Skip to main content

Showing 1–50 of 57 results for author: Kschischang, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06098  [pdf, ps, other

    cs.IT

    Secure Storage using Maximally Recoverable Locally Repairable Codes

    Authors: Tim Janz, Hedongliang Liu, Rawad Bitar, Frank R. Kschischang

    Abstract: This paper considers data secrecy in distributed storage systems (DSSs) using maximally recoverable locally repairable codes (MR-LRCs). Conventional MR-LRCs are in general not secure against eavesdroppers who can observe the transmitted data during a global repair operation. This work enables nonzero secrecy dimension of DSSs encoded by MR-LRCs through a new repair framework. The key idea is to as… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  2. arXiv:2404.04776  [pdf, other

    cs.IT

    Soft-in Soft-out Decoding of Spherical Codes from Cartesian Powers of PAM Constellations

    Authors: Reza Rafie Borujeny, Susanna E. Rumsey, Stark C. Draper, Frank R. Kschischang

    Abstract: For applications in concatenated coding for optical communications systems, we examine the encoding and soft-decoding of short spherical codes constructed as constant-energy shells of the Cartesian power of pulse amplitude modulation constellations. These are unions of permutation codes having the same average power. We construct a list decoder for permutation codes by adapting Murty's algorithm,… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

  3. arXiv:2402.09364  [pdf, other

    cs.IT

    Performance-Complexity-Latency Trade-offs of Concatenated RS-BCH Codes

    Authors: Alvin Y. Sukmadji, Frank R. Kschischang

    Abstract: Using a generating function approach, a computationally tractable expression is derived to predict the frame error rate arising at the output of the binary symmetric channel when a number of outer Reed--Solomon codes are concatenated with a number of inner Bose--Ray-Chaudhuri--Hocquenghem codes, thereby obviating the need for time-consuming Monte Carlo simulations. Measuring (a) code performance v… ▽ More

    Submitted 18 February, 2024; v1 submitted 14 February, 2024; originally announced February 2024.

    Comments: Accepted for publication in the IEEE Transactions on Communications

  4. arXiv:2312.13415  [pdf, other

    cs.IT

    Higher-Order Staircase Codes

    Authors: Mohannad Shehadeh, Frank R. Kschischang, Alvin Y. Sukmadji, William Kingsford

    Abstract: We generalize staircase codes and tiled diagonal zipper codes, preserving their key properties while allowing each coded symbol to be protected by arbitrarily many component codewords rather than only two. This generalization which we term "higher-order staircase codes" arises from the marriage of two distinct combinatorial objects: difference triangle sets and finite-geometric nets, which have ty… ▽ More

    Submitted 30 May, 2024; v1 submitted 20 December, 2023; originally announced December 2023.

    Comments: Submitted to IEEE Transactions on Information Theory

  5. arXiv:2310.16165  [pdf, other

    cs.IT

    Generalized Staircase Codes with Arbitrary Bit Degree

    Authors: Mohannad Shehadeh, Frank R. Kschischang, Alvin Y. Sukmadji

    Abstract: We introduce a natural generalization of staircase codes in which each bit is protected by arbitrarily many component codewords rather than two. This enables powerful energy-efficient FEC based on iterative decoding of Hamming components.

    Submitted 21 February, 2024; v1 submitted 24 October, 2023; originally announced October 2023.

    Comments: Submitted to 2024 Optical Fiber Communication Conference (OFC 2024)

  6. arXiv:2310.13825  [pdf, other

    cs.IT

    Generalized Spatially-Coupled Product-Like Codes Using Zipper Codes With Irregular Degree

    Authors: Alvin Y. Sukmadji, Frank R. Kschischang, Mohannad Shehadeh

    Abstract: Zipper codes with irregular variable degree are studied. Two new interleaver maps -- chevron and half-chevron -- are described. Simulation results with shortened double-error-correcting Bose--Chaudhuri--Hocquenghem constituent codes show that zipper codes with chevron and half-chevron interleaver maps outperform staircase codes when the rate is below 0.86 and 0.91, respectively, at $10^{-8}$ outpu… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

    Comments: 6 pages, 11 figures, paper accepted for the GLOBECOM 2023 Workshop on Channel Coding Beyond 5G

  7. arXiv:2309.04431  [pdf, ps, other

    cs.IT

    External Codes for Multiple Unicast Networks via Interference Alignment

    Authors: F. R. Kschischang, F. Manganiello, A. Ravagnani, K. Savary

    Abstract: We introduce a formal framework to study the multiple unicast problem for a coded network in which the network code is linear over a finite field and fixed. We show that the problem corresponds to an interference alignment problem over a finite field. In this context, we establish an outer bound for the achievable rate region and provide examples of networks where the bound is sharp. We finally gi… ▽ More

    Submitted 8 September, 2023; originally announced September 2023.

