract: We consider a queue-channel model that captures the waiting time-dependent degradation of information bits as they wait to be transmitted. Such a scenario arises naturally in quantum communications, where quantum bits tend to decohere rapidly. Trailing the capacity results obtained recently for certain queue-channels, this paper aims to construct practical channel codes for the erasure queue-chann… ▽ More

    Submitted 6 May, 2023; originally announced May 2023.

    Comments: 10 pages, 5 figures, accepted to IEEE ISIT 2023

  4. arXiv:2202.02772  [pdf, ps, other

    math.ST

    Missing Mass Estimation from Sticky Channels

    Authors: Prafulla Chandra, Andrew Thangaraj, Nived Rajaraman

    Abstract: Distribution estimation under error-prone or non-ideal sampling modelled as "sticky" channels have been studied recently motivated by applications such as DNA computing. Missing mass, the sum of probabilities of missing letters, is an important quantity that plays a crucial role in distribution estimation, particularly in the large alphabet regime. In this work, we consider the problem of estimati… ▽ More

    Submitted 6 February, 2022; originally announced February 2022.

  5. arXiv:2110.01968  [pdf, other

    math.ST cs.IT

    Missing $g$-mass: Investigating the Missing Parts of Distributions

    Authors: Prafulla Chandra, Andrew Thangaraj

    Abstract: Estimating the underlying distribution from \textit{iid} samples is a classical and important problem in statistics. When the alphabet size is large compared to number of samples, a portion of the distribution is highly likely to be unobserved or sparsely observed. The missing mass, defined as the sum of probabilities $\text{Pr}(x)$ over the missing letters $x$, and the Good-Turing estimator for m… ▽ More

    Submitted 27 May, 2023; v1 submitted 5 October, 2021; originally announced October 2021.

  6. arXiv:2102.01938  [pdf, other

    cs.IT math.ST stat.ML

    How good is Good-Turing for Markov samples?

    Authors: Prafulla Chandra, Andrew Thangaraj, Nived Rajaraman

    Abstract: The Good-Turing (GT) estimator for the missing mass (i.e., total probability of missing symbols) in $n$ samples is the number of symbols that appeared exactly once divided by $n$. For i.i.d. samples, the bias and squared-error risk of the GT estimator can be shown to fall as $1/n$ by bounding the expected error uniformly over all symbols. In this work, we study convergence of the GT estimator for… ▽ More

    Submitted 27 May, 2023; v1 submitted 3 February, 2021; originally announced February 2021.

  7. arXiv:2007.07475  [pdf, other

    cs.IT

    Lifting Constructions of PDAs for Coded Caching with Linear Subpacketization

    Authors: V R Aravind, Pradeep Kiran Sarvepalli, Andrew Thangaraj

    Abstract: Coded caching is a technique where multicasting and coding opportunities are utilized to achieve better rate-memory tradeoff in cached networks. A crucial parameter in coded caching is subpacketization, which is the number of parts a file is to be split into for coding purposes. The original Maddah-Ali-Niesen scheme has order-optimal rate at a subpacketization growing exponentially with the number… ▽ More

    Submitted 5 April, 2022; v1 submitted 15 July, 2020; originally announced July 2020.

    Comments: 23 pages, 5 figures, 6 tables. The material on lifting constructions has been expanded, the material on demand privacy has been removed and the title is appropriately modified to reflect the revised contents

  8. arXiv:2001.04130  [pdf, ps, other

    math.ST

    Convergence of Chao Unseen Species Estimator

    Authors: Nived Rajaraman, Prafulla Chandra, Andrew Thangaraj, Ananda Theertha Suresh

    Abstract: Support size estimation and the related problem of unseen species estimation have wide applications in ecology and database analysis. Perhaps the most used support size estimator is the Chao estimator. Despite its wide spread use, little is known about its theoretical properties. We analyze the Chao estimator and show that its worst case mean squared error (MSE) is smaller than the MSE of the plug… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: 20 pages, 1 figure, short version presented at International Symposium on Information Theory (ISIT) 2019

