Skip to main content

Showing 1–17 of 17 results for author: Dumer, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2101.10145  [pdf, other

    cs.IT

    Codes approaching the Shannon limit with polynomial complexity per information bit

    Authors: Ilya Dumer, Navid Gharavi

    Abstract: We consider codes for channels with extreme noise that emerge in various low-power applications. Simple LDPC-type codes with parity checks of weight 3 are first studied for any dimension $m\rightarrow\infty.$ These codes form modulation schemes: they improve the original channel output for any $SNR>$ $-6$ dB (per information bit) and gain $3$ dB over uncoded modulation as $SNR$ grows. However, the… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

    Comments: 18 pages, 3 figures

  2. Numerical and analytical bounds on threshold error rates for hypergraph-product codes

    Authors: Alexey A. Kovalev, Sanjay Prabhakar, Ilya Dumer, Leonid P. Pryadko

    Abstract: We study analytically and numerically decoding properties of finite rate hypergraph-product quantum LDPC codes obtained from random (3,4)-regular Gallager codes, with a simple model of independent X and Z errors. Several non-trival lower and upper bounds for the decodable region are constructed analytically by analyzing the properties of the homological difference, equal minus the logarithm of the… ▽ More

    Submitted 13 June, 2018; v1 submitted 5 April, 2018; originally announced April 2018.

    Comments: 14 pages, 5 figures

    Journal ref: Phys. Rev. A 97, 062320 (2018)

  3. arXiv:1706.06764   

    cs.IT

    An elementary description of polarization process

    Authors: Ilya Dumer

    Abstract: We analyze successive cancellation (SC) decoder by using two random functions. The first function is related to the likelihoods of 0 and 1 in each code position, while the second gives the difference between their posterior probabilities. We then study the second power moments of both functions. We show that these moments are being squared in channel transformations, while their product tends to 0… ▽ More

    Submitted 23 May, 2020; v1 submitted 21 June, 2017; originally announced June 2017.

    Comments: The paper employs wrong equation (14) in Section 5. This equation is then used in Sections 6 and 7. In particular, Theorem 1 of Section 6 contains incorrect proof

  4. arXiv:1703.05307  [pdf, ps, other

    cs.IT

    On decoding algorithms for polar codes

    Authors: Ilya Dumer

    Abstract: We survey the known list decoding algorithms for polar codes and compare their complexity. Index terms: Polar codes; Reed-Muller codes; successive cancellation decoding.

    Submitted 17 March, 2017; v1 submitted 14 March, 2017; originally announced March 2017.

    Comments: 4 pages, 2 figures

  5. arXiv:1703.05306  [pdf, ps, other

    cs.IT

    Recursive Decoding and Its Performance for Low-Rate Reed-Muller Codes

    Authors: Ilya Dumer

    Abstract: Recursive decoding techniques are considered for Reed-Muller (RM) codes of growing length $n$ and fixed order $r.$ An algorithm is designed that has complexity of order $n\log n$ and corrects most error patterns of weight up to $n(1/2-\varepsilon)$ given that $\varepsilon$ exceeds $n^{-1/2^{r}}.$ This improves the asymptotic bounds known for decoding RM codes with nonexponential complexity.

    Submitted 14 March, 2017; originally announced March 2017.

    Journal ref: IEEE Trans. Info. Theory, vol. 50, pp. 811-823, 2004

  6. arXiv:1703.05305  [pdf, ps, other

    cs.IT

    Soft decision decoding of Reed-Muller codes: recursive lists

    Authors: Ilya Dumer, Kirill Shabunov

    Abstract: Recursive list decoding is considered for Reed-Muller (RM) codes. The algorithm repeatedly relegates itself to the shorter RM codes by recalculating the posterior probabilities of their symbols. Intermediate decodings are only performed when these recalculations reach the trivial RM codes. In turn, the updated lists of most plausible codewords are used in subsequent decodings. The algorithm is fur… ▽ More

    Submitted 14 March, 2017; originally announced March 2017.