  8. A Simple Capacity-Achieving Scheme for Channels with Polarization-Dependent Loss

    Authors: Mohannad Shehadeh, Frank R. Kschischang

    Abstract: We demonstrate, for a widely used model of channels with polarization dependent loss (PDL), that channel capacity is achieved by a simple interference cancellation scheme in conjunction with a universal precoder. Crucially, the proposed scheme is not only information-theoretically optimal, but it is also exceptionally simple and concrete. It transforms the PDL channel into separate scalar additive… ▽ More

    Submitted 6 November, 2022; v1 submitted 8 August, 2022; originally announced August 2022.

    Comments: Submitted to Journal of Lightwave Technology

  9. Practical Considerations in Direct Detection Under Tukey Signalling

    Authors: Amir Tasbihi, Frank R. Kschischang

    Abstract: The deliberate introduction of controlled intersymbol interference (ISI) in Tukey signalling enables the recovery of signal amplitude and (in part) signal phase under direct detection, giving rise to significant data rate improvements compared to intensity modulation with direct detection (IMDD). The use of an integrate-and-dump detector makes precise waveform sha** unnecessary, thereby equippin… ▽ More

    Submitted 24 February, 2023; v1 submitted 28 April, 2022; originally announced April 2022.

    Comments: Submitted to J. Lightwave Techn. on March 3rd, 2022, revised on October 5th, 2022, accepted on December 1st, 2022

  10. Zipper Codes

    Authors: Alvin Y. Sukmadji, Umberto Martínez-Peñas, Frank R. Kschischang

    Abstract: Zipper codes are a framework for describing spatially-coupled product-like codes. Many well-known codes, such as staircase codes and braided block codes, are subsumed into this framework. New types of codes such as tiled diagonal and delayed diagonal zipper codes are introduced along with their software simulation results. Stall patterns that can arise in iterative decoding are analyzed, giving a… ▽ More

    Submitted 20 February, 2023; v1 submitted 18 March, 2022; originally announced March 2022.

    Comments: Accepted for publication on JLT, updated reference for oFEC

    Journal ref: in Journal of Lightwave Technology, vol. 40, no. 19, pp. 6397-6407, Oct. 2022

  11. Why Constant-Composition Codes Reduce Nonlinear Interference Noise

    Authors: Reza Rafie Borujeny, Frank Kschischang

    Abstract: A time-domain perturbation model of the nonlinear Schrodinger equation is used to study wavelength-division multiplexed communication over a single polarization. The model explains (a) why constant-composition codes offer an improvement in signal to noise ratio compared with independent and uniform selection of constellation points and (b) why similar gains are obtained using carrier recovery algo… ▽ More

    Submitted 4 March, 2022; originally announced March 2022.

    Comments: Submitted to IEEE Journal of Lightwave Technology on March 4, 2022

  12. Information Density in Multi-Layer Resistive Memories

    Authors: Susanna E. Rumsey, Stark C. Draper, Frank R. Kschischang

    Abstract: Resistive memories store information in a crossbar arrangement of two-terminal devices that can be programmed to patterns of high or low resistance. While extremely compact, this technology suffers from the "sneak-path" problem: certain information patterns cannot be recovered, as multiple low resistances in parallel make a high resistance indistinguishable from a low resistance. In this paper, a… ▽ More

    Submitted 13 February, 2022; originally announced February 2022.

    ACM Class: E.4; H.1.1

    Journal ref: in IEEE Transactions on Information Theory, vol. 67, no. 3, pp. 1446-1460, March 2021

  13. Direct Detection Under Tukey Signalling

    Authors: Amir Tasbihi, Frank R. Kschischang

    Abstract: A new direct-detection-compatible signalling scheme is proposed for fiber-optic communication over short distances. Controlled inter-symbol interference is exploited to extract phase information, thereby achieving spectral efficiencies about one bit less, per second per hertz, of those of a coherent detector.