  9. arXiv:1909.10471  [pdf, ps, other

    cs.IT

    Subpacketization in Coded Caching with Demand Privacy

    Authors: Aravind V R, Pradeep Sarvepalli, Andrew Thangaraj

    Abstract: Coded caching is a technique where we utilize multi-casting opportunities to reduce rate in cached networks. One limitation of coded caching schemes is that they reveal the demands of all users to their peers. In this work, we consider coded caching schemes that assure privacy for user demands with a particular focus on reducing subpacketization. For the 2-user, 2-file case, we present a new linea… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: 13 pages, 5 figures

  10. arXiv:1710.09651  [pdf, ps, other

    cs.IT

    Protograph LDPC Codes with Block Thresholds: Extension to Degree-1 and Generalized Nodes

    Authors: Asit Kumar Pradhan, Andrew Thangaraj

    Abstract: Protograph low-density-parity-check (LDPC) are considered to design near-capacity low-rate codes over the binary erasure channel (BEC) and binary additive white Gaussian noise (BIAWGN) channel. For protographs with degree-one variable nodes and doubly-generalized LDPC (DGLDPC) codes, conditions are derived to ensure equality of bit-error threshold and block-error threshold. Using this condition, l… ▽ More

    Submitted 2 May, 2018; v1 submitted 26 October, 2017; originally announced October 2017.

  11. arXiv:1705.05006  [pdf, ps, other

    cs.IT

    Minimax Risk for Missing Mass Estimation

    Authors: Nikhilesh Rajaraman, Andrew Thangaraj, Ananda Theertha Suresh

    Abstract: The problem of estimating the missing mass or total probability of unseen elements in a sequence of $n$ random samples is considered under the squared error loss function. The worst-case risk of the popular Good-Turing estimator is shown to be between $0.6080/n$ and $0.6179/n$. The minimax risk is shown to be lower bounded by $0.25/n$. This appears to be the first such published result on minimax… ▽ More

    Submitted 14 May, 2017; originally announced May 2017.

    Comments: IEEE International Symposium on Information Theory 2017, Aachen, Germany

  12. arXiv:1705.05005  [pdf, ps, other

    cs.IT

    Irregular Recovery and Unequal Locality for Locally Recoverable Codes with Availability

    Authors: Sourbh Bhadane, Andrew Thangaraj

    Abstract: A code is said to be a Locally Recoverable Code (LRC) with availability if every coordinate can be recovered from multiple disjoint sets of other coordinates called recovering sets. The vector of sizes of recovering sets of a coordinate is called its recovery profile. In this work, we consider LRCs with availability under two different settings: (1) irregular recovery: non-constant recovery profil… ▽ More

    Submitted 14 May, 2017; originally announced May 2017.

    Comments: expanded version of a paper that appeared in the National Conference on Communications 2017, IIT Madras, Chennai, India

  13. Dual Capacity Upper Bounds for Noisy Runlength Constrained Channels

    Authors: Andrew Thangaraj

    Abstract: Binary-input memoryless channels with a runlength constrained input are considered. Upper bounds to the capacity of such noisy runlength constrained channels are derived using the dual capacity method with Markov test distributions satisfying the Karush-Kuhn-Tucker (KKT) conditions for the capacity-achieving output distribution. Simplified algebraic characterizations of the bounds are presented fo… ▽ More

    Submitted 30 September, 2016; v1 submitted 1 September, 2016; originally announced September 2016.

    Comments: Expanded version of a paper in IEEE Information Theory Workshop 2017, Cambridge, UK, Sep 11-14, 2017

  14. arXiv:1511.08742  [pdf, ps, other

    cs.IT

    Capacity Bounds for Discrete-Time, Amplitude-Constrained, Additive White Gaussian Noise Channels

    Authors: Andrew Thangaraj, Gerhard Kramer, Georg Bocherer

    Abstract: The capacity-achieving input distribution of the discrete-time, additive white Gaussian noise (AWGN) channel with an amplitude constraint is discrete and seems difficult to characterize explicitly. A dual capacity expression is used to derive analytic capacity upper bounds for scalar and vector AWGN channels. The scalar bound improves on McKellips' bound and is within 0.1 bits of capacity for all… ▽ More

    Submitted 27 November, 2015; originally announced November 2015.

