Skip to main content

Showing 1–25 of 25 results for author: Tal, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.16833  [pdf, ps, other

    cs.IT

    Strong Polarization for Shortened and Punctured Polar Codes

    Authors: Boaz Shuval, Ido Tal

    Abstract: Polar codes were originally specified for codelengths that are powers of two. In many applications, it is desired to have a code that is not restricted to such lengths. Two common strategies of modifying the length of a code are shortening and puncturing. Simple and explicit schemes for shortening and puncturing were introduced by Wang and Liu, and by Niu, Chen, and Lin, respectively. In this pape… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: Submitted to ISIT 2024

  2. arXiv:2305.10155  [pdf, ps, other

    cs.IT

    Stronger Polarization for the Deletion Channel

    Authors: Dar Arava, Ido Tal

    Abstract: In this paper we show a polar coding scheme for the deletion channel with a probability of error that decays roughly like $2^{-\sqrtΛ}$, where $Λ$ is the length of the codeword. That is, the same decay rate as that of seminal polar codes for memoryless channels. This is stronger than prior art in which the square root is replaced by a cube root. Our coding scheme is similar yet distinct from prior… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

    Comments: Accepted for presentation at the IEEE International Symposium on Information Theory (ISIT'2023), Taipei, Taiwan, 2023. Includes a 5-page appendix

  3. QFT: Post-training quantization via fast joint finetuning of all degrees of freedom

    Authors: Alex Finkelstein, Ella Fuchs, Idan Tal, Mark Grobman, Niv Vosco, Eldad Meller

    Abstract: The post-training quantization (PTQ) challenge of bringing quantized neural net accuracy close to original has drawn much attention driven by industry demand. Many of the methods emphasize optimization of a specific degree-of-freedom (DoF), such as quantization step size, preconditioning factors, bias fixing, often chained to others in multi-step solutions. Here we rethink quantized network parame… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

    Comments: Presented at CADL2022 workshop at ECCV2022

    Journal ref: Computer Vision - {ECCV} 2022 Workshops - Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part {VII}

  4. arXiv:2102.02155  [pdf, ps, other

    cs.IT

    Polar Codes for Channels with Insertions, Deletions, and Substitutions

    Authors: Henry D. Pfister, Ido Tal

    Abstract: This paper presents a coding scheme for an insertion deletion substitution channel. We extend a previous scheme for the deletion channel where polar codes are modified by adding "guard bands" between segments. In the new scheme, each guard band is comprised of a middle segment of '1' symbols, and left and right segments of '0' symbols. Our coding scheme allows for a regular hidden-Markov input dis… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: Submitted to ISIT 2021

  5. arXiv:2004.00869  [pdf, other

    cs.IT

    An Upgrading Algorithm with Optimal Power Law

    Authors: Or Ordentlich, Ido Tal

    Abstract: Consider a channel $W$ along with a given input distribution $P_X$. In certain settings, such as in the construction of polar codes, the output alphabet of $W$ is `too large', and hence we replace $W$ by a channel $Q$ having a smaller output alphabet. We say that $Q$ is upgraded with respect to $W$ if $W$ is obtained from $Q$ by processing its output. In this case, the mutual information… ▽ More

    Submitted 28 May, 2021; v1 submitted 2 April, 2020; originally announced April 2020.

  6. arXiv:2001.03784  [pdf, ps, other

    cs.IT

    List Decoding of Universal Polar Codes

    Authors: Boaz Shuval, Ido Tal

    Abstract: A list decoding scheme for universal polar codes is presented. Our scheme applies to the universal polar codes first introduced by Sasoglu and Wang, and generalized to processes with memory by the authors. These codes are based on the concatenation of different polar transforms: a sequence of "slow" transforms and Arikan's original "fast" transform. List decoding of polar codes has been previously… ▽ More

    Submitted 11 January, 2020; originally announced January 2020.