    Submitted 9 August, 2021; v1 submitted 26 May, 2021; originally announced May 2021.

    Comments: Submitted to J. Lightwave Techn. on May 26th, 2021. First revision on July 11th, 2021. Second revision on August 7th, 2021

  14. arXiv:2103.04976  [pdf, ps, other

    cs.IT

    Space-Time Codes from Sum-Rank Codes

    Authors: Mohannad Shehadeh, Frank R. Kschischang

    Abstract: Just as rank-metric or Gabidulin codes may be used to construct rate-diversity tradeoff optimal space-time codes, a recently introduced generalization for the sum-rank metric -- linearized Reed-Solomon codes -- accomplishes the same in the case of multiple fading blocks. In this paper, we provide the first explicit construction of minimal delay rate-diversity optimal multiblock space-time codes as… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: Submitted to IEEE Transactions on Information Theory

  15. arXiv:2101.10677  [pdf, other

    cs.IT

    Channel Matching: An Adaptive Technique to Increase the Accuracy of Soft Decisions

    Authors: Reza Rafie Borujeny, Frank R. Kschischang

    Abstract: Nonlinear interference is modeled by a time-varying conditionally Gaussian channel. It is shown that approximating this channel with a time-invariant channel imposes considerable loss in the performance of channel decoding. An adaptive method to maintain decoding performance is described.

    Submitted 31 January, 2021; v1 submitted 26 January, 2021; originally announced January 2021.

  16. arXiv:2001.08663  [pdf, other

    cs.IT math.OC

    A Signal-Space Distance Measure for Nondispersive Optical Fiber

    Authors: Reza Rafie Borujeny, Frank R. Kschischang

    Abstract: The nondispersive per-sample channel model for the optical fiber channel is considered. Under certain smoothness assumptions, the problem of finding the minimum amount of noise energy that can render two different input points indistinguishable is formulated. This minimum noise energy is then taken as a measure of distance between the points in the input alphabet. Using the machinery of optimal co… ▽ More

    Submitted 22 October, 2020; v1 submitted 23 January, 2020; originally announced January 2020.

  17. On the Capacity of Waveform Channels Under Square-Law Detection of Time-Limited Signals

    Authors: Amir Tasbihi, Frank R. Kschischang

    Abstract: Capacity bounds for waveform channels under square-law detection of time-limited complex-valued signals are derived. The upper bound is the capacity of the channel under (complex-valued) coherent detection. The lower bound is one bit less, per dimension, than the upper bound.

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: Submitted to IEEE Trans. Inf. Theory, January 8, 2020

  18. arXiv:1904.12736  [pdf, ps, other

    cs.IT

    Wireless Network Reliability Analysis for Arbitrary Network Topologies

    Authors: Semiha Tedik Basaran, Gunes Karabulut Kurt, Frank R. Kschischang

    Abstract: The outage performance of wireless networks with unstructured network topologies is investigated. The network reliability perspective of graph theory is used to obtain the network outage polynomial of generalized wireless networks by enumerating paths and cut-sets of its graph representation for both uncorrelated and correlated wireless channels. A relation is established between the max-flow min-… ▽ More

    Submitted 29 April, 2019; originally announced April 2019.

  19. Maximum Likelihood Detection in a Four-Dimensional Stokes-Space Receiver

    Authors: Amir Tasbihi, Frank R. Kschischang

    Abstract: The maximum likelihood detection rule for a four-dimensional direct-detection optical front-end is derived. The four dimensions are two intensities and two differential phases. Three different signal processing algorithms, composed of symbol-by-symbol, sequence and successive detection, are discussed. To remedy dealing with special functions in the detection rules, an approximation for high signal… ▽ More

    Submitted 8 February, 2019; originally announced February 2019.