    Comments: 10 pages, part of this paper was presented at the IEEE International Symposium on Information Theory (ISIT) 2015, Hong Kong

  15. Construction of Near-Capacity Protograph LDPC Code Sequences with Block-Error Thresholds

    Authors: Asit Kumar Pradhan, Andrew Thangaraj, Arunkumar Subramanian

    Abstract: Density evolution for protograph Low-Density Parity-Check (LDPC) codes is considered, and it is shown that the message-error rate falls double-exponentially with iterations whenever the degree-2 subgraph of the protograph is cycle-free and noise level is below threshold. Conditions for stability of protograph density evolution are established and related to the structure of the protograph. Using l… ▽ More

    Submitted 23 October, 2015; originally announced October 2015.

    Comments: to appear in the IEEE Transactions on Communications

  16. arXiv:1505.00562  [pdf, ps, other

    cs.IT math.PR stat.AP

    Approximation of Capacity for ISI Channels with One-bit Output Quantization

    Authors: Radha Krishna Ganti, Andrew Thangaraj, Arijit Mondal

    Abstract: Motivated by recent high bandwidth communication systems, Inter-Symbol Interference (ISI) channels with 1-bit quantized output are considered under an average-power-constrained continuous input. While the exact capacity is difficult to characterize, an approximation that matches with the exact channel output up to a probability of error is provided. The approximation does not have additive noise,… ▽ More

    Submitted 4 May, 2015; originally announced May 2015.

    Comments: Will be presented at ISIT 2015

  17. arXiv:1402.4892  [pdf, other

    cs.NI cs.DS cs.IT

    Sub-Modularity of Waterfilling with Applications to Online Basestation Allocation

    Authors: Kiran Koshy Thekumparampil, Andrew Thangaraj, Rahul Vaze

    Abstract: We show that the popular water-filling algorithm for maximizing the mutual information in parallel Gaussian channels is sub-modular. The sub-modularity of water-filling algorithm is then used to derive online basestation allocation algorithms, where mobile users are assigned to one of many possible basestations immediately and irrevocably upon arrival without knowing the future user information. T… ▽ More

    Submitted 20 February, 2014; originally announced February 2014.

    Comments: 5 pages, 2 figures; submitted to the International Symposium on Information Theory 2014

  18. arXiv:1310.1153  [pdf, other

    cs.IT

    The Gaussian Two-way Diamond Channel

    Authors: Prathyusha V, Srikrishna Bhashyam, Andrew Thangaraj

    Abstract: We consider two-way relaying in a Gaussian diamond channel, where two terminal nodes wish to exchange information using two relays. A simple baseline protocol is obtained by time-sharing between two one-way protocols. To improve upon the baseline performance, we propose two compute-and-forward (CF) protocols: Compute-and-forward Compound multiple access channel (CF-CMAC) and Compute-and-forward-Br… ▽ More

    Submitted 3 October, 2013; originally announced October 2013.

    Comments: 8 pages, 7 figures Proceedings of 51st Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, Oct 2013

  19. arXiv:1308.1212  [pdf, ps, other

    cs.NI cs.DS cs.IT

    Online Algorithms for Basestation Allocation

    Authors: Andrew Thangaraj, Rahul Vaze

    Abstract: Design of {\it online algorithms} for assigning mobile users to basestations is considered with the objective of maximizing the sum-rate, when all users associated to any one basestation equally share each basestation's resources. Each user on its arrival reveals the rates it can obtain if connected to each of the basestations, and the problem is to assign each user to any one basestation irrevoca… ▽ More

    Submitted 6 August, 2013; originally announced August 2013.

