Skip to main content

Showing 1–26 of 26 results for author: Koetter, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:1301.2252  [pdf

    cs.CV

    A Factorized Variational Technique for Phase Unwrap** in Markov Random Fields

    Authors: Kannan Achan, Brendan J. Frey, Ralf Koetter

    Abstract: Some types of medical and topographic imaging device produce images in which the pixel values are "phase-wrapped", i.e. measured modulus a known scalar. Phase unwrap** can be viewed as the problem of inferring the number of shifts between each and every pair of neighboring pixels, subject to an a priori preference for smooth surfaces, and subject to a zero curl constraint, which requires that th… ▽ More

    Submitted 10 January, 2013; originally announced January 2013.

    Comments: Appears in Proceedings of the Seventeenth Conference on Uncertainty in Artificial Intelligence (UAI2001)

    Report number: UAI-P-2001-PG-1-6

  2. arXiv:1007.1033  [pdf, ps, other

    cs.IT

    A Theory of Network Equivalence, Parts I and II

    Authors: Ralf Koetter, Michelle Effros, Muriel Medard

    Abstract: A family of equivalence tools for bounding network capacities is introduced. Part I treats networks of point-to-point channels. The main result is roughly as follows. Given a network of noisy, independent, memoryless point-to-point channels, a collection of communication demands can be met on the given network if and only if it can be met on another network where each noisy channel is replaced by… ▽ More

    Submitted 2 September, 2010; v1 submitted 6 July, 2010; originally announced July 2010.

    Comments: 91 pages, 18 figures. Submitted to the IEEE Transactions on Information Theory on April 14, 2010. Draft 2

  3. arXiv:1005.5734  [pdf, ps, other

    cs.IT

    The Re-Encoding Transformation in Algebraic List-Decoding of Reed-Solomon Codes

    Authors: Ralf Koetter, Jun Ma, Alexander Vardy

    Abstract: The main computational steps in algebraic soft-decoding, as well as Sudan-type list-decoding, of Reed-Solomon codes are bivariate polynomial interpolation and factorization. We introduce a computational technique, based upon re-encoding and coordinate transformation, that significantly reduces the complexity of the bivariate interpolation procedure. This re-encoding and coordinate transformation c… ▽ More

    Submitted 31 May, 2010; originally announced May 2010.

    Comments: 15 pages, 3 tables

    MSC Class: 94B35 ACM Class: E.4; H.1.1

  4. Bits Through Deterministic Relay Cascades with Half-Duplex Constraint

    Authors: Tobias Lutz, Christoph Hausl, Ralf Kötter

    Abstract: Consider a relay cascade, i.e. a network where a source node, a sink node and a certain number of intermediate source/relay nodes are arranged on a line and where adjacent node pairs are connected by error-free (q+1)-ary pipes. Suppose the source and a subset of the relays wish to communicate independent information to the sink under the condition that each relay in the cascade is half-duplex cons… ▽ More

    Submitted 22 August, 2011; v1 submitted 8 June, 2009; originally announced June 2009.

    Comments: accepted for publication in IEEE Transactions on Information Theory

  5. On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks

    Authors: MinJi Kim, Luísa Lima, Fang Zhao, Joao Barros, Muriel Medard, Ralf Koetter, Ton Kalker, Keesook Han

    Abstract: Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails to correctly recover a file. We show that even for a small pr… ▽ More

    Submitted 17 April, 2009; originally announced April 2009.

    Comments: 26 pages, 9 figures, Submitted to IEEE Journal on Selected Areas in Communications (JSAC) "Mission Critical Networking"

  6. An Algebraic Watchdog for Wireless Network Coding

    Authors: MinJi Kim, Muriel Medard, Joao Barros, Ralf Koetter

    Abstract: In this paper, we propose a scheme, called the "algebraic watchdog" for wireless network coding, in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages, and, thus, provide a secure global "self-checking network". Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders a… ▽ More

    Submitted 25 May, 2009; v1 submitted 19 January, 2009; originally announced January 2009.

    Comments: 5 pages, 4 figures, submitted to IEEE International Symposium on Information Theory (ISIT) 2009. This is the final version. The content has been changed to incorporate reviewer comments and recent results

  7. Network Coding in a Multicast Switch

    Authors: MinJi Kim, Jay Kumar Sundararajan, Muriel Medard, Atilla Eryilmaz, Ralf Koetter

    Abstract: The problem of serving multicast flows in a crossbar switch is considered. Intra-flow linear network coding is shown to achieve a larger rate region than the case without coding. A traffic pattern is presented which is achievable with coding but requires a switch speedup when coding is not allowed. The rate region with coding can be characterized in a simple graph-theoretic manner, in terms of t… ▽ More

    Submitted 9 October, 2008; originally announced October 2008.