    Comments: Submitted to IEEE Trans. Commun., February 1, 2019

  20. arXiv:1809.11158  [pdf, ps, other

    cs.IT

    Universal and Dynamic Locally Repairable Codes with Maximal Recoverability via Sum-Rank Codes

    Authors: Umberto Martínez-Peñas, Frank R. Kschischang

    Abstract: Locally repairable codes (LRCs) are considered with equal or unequal localities, local distances and local field sizes. An explicit two-layer architecture with a sum-rank outer code is obtained, having disjoint local groups and achieving maximal recoverability (MR) for all families of local linear codes (MDS or not) simultaneously, up to a specified maximum locality $ r $. Furthermore, the local l… ▽ More

    Submitted 24 April, 2019; v1 submitted 28 September, 2018; originally announced September 2018.

  21. Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes

    Authors: Umberto Martínez-Peñas, Frank R. Kschischang

    Abstract: Multishot network coding is considered in a worst-case adversarial setting in which an omniscient adversary with unbounded computational resources may inject erroneous packets in up to $t$ links, erase up to $ρ$ packets, and wire-tap up to $μ$ links, all throughout $\ell$ shots of a linearly-coded network. Assuming no knowledge of the underlying linear network code (in particular, the network topo… ▽ More

    Submitted 17 April, 2019; v1 submitted 9 May, 2018; originally announced May 2018.

  22. Low-Complexity Concatenated LDPC-Staircase Codes

    Authors: Masoud Barakatain, Frank R. Kschischang

    Abstract: A low-complexity soft-decision concatenated FEC scheme, consisting of an inner LDPC code and an outer staircase code is proposed. The inner code is tasked with reducing the bit error probability below the outer-code threshold. The concatenated code is obtained by optimizing the degree distribution of the inner-code ensemble to minimize estimated data-flow, for various choices of outer staircase co… ▽ More

    Submitted 21 September, 2018; v1 submitted 2 March, 2018; originally announced March 2018.

    Comments: This version corrects an error in the formulation of target information bit error probability for the coded component of the inner code

  23. arXiv:1710.06482  [pdf, ps, other

    cs.IT

    Successive Four-Dimensional Stokes-Space Direct Detection

    Authors: Amir Tasbihi, Frank R. Kschischang

    Abstract: We present a successive detection scheme for the fourth dimension in a four-dimensional Stokes-space direct detection receiver. At the expense of a small number of electrical-domain computations, the additional information rate can be substantial.

    Submitted 17 October, 2017; originally announced October 2017.

    Comments: Submitted on October 10, 2017, to the Optical Fiber Communications Conference and Exhibition, OFC 2018

  24. arXiv:1706.05468  [pdf, ps, other

    cs.IT

    Adversarial Network Coding

    Authors: Alberto Ravagnani, Frank R. Kschischang

    Abstract: A combinatorial framework for adversarial network coding is presented. Channels are described by specifying the possible actions that one or more (possibly coordinated) adversaries may take. Upper bounds on three notions of capacity (the one-shot capacity, the zero-error capacity, and the compound zero-error capacity) are obtained for point-to-point channels, and generalized to corresponding capac… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

  25. arXiv:1610.07724  [pdf, ps, other

    cs.IT

    Matroidal Structure of Skew Polynomial Rings with Application to Network Coding

    Authors: Siyu Liu, Felice Manganiello, Frank R. Kschischang

    Abstract: Over a finite field $\mathbb{F}_{q^m}$, the evaluation of skew polynomials is intimately related to the evaluation of linearized polynomials. This connection allows one to relate the concept of polynomial independence defined for skew polynomials to the familiar concept of linear independence for vector spaces. This relation allows for the definition of a representable matroid called the… ▽ More

    Submitted 25 October, 2016; originally announced October 2016.

  26. arXiv:1602.04034  [pdf, other

    cs.IT

    On Scaling Rules for Energy of VLSI Polar Encoders and Decoders

    Authors: Christopher G. Blake, Frank R. Kschischang

    Abstract: It is shown that all polar encoding schemes of rate $R>\frac{1}{2}$ of block length $N$ implemented according to the Thompson VLSI model must take energy $E\geΩ\left(N^{3/2}\right)$. This lower bound is achievable up to polylogarithmic factors using a mesh network topology defined by Thompson and the encoding algorithm defined by Arikan. A general class of circuits that compute successive cancella… ▽ More

    Submitted 12 February, 2016; originally announced February 2016.