    Journal ref: IEEE Trans. Info. Theory, vol. 52, no. 3, pp. 1260-1266, 2006

  7. arXiv:1703.05304  [pdf, other

    cs.IT

    Recursive List Decoding for Reed-Muller Codes

    Authors: Ilya Dumer, Kirill Shabunov

    Abstract: We consider recursive decoding for Reed-Muller (RM) codes and their subcodes. Two new recursive techniques are described. We analyze asymptotic properties of these algorithms and show that they substantially outperform other decoding algorithms with nonexponential complexity known for RM codes. Decoding performance is further enhanced by using intermediate code lists and permutation procedures. Fo… ▽ More

    Submitted 14 March, 2017; originally announced March 2017.

    Journal ref: "Information, Coding and Mathematics", ed. M. Blaum, P. Farrell, and H.C.A. van Tilborg, Kluwer, Boston, 2002, pp. 279-298

  8. arXiv:1703.05303  [pdf, ps, other

    cs.IT

    Recursive decoding of Reed-Muller codes

    Authors: Ilya Dumer

    Abstract: New soft- and hard decision decoding algorithms are presented for general Reed-Muller codes $\left\{\genfrac{}{}{0pt}{}{m}{r}\right\} $ of length $2^{m}$ and distance $2^{m-r}$. We use Plotkin $(u,u+v)$ construction and decompose code $\left\{\genfrac{}{}{0pt}{}{m}{r}\right\} $ onto subblocks $u\in\left\{\genfrac{}{}{0pt}{}{m-1}{r}\right\} $ and… ▽ More

    Submitted 14 March, 2017; originally announced March 2017.

    Journal ref: Proc. 37th Allerton Conf. on Commun., Control, and Computing, Monticello, IL, USA, 1999, pp. 61-69

  9. arXiv:1703.05302  [pdf, ps, other

    cs.IT

    Recursive constructions and their maximum likelihood decoding

    Authors: Ilya Dumer, Kirill Shabunov

    Abstract: We consider recursive decoding techniques for RM codes, their subcodes, and newly designed codes. For moderate lengths up to 512, we obtain near-optimum decoding with feasible complexity.

    Submitted 14 March, 2017; originally announced March 2017.

    Journal ref: Proc. 38th Allerton Conf. Communication, Control, and Computing, Monticello, IL, USA, 2000, pp. 71-80

  10. arXiv:1702.04886  [pdf, ps, other

    cs.IT

    Polar codes with a stepped boundary

    Authors: Ilya Dumer

    Abstract: We consider explicit polar constructions of blocklength $n\rightarrow\infty$ for the two extreme cases of code rates $R\rightarrow1$ and $R\rightarrow0.$ For code rates $R\rightarrow1,$ we design codes with complexity order of $n\log n$ in code construction, encoding, and decoding. These codes achieve the vanishing output bit error rates on the binary symmetric channels with any transition error p… ▽ More

    Submitted 16 February, 2017; originally announced February 2017.

    Comments: This article has been submitted to ISIT 2017

  11. arXiv:1611.07164  [pdf, other

    cs.IT quant-ph

    Distance verification for classical and quantum LDPC codes

    Authors: Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko

    Abstract: The techniques of distance verification known for general linear codes are re-applied to quantum stabilizer codes. Then distance verification is addressed for classical and quantum LDPC codes. New complexity bounds for distance verification with provable performance are derived using the average weight spectra of the ensembles of LDPC codes. These bounds are expressed in terms of the erasure-corre… ▽ More

    Submitted 22 November, 2016; originally announced November 2016.

    Comments: 16 pages, 2 figures

  12. Distance verification for LDPC codes

    Authors: Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko

    Abstract: The problem of finding code distance has been long studied for the generic ensembles of linear codes and led to several algorithms that substantially reduce exponential complexity of this task. However, no asymptotic complexity bounds are known for distance verification in other ensembles of linear codes. Our goal is to re-design the existing generic algorithms of distance verification and derive… ▽ More

    Submitted 8 May, 2016; originally announced May 2016.