    Comments: 26 pages, 27 figures, submitted to IEEE Transactions on Information Theory

  8. Communication over Finite-Field Matrix Channels

    Authors: Danilo Silva, Frank R. Kschischang, Ralf Kötter

    Abstract: This paper is motivated by the problem of error control in network coding when errors are introduced in a random fashion (rather than chosen by an adversary). An additive-multiplicative matrix channel is considered as a model for random network coding. The model assumes that n packets of length m are transmitted over the network, and up to t erroneous packets are randomly chosen and injected int… ▽ More

    Submitted 14 September, 2009; v1 submitted 9 July, 2008; originally announced July 2008.

    Comments: 24 pages, to be published at the IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 56, no. 3, pp. 1296-1305, Mar. 2010

  9. Coding Strategies for Noise-Free Relay Cascades with Half-Duplex Constraint

    Authors: Tobias Lutz, Christoph Hausl, Ralf Kötter

    Abstract: Two types of noise-free relay cascades are investigated. Networks where a source communicates with a distant receiver via a cascade of half-duplex constrained relays, and networks where not only the source but also a single relay node intends to transmit information to the same destination. We introduce two relay channel models, capturing the half-duplex constraint, and within the framework of t… ▽ More

    Submitted 2 May, 2008; v1 submitted 8 January, 2008; originally announced January 2008.

    Comments: Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008

  10. A Rank-Metric Approach to Error Control in Random Network Coding

    Authors: Danilo Silva, Frank R. Kschischang, Ralf Kötter

    Abstract: The problem of error control in random linear network coding is addressed from a matrix perspective that is closely related to the subspace perspective of Kötter and Kschischang. A large class of constant-dimension subspace codes is investigated. It is shown that codes in this class can be easily constructed from rank-metric codes, while preserving their distance properties. Moreover, it is show… ▽ More

    Submitted 10 June, 2008; v1 submitted 5 November, 2007; originally announced November 2007.

    Comments: Minor corrections; 42 pages, to be published at the IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 3951-3967, Sep. 2008

  11. A Low Complexity Algorithm and Architecture for Systematic Encoding of Hermitian Codes

    Authors: Rachit Agarwal, Ralf Koetter, Emanuel Popovici

    Abstract: We present an algorithm for systematic encoding of Hermitian codes. For a Hermitian code defined over GF(q^2), the proposed algorithm achieves a run time complexity of O(q^2) and is suitable for VLSI implementation. The encoder architecture uses as main blocks q varying-rate Reed-Solomon encoders and achieves a space complexity of O(q^2) in terms of finite field multipliers and memory elements.

    Submitted 5 April, 2007; v1 submitted 4 April, 2007; originally announced April 2007.

    Comments: 5 Pages, Accepted in IEEE International Symposium on Information Theory ISIT 2007

  12. arXiv:cs/0703061  [pdf, ps, other

    cs.IT cs.NI

    Coding for Errors and Erasures in Random Network Coding

    Authors: Ralf Koetter, Frank Kschischang

    Abstract: The problem of error-control in random linear network coding is considered. A ``noncoherent'' or ``channel oblivious'' model is assumed where neither transmitter nor receiver is assumed to have knowledge of the channel transfer characteristic. Motivated by the property that linear network coding is vector-space preserving, information transmission is modelled as the injection into the network of… ▽ More

    Submitted 25 March, 2008; v1 submitted 13 March, 2007; originally announced March 2007.

    Comments: This revised paper contains some minor changes and clarifications

  13. arXiv:cs/0701062  [pdf, ps, other

    cs.IT

    Network Coding over a Noisy Relay : a Belief Propagation Approach

    Authors: Sichao Yang, Ralf Koetter

    Abstract: In recent years, network coding has been investigated as a method to obtain improvements in wireless networks. A typical assumption of previous work is that relay nodes performing network coding can decode the messages from sources perfectly. On a simple relay network, we design a scheme to obtain network coding gain even when the relay node cannot perfectly decode its received messages. In our… ▽ More

    Submitted 9 January, 2007; originally announced January 2007.

  14. Network Coding in a Multicast Switch

    Authors: Jay Kumar Sundararajan, Muriel Medard, MinJi Kim, Atilla Eryilmaz, Devavrat Shah, Ralf Koetter

    Abstract: We consider the problem of serving multicast flows in a crossbar switch. We show that linear network coding across packets of a flow can sustain traffic patterns that cannot be served if network coding were not allowed. Thus, network coding leads to a larger rate region in a multicast crossbar switch. We demonstrate a traffic pattern which requires a switch speedup if coding is not allowed, wher… ▽ More

    Submitted 8 August, 2006; originally announced August 2006.