  27. arXiv:1602.04026  [pdf, other

    cs.IT

    Energy, Latency, and Reliability Tradeoffs in Coding Circuits

    Authors: Christopher G. Blake, Frank R. Kschischang

    Abstract: It is shown that fully-parallel encoding and decoding schemes with asymptotic block error probability that scales as $O\left(f\left(n\right)\right)$ have Thompson energy that scales as $Ω\left(\sqrt{\ln f\left(n\right)}n\right)$. As well, it is shown that the number of clock cycles (denoted $T\left(n\right)$) required for any encoding or decoding scheme that reaches this bound must scale as… ▽ More

    Submitted 12 February, 2016; originally announced February 2016.

    Comments: 13 pages, 2 figures, submitted for journal publication, submitted in part for presentation at 2016 International Symposium on Information Theory

  28. arXiv:1512.01132  [pdf, other

    cs.IT

    Spatially-coupled Split-component Codes with Iterative Algebraic Decoding

    Authors: Lei M. Zhang, Dmitri Truhachev, Frank Kschischang

    Abstract: We analyze a class of high performance, low decoding-data-flow error-correcting codes suitable for high bit-rate optical-fiber communication systems. A spatially-coupled split-component ensemble is defined, generalizing from the most important codes of this class, staircase codes and braided block codes, and preserving a deterministic partitioning of component-code bits over code blocks. Our analy… ▽ More

    Submitted 3 December, 2015; originally announced December 2015.

  29. arXiv:1503.07652  [pdf, ps, other

    cs.IT

    Upper Bound on the Capacity of a Cascade of Nonlinear and Noisy Channels

    Authors: Gerhard Kramer, Mansoor I. Yousefi, Frank R. Kschischang

    Abstract: An upper bound on the capacity of a cascade of nonlinear and noisy channels is presented. The cascade mimics the split-step Fourier method for computing waveform propagation governed by the stochastic generalized nonlinear Schroedinger equation. It is shown that the spectral efficiency of the cascade is at most log(1+SNR), where SNR is the receiver signal-to-noise ratio. The results may be applied… ▽ More

    Submitted 23 April, 2015; v1 submitted 26 March, 2015; originally announced March 2015.

    Comments: The main change is to define the noise as bandlimited already in (8) rather than before (15). This serves to clarify subsequent steps

  30. arXiv:1503.03880  [pdf, other

    cs.IT cs.AR

    Modeling and Energy Optimization of LDPC Decoder Circuits with Timing Violations

    Authors: François Leduc-Primeau, Frank R. Kschischang, Warren J. Gross

    Abstract: This paper proposes a "quasi-synchronous" design approach for signal processing circuits, in which timing violations are permitted, but without the need for a hardware compensation mechanism. The case of a low-density parity-check (LDPC) decoder is studied, and a method for accurately modeling the effect of timing violations at a high level of abstraction is presented. The error-correction perform… ▽ More

    Submitted 17 November, 2017; v1 submitted 12 March, 2015; originally announced March 2015.

    Comments: To appear in IEEE Transactions on Communications

  31. arXiv:1502.07999  [pdf, other

    cs.IT

    On the Energy Complexity of LDPC Decoder Circuits

    Authors: Christopher Blake, Frank R. Kschischang

    Abstract: It is shown that in a sequence of randomly generated bipartite configurations with number of left nodes approaching infinity, the probability that a particular configuration in the sequence has a minimum bisection width proportional to the number of vertices in the configuration approaches $1$ so long as a sufficient condition on the node degree distribution is satisfied. This graph theory result… ▽ More

    Submitted 27 February, 2015; originally announced February 2015.

  32. arXiv:1502.06455  [pdf, ps, other

    cs.IT

    Upper Bound on the Capacity of the Nonlinear Schrödinger Channel

    Authors: Mansoor I. Yousefi, Gerhard Kramer, Frank R. Kschischang

    Abstract: It is shown that the capacity of the channel modeled by (a discretized version of) the stochastic nonlinear Schrödinger (NLS) equation is upper-bounded by $\log(1+\text{SNR})$ with $\text{SNR}=\mathcal P_0/σ^2(z)$, where $\mathcal P_0$ is the average input signal power and $σ^2(z)$ is the total noise power up to distance $z$. The result is a consequence of the fact that the deterministic NLS equat… ▽ More

    Submitted 31 March, 2015; v1 submitted 23 February, 2015; originally announced February 2015.