  20. arXiv:1301.6301  [pdf, other

    cs.IT

    Deterministic Constructions for Large Girth Protograph LDPC Codes

    Authors: Asit Kumar Pradhan, Arunkumar Subramanian, Andrew Thangaraj

    Abstract: The bit-error threshold of the standard ensemble of Low Density Parity Check (LDPC) codes is known to be close to capacity, if there is a non-zero fraction of degree-two bit nodes. However, the degree-two bit nodes preclude the possibility of a block-error threshold. Interestingly, LDPC codes constructed using protographs allow the possibility of having both degree-two bit nodes and a block-error… ▽ More

    Submitted 21 May, 2013; v1 submitted 26 January, 2013; originally announced January 2013.

    Comments: 5 pages, 2 figures; To appear in ISIT 2013; Minor changes in presentation

  21. arXiv:1208.2116  [pdf, other

    cs.IT

    Outer Bounds for the Capacity Region of a Gaussian Two-way Relay Channel

    Authors: Ishaque Ashar K., Prathyusha V., Srikrishna Bhashyam, Andrew Thangaraj

    Abstract: We consider a three-node half-duplex Gaussian relay network where two nodes (say $a$, $b$) want to communicate with each other and the third node acts as a relay for this twoway communication. Outer bounds and achievable rate regions for the possible rate pairs $(R_a, R_b)$ for two-way communication are investigated. The modes (transmit or receive) of the halfduplex nodes together specify the stat… ▽ More

    Submitted 8 October, 2012; v1 submitted 10 August, 2012; originally announced August 2012.

    Comments: Presented at Allerton Conference on Communication, Control and Computing 2012

  22. Secure Compute-and-Forward in a Bidirectional Relay

    Authors: Shashank Vatedka, Navin Kashyap, Andrew Thangaraj

    Abstract: We consider the basic bidirectional relaying problem, in which two users in a wireless network wish to exchange messages through an intermediate relay node. In the compute-and-forward strategy, the relay computes a function of the two messages using the naturally-occurring sum of symbols simultaneously transmitted by user nodes in a Gaussian multiple access (MAC) channel, and the computed function… ▽ More

    Submitted 19 October, 2014; v1 submitted 15 June, 2012; originally announced June 2012.

    Comments: v1 is a much expanded and updated version of arXiv:1204.6350; v2 is a minor revision to fix some notational issues; v3 is a much expanded and updated version of v2, and contains results on both perfect secrecy and strong secrecy; v3 is a revised manuscript submitted to the IEEE Transactions on Information Theory in April 2014

  23. arXiv:1204.6350   

    cs.IT

    Secure Computation in a Bidirectional Relay

    Authors: Navin Kashyap, V. Shashank, Andrew Thangaraj

    Abstract: Bidirectional relaying, where a relay helps two user nodes to exchange equal length binary messages, has been an active area of recent research. A popular strategy involves a modified Gaussian MAC, where the relay decodes the XOR of the two messages using the naturally-occurring sum of symbols simultaneously transmitted by user nodes. In this work, we consider the Gaussian MAC in bidirectional rel… ▽ More

    Submitted 18 June, 2012; v1 submitted 27 April, 2012; originally announced April 2012.

    Comments: This work is now subsumed by arXiv:1206.3392

  24. arXiv:1102.2734  [pdf, ps, other

    cs.IT cs.DM

    The Treewidth of MDS and Reed-Muller Codes

    Authors: Navin Kashyap, Andrew Thangaraj

    Abstract: The constraint complexity of a graphical realization of a linear code is the maximum dimension of the local constraint codes in the realization. The treewidth of a linear code is the least constraint complexity of any of its cycle-free graphical realizations. This notion provides a useful parametrization of the maximum-likelihood decoding complexity for linear codes. In this paper, we prove the su… ▽ More

    Submitted 25 March, 2011; v1 submitted 14 February, 2011; originally announced February 2011.

    Comments: This constitutes a major upgrade of previous versions; submitted to IEEE Transactions on Information Theory

  25. Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes

    Authors: Arunkumar Subramanian, Andrew Thangaraj, Matthieu Bloch, Steven W. McLaughlin

    Abstract: For an arbitrary degree distribution pair (DDP), we construct a sequence of low-density parity-check (LDPC) code ensembles with girth growing logarithmically in block-length using Ramanujan graphs. When the DDP has minimum left degree at least three, we show using density evolution analysis that the expected bit-error probability of these ensembles, when passed through a binary erasure channel wit… ▽ More

    Submitted 22 February, 2011; v1 submitted 16 September, 2010; originally announced September 2010.