    Comments: Submitted to ISIT 2020

  7. arXiv:1904.13385  [pdf, ps, other

    cs.IT

    Polar Codes for the Deletion Channel: Weak and Strong Polarization

    Authors: Ido Tal, Henry D. Pfister, Arman Fazeli, Alexander Vardy

    Abstract: This paper presents the first proof of polarization for the deletion channel with a constant deletion rate and a regular hidden-Markov input distribution. A key part of this work involves representing the deletion channel using a trellis and describing the plus and minus polar-decoding operations on that trellis. In particular, the plus and minus operations can be seen as combining adjacent trelli… ▽ More

    Submitted 23 July, 2020; v1 submitted 30 April, 2019; originally announced April 2019.

    Comments: Submitted to the IEEE Transactions on Information Theory. Presented in part at ISIT 2019

  8. arXiv:1811.05727  [pdf, ps, other

    cs.IT

    Universal Polarization for Processes with Memory

    Authors: Boaz Shuval, Ido Tal

    Abstract: A transform that is universally polarizing over a set of channels with memory is presented. Memory may be present in both the input to the channel and the channel itself. Both the encoder and the decoder are aware of the input distribution, which is fixed. However, only the decoder is aware of the actual channel being used. The transform can be used to design a universal code for this scenario. Th… ▽ More

    Submitted 30 December, 2018; v1 submitted 14 November, 2018; originally announced November 2018.

    Comments: 41 pages, 12 figures, Submitted to IEEE transactions on Information Theory

  9. arXiv:1710.02849  [pdf, ps, other

    cs.IT

    Fast Polarization for Processes with Memory

    Authors: Boaz Shuval, Ido Tal

    Abstract: Fast polarization is crucial for the performance guarantees of polar codes. In the memoryless setting, the rate of polarization is known to be exponential in the square root of the block length. A complete characterization of the rate of polarization for models with memory has been missing. Namely, previous works have not addressed fast polarization of the high entropy set under memory. We conside… ▽ More

    Submitted 15 August, 2018; v1 submitted 8 October, 2017; originally announced October 2017.

    Comments: 17 pages, 3 figures. Submitted to IEEE Transactions on Information Theory

  10. arXiv:1704.07179  [pdf, ps, other

    cs.IT

    A Simple Proof of Fast Polarization

    Authors: Ido Tal

    Abstract: Fast polarization is an important and useful property of polar codes. It was proved for the binary polarizing $2 \times 2$ kernel by Arikan and Telatar. The proof was later generalized by Sasoglu. We give a simplified proof.

    Submitted 24 April, 2017; originally announced April 2017.

  11. arXiv:1703.04923  [pdf, other

    cs.IT

    Greedy-Merge Degrading has Optimal Power-Law

    Authors: Assaf Kartowsky, Ido Tal

    Abstract: Consider a channel with a given input alphabet size and a given input distribution. Our aim is to degrade or upgrade it to a channel with at most L output letters. The paper contains four main results. The first result, from which the paper title is derived, deals with the so called "greedy-merge" algorithm. We derive an upper bound on the reduction in mutual information between input and output… ▽ More

    Submitted 15 March, 2017; originally announced March 2017.

    Comments: 17 pages, 4 figures, 1 table, to be submitted to IEEE Transactions on Information Theory

  12. arXiv:1701.02119  [pdf, ps, other

    cs.IT

    Greedy-Merge Degrading has Optimal Power-Law

    Authors: Assaf Kartowsky, Ido Tal

    Abstract: Consider a channel with a given input distribution. Our aim is to degrade it to a channel with at most L output letters. One such degradation method is the so called "greedy-merge" algorithm. We derive an upper bound on the reduction in mutual information between input and output. For fixed input alphabet size and variable L, the upper bound is within a constant factor of an algorithm-independent… ▽ More

    Submitted 6 May, 2017; v1 submitted 9 January, 2017; originally announced January 2017.

    Comments: 5 pages, submitted to ISIT 2017

  13. arXiv:1701.01628  [pdf, other

    cs.IT

    A Lower Bound on the Probability of Error of Polar Codes over BMS Channels

    Authors: Boaz Shuval, Ido Tal

    Abstract: Polar codes are a family of capacity-achieving codes that have explicit and low-complexity construction, encoding, and decoding algorithms. Decoding of polar codes is based on the successive-cancellation decoder, which decodes in a bit- wise manner. A decoding error occurs when at least one bit is erroneously decoded. The various codeword bits are correlated, yet performance analysis of polar code… ▽ More

    Submitted 4 March, 2018; v1 submitted 6 January, 2017; originally announced January 2017.