    Comments: To be presented at the 14th Canadian Workshop on Information Theory (CWIT), St. John's, NL, Canada, July 6-9, 2015. This is the final version submitted to the CWIT 2015

  33. arXiv:1412.4130  [pdf, other

    cs.IT

    Energy Consumption of VLSI Decoders

    Authors: Christopher Blake, Frank R. Kschischang

    Abstract: Thompson's model of VLSI computation relates the energy of a computation to the product of the circuit area and the number of clock cycles needed to carry out the computation. It is shown that for any family of circuits implemented according to this model, using any algorithm that performs decoding of a codeword passed through a binary erasure channel, as the block length approaches infinity eithe… ▽ More

    Submitted 12 December, 2014; originally announced December 2014.

    Comments: Submitted

  34. On the Per-Sample Capacity of Nondispersive Optical Fibers

    Authors: Mansoor I. Yousefi, Frank R. Kschischang

    Abstract: The capacity of the channel defined by the stochastic nonlinear Schrödinger equation, which includes the effects of the Kerr nonlinearity and amplified spontaneous emission noise, is considered in the case of zero dispersion. In the absence of dispersion, this channel behaves as a collection of parallel per-sample channels. The conditional probability density function of the nonlinear per-sample c… ▽ More

    Submitted 7 October, 2014; originally announced October 2014.

    Comments: Published in 2011

    Journal ref: IEEE Transactions on Information Theory, vol. 57, no. 11, pp. 7522--7541, Nov. 2011

  35. Communication over Finite-Chain-Ring Matrix Channels

    Authors: Chen Feng, Roberto W. Nóbrega, Frank R. Kschischang, Danilo Silva

    Abstract: Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over certain finite rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over a finite-ring matrix channel $Y = AX + BE$, where $X$ is the channel input, $Y$ is… ▽ More

    Submitted 6 June, 2014; v1 submitted 9 April, 2013; originally announced April 2013.

    Comments: Submitted to IEEE Transactions on Information Theory, April 2013. Revised version submitted in Feb. 2014. Final version submitted in June 2014

  36. Information Transmission using the Nonlinear Fourier Transform, Part III: Spectrum Modulation

    Authors: Mansoor I. Yousefi, Frank R. Kschischang

    Abstract: Motivated by the looming "capacity crunch" in fiber-optic networks, information transmission over such systems is revisited. Among numerous distortions, inter-channel interference in multiuser wavelength-division multiplexing (WDM) is identified as the seemingly intractable factor limiting the achievable rate at high launch power. However, this distortion and similar ones arising from nonlinearity… ▽ More

    Submitted 7 October, 2014; v1 submitted 12 February, 2013; originally announced February 2013.

    Comments: Updated version of IEEE Transactions on Information Theory, vol. 60, no. 7, pp. 4346--4369, July, 2014

    Journal ref: IEEE Transactions on Information Theory, vol. 60, no. 7, pp. 4346--4369, July, 2014

  37. arXiv:1207.4136  [pdf

    cs.AI

    Convolutional Factor Graphs as Probabilistic Models

    Authors: Yongyi Mao, Frank Kschischang, Brendan J. Frey

    Abstract: Based on a recent development in the area of error control coding, we introduce the notion of convolutional factor graphs (CFGs) as a new class of probabilistic graphical models. In this context, the conventional factor graphs are referred to as multiplicative factor graphs (MFGs). This paper shows that CFGs are natural models for probability functions when summation of independent latent random v… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: Appears in Proceedings of the Twentieth Conference on Uncertainty in Artificial Intelligence (UAI2004)

    Report number: UAI-P-2004-PG-374-381

  38. Information Transmission using the Nonlinear Fourier Transform, Part II: Numerical Methods

    Authors: Mansoor I. Yousefi, Frank R. Kschischang

    Abstract: In this paper, numerical methods are suggested to compute the discrete and the continuous spectrum of a signal with respect to the Zakharov-Shabat system, a Lax operator underlying numerous integrable communication channels including the nonlinear Schrödinger channel, modeling pulse propagation in optical fibers. These methods are subsequently tested and their ability to estimate the spectrum are… ▽ More

    Submitted 7 October, 2014; v1 submitted 3 April, 2012; originally announced April 2012.