    Comments: 11 pages, 4 figures. Submitted to the IEEE Transactions on Information Forensics and Security

  26. Strong Secrecy for Erasure Wiretap Channels

    Authors: Ananda T. Suresh, Arunkumar Subramanian, Andrew Thangaraj, Matthieu Bloch, Steven McLaughlin

    Abstract: We show that duals of certain low-density parity-check (LDPC) codes, when used in a standard coset coding scheme, provide strong secrecy over the binary erasure wiretap channel (BEWC). This result hinges on a stop** set analysis of ensembles of LDPC codes with block length $n$ and girth $\geq 2k$, for some $k \geq 2$. We show that if the minimum left degree of the ensemble is $l_\mathrm{min}$, t… ▽ More

    Submitted 30 April, 2010; originally announced April 2010.

    Comments: Submitted to the Information Theory Workship (ITW) 2010, Dublin

  27. arXiv:1001.3717  [pdf, ps, other

    cs.IT

    Multistage Relaying Using Interference Networks

    Authors: Bama Muthuramalingam, Srikrishna Bhashyam, Andrew Thangaraj

    Abstract: Wireless networks with multiple nodes that relay information from a source to a destination are expected to be deployed in many applications. Therefore, understanding their design and performance under practical constraints is important. In this work, we propose and study three multihop** decode and forward (MDF) protocols for multistage half-duplex relay networks with no direct link between t… ▽ More

    Submitted 21 January, 2010; originally announced January 2010.

    Comments: 5 pages, submitted to ISIT 2010

  28. arXiv:1001.3476  [pdf, other

    cs.IT

    Dirty Paper Coding using Sign-bit Sha** and LDPC Codes

    Authors: G Shilpa, Andrew Thangaraj, Srikrishna Bhashyam

    Abstract: Dirty paper coding (DPC) refers to methods for pre-subtraction of known interference at the transmitter of a multiuser communication system. There are numerous applications for DPC, including coding for broadcast channels. Recently, lattice-based coding techniques have provided several designs for DPC. In lattice-based DPC, there are two codes - a convolutional code that defines a lattice used f… ▽ More

    Submitted 20 January, 2010; originally announced January 2010.

    Comments: 5 pages, submitted to ISIT 2010

  29. arXiv:1001.2140  [pdf, ps, other

    cs.CR

    NLHB : A Non-Linear Hopper Blum Protocol

    Authors: Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankarasubramaniam, Kapali Viswanathan

    Abstract: In this paper, we propose a light-weight provably-secure authentication protocol called the NLHB protocol, which is a variant of the HB protocol. The HB protocol uses the complexity of decoding linear codes for security against passive attacks. In contrast, security for the NLHB protocol is proved by reducing passive attacks to the problem of decoding a class of non-linear codes that are provabl… ▽ More

    Submitted 12 February, 2010; v1 submitted 13 January, 2010; originally announced January 2010.

    Comments: Revision 1 : Typos fixes, presentation changes made

  30. arXiv:0904.0768  [pdf, other

    cs.IT

    Codes on Planar Graphs

    Authors: Srimathy Srinivasan, Andrew Thangaraj

    Abstract: Codes defined on graphs and their properties have been subjects of intense recent research. On the practical side, constructions for capacity-approaching codes are graphical. On the theoretical side, codes on graphs provide several intriguing problems in the intersection of coding theory and graph theory. In this paper, we study codes defined by planar Tanner graphs. We derive an upper bound on… ▽ More

    Submitted 15 May, 2009; v1 submitted 5 April, 2009; originally announced April 2009.

