Skip to main content

Showing 1–8 of 8 results for author: Singhvi, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.02705  [pdf, other

    cs.IT

    Peak Age of Information under Tandem of Queues

    Authors: Ashirwad Sinha, Shubhransh Singhvi, Praful D. Mankar, Harpreet S. Dhillon

    Abstract: This paper considers a communication system where a source sends time-sensitive information to its destination via queues in tandem. We assume that the arrival process as well as the service process (of each server) are memoryless, and each of the servers has no buffer. For this setup, we develop a recursive framework to characterize the mean peak age of information (PAoI) under preemptive and non… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: Accepted at IEEE ISIT'24

  2. arXiv:2403.15827  [pdf, ps, other

    cs.IT

    Permutation Recovery Problem against Deletion Errors for DNA Data Storage

    Authors: Shubhransh Singhvi, Charchit Gupta, Avital Boruchovsky, Yuval Goldberg, Han Mao Kiah, Eitan Yaakobi

    Abstract: Owing to its immense storage density and durability, DNA has emerged as a promising storage medium. However, due to technological constraints, data can only be written onto many short DNA molecules called data blocks that are stored in an unordered way. To handle the unordered nature of DNA data storage systems, a unique address is typically prepended to each data block to form a DNA strand. Howev… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.04597

  3. arXiv:2403.07754  [pdf, other

    cs.IT

    An Optimal Sequence Reconstruction Algorithm for Reed-Solomon Codes

    Authors: Shubhransh Singhvi, Roni Con, Han Mao Kiah, Eitan Yaakobi

    Abstract: The sequence reconstruction problem, introduced by Levenshtein in 2001, considers a scenario where the sender transmits a codeword from some codebook, and the receiver obtains $N$ noisy outputs of the codeword. We study the problem of efficient reconstruction using $N$ outputs that are each corrupted by at most $t$ substitutions. Specifically, for the ubiquitous Reed-Solomon codes, we adapt the Ko… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: Submitted to IEEE ISIT 2024

  4. arXiv:2305.04597  [pdf, other

    cs.IT

    Data-Driven Bee Identification for DNA Strands

    Authors: Shubhransh Singhvi, Avital Boruchovsky, Han Mao Kiah, Eitan Yaakobi

    Abstract: We study a data-driven approach to the bee identification problem for DNA strands. The bee-identification problem, introduced by Tandon et al. (2019), requires one to identify $M$ bees, each tagged by a unique barcode, via a set of $M$ noisy measurements. Later, Chrisnata et al. (2022) extended the model to case where one observes $N$ noisy measurements of each bee, and applied the model to addres… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

    Comments: Conference paper accepted at ISIT 2023

  5. arXiv:2305.03442  [pdf, other

    cs.IT

    Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes

    Authors: Stanislav Kruglik, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling, Huaxiong Wang

    Abstract: We consider the repair scheme of Guruswami-Wootters for the Reed-Solomon code and ask: can we correctly repair a failed node in the presence of erroneous nodes? Equivalently, we consider the collection of downloaded traces as a code and investigate its code-distance properties. We propose three lower bounds on its minimum distance and study methods to efficiently correct errors close to these boun… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

    Comments: Accepted to IEEE International Symposium on Information Theory 2023

  6. arXiv:2212.11489  [pdf, other

    cs.IT

    Coding Gain for Age of Information in a Multi-source System with Erasure Channel

    Authors: Shubhransh Singhvi, Praful D. Mankar

    Abstract: In our work, we study the age of information ($\AoI$) in a multi-source system where $K$ sources transmit updates of their time-varying processes via a common-aggregator node to a destination node through a channel with packet delivery errors. We analyze $\AoI$ for an $(α, β, ε_0, ε_1)$-Gilbert-Elliot ($\GE$) packet erasure channel with a round-robin scheduling policy. We employ maximum distance s… ▽ More

    Submitted 22 April, 2023; v1 submitted 22 December, 2022; originally announced December 2022.

    Comments: Accepted at IEEE-ITW 2023

  7. arXiv:2207.04025  [pdf, ps, other

    cs.IT

    Rate-Optimal Streaming Codes Over the Three-Node Decode-And-Forward Relay Network

    Authors: Shubhransh Singhvi, Gayathri R., P. Vijay Kumar

    Abstract: In this paper, we study the three-node Decode-and-Forward (D&F) relay network subject to random and burst packet erasures. The source wishes to transmit an infinite stream of packets to the destination via the relay. The three-node D&F relay network is constrained by a decoding delay of T packets, i.e., the packet transmitted by the source at time i must be decoded by the destination by time i+T.… ▽ More

    Submitted 29 November, 2022; v1 submitted 8 July, 2022; originally announced July 2022.

    Comments: Published at ISIT 2022

  8. arXiv:2202.03024  [pdf, other

    cs.IT

    The Input and Output Entropies of the $k$-Deletion/Insertion Channel

    Authors: Shubhransh Singhvi, Omer Sabary, Daniella Bar-Lev, Eitan Yaakobi

    Abstract: The channel output entropy of a transmitted word is the entropy of the possible channel outputs and similarly, the input entropy of a received word is the entropy of all possible transmitted words. The goal of this work is to study these entropy values for the k-deletion, k-insertion channel, where exactly k symbols are deleted, and inserted in the transmitted word, respectively. If all possible w… ▽ More

    Submitted 15 June, 2022; v1 submitted 7 February, 2022; originally announced February 2022.