    Comments: Minor updates to IEEE Transactions on Information Theory, vol. 60, no. 7, pp. 4329--4345, July 2014

    Journal ref: IEEE Transactions on Information Theory, vol. 60, no. 7, pp. 4329--4345, July 2014

  39. A Two-Dimensional Signal Space for Intensity-Modulated Channels

    Authors: Johnny Karout, Gerhard Kramer, Frank R. Kschischang, Erik Agrell

    Abstract: A two-dimensional signal space for intensity- modulated channels is presented. Modulation formats using this signal space are designed to maximize the minimum distance between signal points while satisfying average and peak power constraints. The uncoded, high-signal-to-noise ratio, power and spectral efficiencies are compared to those of the best known formats. The new formats are simpler than ex… ▽ More

    Submitted 7 March, 2012; originally announced March 2012.

    Comments: Submitted to IEEE Communications Letters, Feb. 2012

    Journal ref: IEEE Communications Letters, vol. 16, no. 9, pp. 1361-1364, Sept. 2012

  40. Information Transmission using the Nonlinear Fourier Transform, Part I: Mathematical Tools

    Authors: Mansoor I. Yousefi, Frank R. Kschischang

    Abstract: The nonlinear Fourier transform (NFT), a powerful tool in soliton theory and exactly solvable models, is a method for solving integrable partial differential equations governing wave propagation in certain nonlinear media. The NFT decorrelates signal degrees-of-freedom in such models, in much the same way that the Fourier transform does for linear systems. In this three-part series of papers, this… ▽ More

    Submitted 7 October, 2014; v1 submitted 16 February, 2012; originally announced February 2012.

    Comments: This version contains minor updates of IEEE Transactions on Information Theory, vol. 60, no. 7, pp. 4312--4328, July 2014

    Journal ref: IEEE Transactions on Information Theory, vol. 60, no. 7, pp. 4312--4328, July 2014

  41. A Pragmatic Coded Modulation Scheme for High-Spectral-Efficiency Fiber-Optic Communications

    Authors: Benjamin P. Smith, Frank R. Kschischang

    Abstract: A pragmatic coded modulation system is presented that incorporates signal sha** and exploits the excellent performance and efficient high-speed decoding architecture of staircase codes. Reliable communication within 0.62 bits/s/Hz of the estimated capacity (per polarization) of a system with L=2000 km is provided by the proposed system, with an error floor below 1E-20. Also, it is shown that dig… ▽ More

    Submitted 19 January, 2012; originally announced January 2012.

    Comments: To appear in IEEE/OSA J. of Lightwave Technology

  42. Staircase Codes: FEC for 100 Gb/s OTN

    Authors: Benjamin P. Smith, Arash Farhood, Andrew Hunt, Frank R. Kschischang, John Lodge

    Abstract: Staircase codes, a new class of forward-error-correction (FEC) codes suitable for high-speed optical communications, are introduced. An ITU-T G.709-compatible staircase code with rate R=239/255 is proposed, and FPGA-based simulation results are presented, exhibiting a net coding gain (NCG) of 9.41 dB at an output error rate of 1E-15, an improvement of 0.42 dB relative to the best code from the ITU… ▽ More

    Submitted 19 January, 2012; originally announced January 2012.

    Comments: To appear in IEEE/OSA J. of Lightwave Technology

  43. arXiv:1112.2892  [pdf, ps, other

    cs.IT

    A Constrained Coding Approach to Error-Free Half-Duplex Relay Networks

    Authors: Frank R. Kschischang, Tobias Lutz

    Abstract: We show that the broadcast capacity of an infinite-depth tree-structured network of error-free half-duplex-constrained relays can be achieved using constrained coding at the source and symbol forwarding at the relays.

    Submitted 14 June, 2013; v1 submitted 13 December, 2011; originally announced December 2011.

    Comments: To appear in IEEE Transactions on Information Theory, 2013

  44. arXiv:1108.1695  [pdf, ps, other

    cs.IT

    Algebraic Approach to Physical-Layer Network Coding

    Authors: Chen Feng, Danilo Silva, Frank R. Kschischang

    Abstract: The problem of designing physical-layer network coding (PNC) schemes via nested lattices is considered. Building on the compute-and-forward (C&F) relaying strategy of Nazer and Gastpar, who demonstrated its asymptotic gain using information-theoretic tools, an algebraic approach is taken to show its potential in practical, non-asymptotic, settings. A general framework is developed for studying nes… ▽ More

    Submitted 3 July, 2013; v1 submitted 8 August, 2011; originally announced August 2011.