    Comments: several improvements in presentation; more figures for illustration

  31. arXiv:0810.0567  [pdf, ps, other

    cs.IT

    Reed-Solomon Subcodes with Nontrivial Traces: Distance Properties and Soft-Decision Decoding

    Authors: Andrew Thangaraj, Safitha J Raj

    Abstract: Reed-Solomon (RS) codes over GF$(2^m)$ have traditionally been the most popular non-binary codes in almost all practical applications. The distance properties of RS codes result in excellent performance under hard-decision bounded-distance decoding. However, efficient and implementable soft decoding for high-rate (about 0.9) RS codes over large fields (GF(256), say) continues to remain a subject… ▽ More

    Submitted 3 October, 2008; originally announced October 2008.

    Comments: submitted to IEEE Transactions on Information Theory

  32. Path Gain Algebraic Formulation for the Scalar Linear Network Coding Problem

    Authors: Abhay T. Subramanian, Andrew Thangaraj

    Abstract: In the algebraic view, the solution to a network coding problem is seen as a variety specified by a system of polynomial equations typically derived by using edge-to-edge gains as variables. The output from each sink is equated to its demand to obtain polynomial equations. In this work, we propose a method to derive the polynomial equations using source-to-sink path gains as the variables. In the… ▽ More

    Submitted 19 June, 2010; v1 submitted 7 July, 2008; originally announced July 2008.

    Comments: 12 pages, 6 figures. Accepted for publication in IEEE Transactions on Information Theory (May 2010)

  33. arXiv:cs/0606106  [pdf, ps, other

    cs.IT

    Self-orthogonality of $q$-ary Images of $q^m$-ary Codes and Quantum Code Construction

    Authors: Sundeep B, Andrew Thangaraj

    Abstract: A code over GF$(q^m)$ can be imaged or expanded into a code over GF$(q)$ using a basis for the extension field over the base field. The properties of such an image depend on the original code and the basis chosen for imaging. Problems relating the properties of a code and its image with respect to a basis have been of great interest in the field of coding theory. In this work, a generalized vers… ▽ More

    Submitted 6 January, 2007; v1 submitted 26 June, 2006; originally announced June 2006.

    Comments: submitted to IEEE Transactions on Information Theory

  34. arXiv:cs/0509041  [pdf, ps, other

    cs.IT

    Efficient Reconciliation of Correlated Continuous Random Variables using LDPC Codes

    Authors: Matthieu Bloch, Andrew Thangaraj, Steven W. McLaughlin

    Abstract: This paper investigates an efficient and practical information reconciliation method in the case where two parties have access to correlated continuous random variables. We show that reconciliation is a special case of channel coding and that existing coded modulation techniques can be adapted for reconciliation. We describe an explicit reconciliation method based on LDPC codes in the case of co… ▽ More

    Submitted 14 September, 2005; originally announced September 2005.

    Comments: 9 pages, 9 figures

  35. arXiv:cs/0411003  [pdf, ps, other

    cs.IT cs.CR

    Applications of LDPC Codes to the Wiretap Channel

    Authors: Andrew Thangaraj, Souvik Dihidar, A. R. Calderbank, Steven McLaughlin, Jean-Marc Merolla

    Abstract: With the advent of quantum key distribution (QKD) systems, perfect (i.e. information-theoretic) security can now be achieved for distribution of a cryptographic key. QKD systems and similar protocols use classical error-correcting codes for both error correction (for the honest parties to correct errors) and privacy amplification (to make an eavesdropper fully ignorant). From a coding perspectiv… ▽ More

    Submitted 29 January, 2007; v1 submitted 2 November, 2004; originally announced November 2004.

    Comments: 30 pages, revised version

  36. arXiv:quant-ph/0008129  [pdf, ps, other

    quant-ph

    Quantum codes from cyclic codes over GF(4^m)

    Authors: Andrew Thangaraj, Steven McLaughlin

    Abstract: We provide a construction for quantum codes (hermitian-self-orthogonal codes over GF(4)) starting from cyclic codes over GF(4^m). We also provide examples of these codes some of which meet the known bounds for quantum codes.

    Submitted 30 August, 2000; originally announced August 2000.

    Comments: 7 pages, 0 figures, submitted to IEEE transactions on information theory