    Comments: 9 pages, submitted to IEEE INFOCOM 2007

  15. arXiv:cs/0603022  [pdf, ps, other

    cs.IT

    On Separation, Randomness and Linearity for Network Codes over Finite Fields

    Authors: Siddharth Ray, Michelle Effros, Muriel Medard, Ralf Koetter, Tracey Ho, David Karger, **ane Abounadi

    Abstract: We examine the issue of separation and code design for networks that operate over finite fields. We demonstrate that source-channel (or source-network) separation holds for several canonical network examples like the noisy multiple access channel and the erasure degraded broadcast channel, when the whole network operates over a common finite field. This robustness of separation is predicated on… ▽ More

    Submitted 6 March, 2006; originally announced March 2006.

    Report number: MIT LIDS Technical Report 2687

  16. arXiv:cs/0602088  [pdf, ps, other

    cs.IT

    Towards Low-Complexity Linear-Programming Decoding

    Authors: Pascal O. Vontobel, Ralf Koetter

    Abstract: We consider linear-programming (LP) decoding of low-density parity-check (LDPC) codes. While it is clear that one can use any general-purpose LP solver to solve the LP that appears in the decoding problem, we argue in this paper that the LP at hand is equipped with a lot of structure that one should take advantage of. Towards this goal, we study the dual LP and show how coordinate-ascent methods… ▽ More

    Submitted 25 February, 2006; originally announced February 2006.

    Journal ref: Proc. 4th Int. Symposium on Turbo Codes and Related Topics, Munich, Germany, April 3-7, 2006

  17. arXiv:cs/0602087  [pdf, ps, other

    cs.IT

    Bounds on the Threshold of Linear Programming Decoding

    Authors: Pascal O. Vontobel, Ralf Koetter

    Abstract: Whereas many results are known about thresholds for ensembles of low-density parity-check codes under message-passing iterative decoding, this is not the case for linear programming decoding. Towards closing this knowledge gap, this paper presents some bounds on the thresholds of low-density parity-check code ensembles under linear programming decoding.

    Submitted 25 February, 2006; originally announced February 2006.

    Journal ref: Proc. IEEE Information Theory Workshop (ITW 2006), Punta del Este, Uruguay, March 13-17, 2006

  18. arXiv:cs/0602086  [pdf, ps, other

    cs.IT

    On the Block Error Probability of LP Decoding of LDPC Codes

    Authors: Ralf Koetter, Pascal O. Vontobel

    Abstract: In his thesis, Wiberg showed the existence of thresholds for families of regular low-density parity-check codes under min-sum algorithm decoding. He also derived analytic bounds on these thresholds. In this paper, we formulate similar results for linear programming decoding of regular low-density parity-check codes.

    Submitted 25 February, 2006; originally announced February 2006.

    Journal ref: Proc. Inaugural Workshop of the Center for Information Theory and its Applications, UC San Diego, San Diego, CA, USA, Feb. 6-10, 2006

  19. arXiv:cs/0512078  [pdf, ps, other

    cs.IT

    Graph-Cover Decoding and Finite-Length Analysis of Message-Passing Iterative Decoding of LDPC Codes

    Authors: Pascal O. Vontobel, Ralf Koetter

    Abstract: The goal of the present paper is the derivation of a framework for the finite-length analysis of message-passing iterative decoding of low-density parity-check codes. To this end we introduce the concept of graph-cover decoding. Whereas in maximum-likelihood decoding all codewords in a code are competing to be the best explanation of the received vector, under graph-cover decoding all codewords… ▽ More

    Submitted 20 December, 2005; originally announced December 2005.

    Comments: Submitted to IEEE Transactions on Information Theory, December 2005

  20. On Coding for Reliable Communication over Packet Networks

    Authors: Desmond S. Lun, Muriel Medard, Ralf Koetter, Michelle Effros

    Abstract: We present a capacity-achieving coding scheme for unicast or multicast over lossy packet networks. In the scheme, intermediate nodes perform additional coding yet do not decode nor even wait for a block of packets before sending out coded packets. Rather, whenever they have a transmission opportunity, they send out coded packets formed from random linear combinations of previously received packe… ▽ More

    Submitted 2 January, 2007; v1 submitted 23 October, 2005; originally announced October 2005.

    Comments: 33 pages, 6 figures; revised appendix

    Journal ref: Physical Communication, vol. 1, no. 1, pp. 3-20, March 2008.