    Comments: Submitted to IEEE Transactions on Information Theory, July 21, 2011. Revised version submitted Sept. 17, 2012. Final version submitted July 3, 2013

  45. An Algebraic Approach to Physical-Layer Network Coding

    Authors: Chen Feng, Danilo Silva, Frank R. Kschischang

    Abstract: The problem of designing new physical-layer network coding (PNC) schemes via lattice partitions is considered. Building on a recent work by Nazer and Gastpar, who demonstrated its asymptotic gain using information-theoretic tools, we take an algebraic approach to show its potential in non-asymptotic settings. We first relate Nazer-Gastpar's approach to the fundamental theorem of finitely generated… ▽ More

    Submitted 14 May, 2010; originally announced May 2010.

    Comments: 5 pages, 3 figures, accepted to IEEE Int. Symp. Information Theory, 2010

  46. Universal Secure Error-Correcting Schemes for Network Coding

    Authors: Danilo Silva, Frank R. Kschischang

    Abstract: This paper considers the problem of securing a linear network coding system against an adversary that is both an eavesdropper and a jammer. The network is assumed to transport n packets from source to each receiver, and the adversary is allowed to eavesdrop on μarbitrarily chosen links and also to inject up to t erroneous packets into the network. The goal of the system is to achieve zero-error… ▽ More

    Submitted 19 January, 2010; originally announced January 2010.

    Comments: 5 pages, submitted to IEEE ISIT 2010

  47. Sparse Network Coding with Overlap** Classes

    Authors: Danilo Silva, Weifei Zeng, Frank R. Kschischang

    Abstract: This paper presents a novel approach to network coding for distribution of large files. Instead of the usual approach of splitting packets into disjoint classes (also known as generations) we propose the use of overlap** classes. The overlap** allows the decoder to alternate between Gaussian elimination and back substitution, simultaneously boosting the performance and reducing the decoding… ▽ More

    Submitted 17 May, 2009; originally announced May 2009.

    Comments: 15 pages, 5 figures, to be published at NetCod 2009

  48. arXiv:0904.0813  [pdf, ps, other

    cs.IT

    Projective Space Codes for the Injection Metric

    Authors: Azadeh Khaleghi, Frank R. Kschischang

    Abstract: In the context of error control in random linear network coding, it is useful to construct codes that comprise well-separated collections of subspaces of a vector space over a finite field. In this paper, the metric used is the so-called "injection distance", introduced by Silva and Kschischang. A Gilbert-Varshamov bound for such codes is derived. Using the code-construction framework of Etzion… ▽ More

    Submitted 8 April, 2009; v1 submitted 5 April, 2009; originally announced April 2009.

  49. Fast Encoding and Decoding of Gabidulin Codes

    Authors: Danilo Silva, Frank R. Kschischang

    Abstract: Gabidulin codes are the rank-metric analogs of Reed-Solomon codes and have a major role in practical error control for network coding. This paper presents new encoding and decoding algorithms for Gabidulin codes based on low-complexity normal bases. In addition, a new decoding algorithm is proposed based on a transform-domain approach. Together, these represent the fastest known algorithms for e… ▽ More

    Submitted 5 April, 2009; v1 submitted 16 January, 2009; originally announced January 2009.

    Comments: 5 pages, 1 figure, to be published at ISIT 2009

  50. Robust Network Coding in the Presence of Untrusted Nodes

    Authors: Da Wang, Danilo Silva, Frank R. Kschischang

    Abstract: While network coding can be an efficient means of information dissemination in networks, it is highly susceptible to "pollution attacks," as the injection of even a single erroneous packet has the potential to corrupt each and every packet received by a given destination. Even when suitable error-control coding is applied, an adversary can, in many interesting practical situations, overwhelm the e… ▽ More

    Submitted 26 April, 2010; v1 submitted 21 November, 2008; originally announced November 2008.

    Comments: 7 pages, 4 figures, to be published at the IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 56, no. 9, pp. 4532-4538, Sep. 2010