    Comments: 5 pages, 1 figure, to appear in Proceedings of ISIT 2016 - IEEE International Symposium on Information Theory, Barcelona

  13. arXiv:1405.0348  [pdf, other

    quant-ph cs.IT

    Numerical Techniques for Finding the Distances of Quantum Codes

    Authors: Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko

    Abstract: We survey the existing techniques for calculating code distances of classical codes and apply these techniques to generic quantum codes. For classical and quantum LDPC codes, we also present a new linked-cluster technique. It reduces complexity exponent of all existing deterministic techniques designed for codes with small relative distances (which include all known families of quantum LDPC codes)… ▽ More

    Submitted 2 May, 2014; originally announced May 2014.

    Comments: 5 pages, 1 figure, to appear in Proceedings of ISIT 2014 - IEEE International Symposium on Information Theory, Honolulu

  14. arXiv:1302.1845  [pdf, other

    quant-ph cs.IT

    Linked-Cluster Technique for Finding the Distance of a Quantum LDPC Code

    Authors: Alexey A. Kovalev, Ilya Dumer, Leonid P. Pryadko

    Abstract: We present a linked-cluster technique for calculating the distance of a quantum LDPC code. It offers an advantage over existing deterministic techniques for codes with small relative distances (which includes all known families of quantum LDPC codes), and over the probabilistic technique for codes with sufficiently high rates.

    Submitted 7 February, 2013; originally announced February 2013.

    Comments: 5.5 pages

  15. Structured Error Recovery for Codeword-Stabilized Quantum Codes

    Authors: Yunfan Li, Ilya Dumer, Markus Grassl, Leonid P. Pryadko

    Abstract: Codeword stabilized (CWS) codes are, in general, non-additive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical non-linear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less, and employs a separate n-qubit meas… ▽ More

    Submitted 8 March, 2010; v1 submitted 16 December, 2009; originally announced December 2009.

    Comments: 13 pages, 9 eps figures

    Journal ref: Phys. Rev. A 81, 052337 (2010)

  16. arXiv:cs/0612073  [pdf, ps, other

    cs.IT cs.CR

    On the Fingerprinting Capacity Under the Marking Assumption

    Authors: N. Prasanth Anthapadmanabhan, Alexander Barg, Ilya Dumer

    Abstract: We address the maximum attainable rate of fingerprinting codes under the marking assumption, studying lower and upper bounds on the value of the rate for various sizes of the attacker coalition. Lower bounds are obtained by considering typical coalitions, which represents a new idea in the area of fingerprinting and enables us to improve the previously known lower bounds for coalitions of size t… ▽ More

    Submitted 20 February, 2008; v1 submitted 14 December, 2006; originally announced December 2006.

    Comments: final version, 12 pages, 2 figures, to appear in IEEE Trans. on Inform. Theory - Special Issue on Information-theoretic Security, Jun 2008, simplified proofs in Sections II and III, changes in Theorem 4.1

  17. arXiv:cs/0406039  [pdf, ps, other

    cs.IT

    Long Nonbinary Codes Exceeding the Gilbert - Varshamov Bound for any Fixed Distance

    Authors: Sergey Yekhanin, Ilya Dumer

    Abstract: Let A(q,n,d) denote the maximum size of a q-ary code of length n and distance d. We study the minimum asymptotic redundancy ρ(q,n,d)=n-log_q A(q,n,d) as n grows while q and d are fixed. For any d and q<=d-1, long algebraic codes are designed that improve on the BCH codes and have the lowest asymptotic redundancy ρ(q,n,d) <= ((d-3)+1/(d-2)) log_q n known to date. Prior to this work, codes of fixe… ▽ More

    Submitted 23 June, 2004; v1 submitted 21 June, 2004; originally announced June 2004.

    Comments: Submitted to IEEE Trans. on Info. Theory