  21. arXiv:cs/0508049  [pdf, ps, other

    cs.IT cs.DM

    Characterizations of Pseudo-Codewords of LDPC Codes

    Authors: Ralf Koetter, Wen-Ching W. Li, Pascal O. Vontobel, Judy L. Walker

    Abstract: An important property of high-performance, low complexity codes is the existence of highly efficient algorithms for their decoding. Many of the most efficient, recent graph-based algorithms, e.g. message passing algorithms and decoding based on linear programming, crucially depend on the efficient representation of a code in a graphical model. In order to understand the performance of these algo… ▽ More

    Submitted 17 August, 2005; v1 submitted 8 August, 2005; originally announced August 2005.

    Comments: Submitted, August 2005

  22. Further Results on Coding for Reliable Communication over Packet Networks

    Authors: Desmond S. Lun, Muriel Medard, Ralf Koetter, Michelle Effros

    Abstract: In "On Coding for Reliable Communication over Packet Networks" (Lun, Medard, and Effros, Proc. 42nd Annu. Allerton Conf. Communication, Control, and Computing, 2004), a capacity-achieving coding scheme for unicast or multicast over lossy wireline or wireless packet networks is presented. We extend that paper's results in two ways: First, we extend the network model to allow packets received on a… ▽ More

    Submitted 7 August, 2005; originally announced August 2005.

    Comments: 5 pages; to appear in Proc. 2005 IEEE International Symposium on Information Theory (ISIT 2005)

    Journal ref: Proc. 2005 IEEE International Symposium on Information Theory (ISIT 2005), pages 1848-1852, September 2005

  23. The Benefit of Thresholding in LP Decoding of LDPC Codes

    Authors: Jon Feldman, Ralf Koetter, Pascal O. Vontobel

    Abstract: Consider data transmission over a binary-input additive white Gaussian noise channel using a binary low-density parity-check code. We ask the following question: Given a decoder that takes log-likelihood ratios as input, does it help to modify the log-likelihood ratios before decoding? If we use an optimal decoder then it is clear that modifying the log-likelihoods cannot possibly help the decod… ▽ More

    Submitted 2 August, 2005; originally announced August 2005.

    Comments: To appear in Proc. 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005

  24. arXiv:cs/0506044  [pdf, ps, other

    cs.IT

    Minimal Network Coding for Multicast

    Authors: Kapil Bhattad, Niranjan Ratnakar, Ralf Koetter, Krishna R. Narayanan

    Abstract: We give an information flow interpretation for multicasting using network coding. This generalizes the fluid model used to represent flows to a single receiver. Using the generalized model, we present a decentralized algorithm to minimize the number of packets that undergo network coding. We also propose a decentralized algorithm to construct capacity achieving multicast codes when the processin… ▽ More

    Submitted 12 June, 2005; originally announced June 2005.

    Comments: accepted for publication at ISIT 2005

  25. Minimum-Cost Multicast over Coded Packet Networks

    Authors: Desmond S. Lun, Niranjan Ratnakar, Muriel Medard, Ralf Koetter, David R. Karger, Tracey Ho, Ebad Ahmed, Fang Zhao

    Abstract: We consider the problem of establishing minimum-cost multicast connections over coded packet networks, i.e. packet networks where the contents of outgoing packets are arbitrary, causal functions of the contents of received packets. We consider both wireline and wireless packet networks as well as both static multicast (where membership of the multicast group remains constant for the duration of… ▽ More

    Submitted 31 January, 2006; v1 submitted 24 March, 2005; originally announced March 2005.

    Comments: 17 pages, 6 figures; to appear in IEEE Transactions on Information Theory (special issue on Networking and Information Theory); revised version, with major changes

    Journal ref: IEEE Trans. Inform. Theory, vol. 52, no. 6, pp. 2608-2623, June 2006

  26. arXiv:cs/0502033  [pdf, ps, other

    cs.IT

    Pseudo-Codewords of Cycle Codes via Zeta Functions

    Authors: Ralf Koetter, Wen-Ching W. Li, Pascal O. Vontobel, Judy L. Walker

    Abstract: Cycle codes are a special case of low-density parity-check (LDPC) codes and as such can be decoded using an iterative message-passing decoding algorithm on the associated Tanner graph. The existence of pseudo-codewords is known to cause the decoding algorithm to fail in certain instances. In this paper, we draw a connection between pseudo-codewords of cycle codes and the so-called edge zeta func… ▽ More

    Submitted 5 February, 2005; originally announced February 2005.

    Comments: Presented at Information Theory Workshop (ITW), San Antonio, TX, 2004

    ACM Class: E.4