    Comments: 25 pages, 6 figures. Submitted to IEEE Transactions on Information Theory. (An abbreviated version appeared in ISIT 2017)

  14. arXiv:1602.01870  [pdf, other

    cs.IT

    Polar Coding for Processes with Memory

    Authors: Eren Sasoglu, Ido Tal

    Abstract: We study polar coding for stochastic processes with memory. For example, a process may be defined by the joint distribution of the input and output of a channel. The memory may be present in the channel, the input, or both. We show that $ψ$-mixing processes polarize under the standard Arıkan transform, under a mild condition. We further show that the rate of polarization of the \emph{low-entropy}… ▽ More

    Submitted 15 August, 2018; v1 submitted 4 February, 2016; originally announced February 2016.

    Comments: Submitted to IEEE Transactions on Information Theory

  15. Flexible and Low-Complexity Encoding and Decoding of Systematic Polar Codes

    Authors: Gabi Sarkis, Ido Tal, Pascal Giard, Alexander Vardy, Claude Thibeault, Warren J. Gross

    Abstract: In this work, we present hardware and software implementations of flexible polar systematic encoders and decoders. The proposed implementations operate on polar codes of any length less than a maximum and of any rate. We describe the low-complexity, highly parallel, and flexible systematic-encoding algorithm that we use and prove its correctness. Our hardware implementation results show that the o… ▽ More

    Submitted 23 February, 2016; v1 submitted 13 July, 2015; originally announced July 2015.

    Comments: Submitted to IEEE Transactions on Communications, 2015

  16. arXiv:1506.08370  [pdf, ps, other

    cs.IT

    On the Construction of Polar Codes for Channels with Moderate Input Alphabet Sizes

    Authors: Ido Tal

    Abstract: Current deterministic algorithms for the construction of polar codes can only be argued to be practical for channels with small input alphabet sizes. In this paper, we show that any construction algorithm for channels with moderate input alphabet size which follows the paradigm of "degrading after each polarization step" will inherently be impractical with respect to a certain "hard" underlying ch… ▽ More

    Submitted 28 June, 2015; originally announced June 2015.

    Comments: 9 pages

  17. arXiv:1308.5793  [pdf, other

    cs.IT

    Channel Upgradation for Non-Binary Input Alphabets and MACs

    Authors: Uzi Pereg, Ido Tal

    Abstract: Consider a single-user or multiple-access channel with a large output alphabet. A method to approximate the channel by an upgraded version having a smaller output alphabet is presented and analyzed. The original channel is not necessarily symmetric and does not necessarily have a binary input alphabet. Also, the input distribution is not necessarily uniform. The approximation method is instrumenta… ▽ More

    Submitted 27 June, 2015; v1 submitted 27 August, 2013; originally announced August 2013.

    Comments: 18 pages, 2 figures

  18. arXiv:1209.4444  [pdf, ps, other

    cs.IT

    On the Construction of Polar Codes

    Authors: Ramtin Pedarsani, S. Hamed Hassani, Ido Tal, Emre Telatar

    Abstract: We consider the problem of efficiently constructing polar codes over binary memoryless symmetric (BMS) channels. The complexity of designing polar codes via an exact evaluation of the polarized channels to find which ones are "good" appears to be exponential in the block length. In \cite{TV11}, Tal and Vardy show that if instead the evaluation if performed approximately, the construction has only… ▽ More

    Submitted 20 September, 2012; originally announced September 2012.

    Comments: In ISIT 2011

  19. arXiv:1206.0050  [pdf, other

    cs.IT

    List Decoding of Polar Codes

    Authors: Ido Tal, Alexander Vardy

    Abstract: We describe a successive-cancellation \emph{list} decoder for polar codes, which is a generalization of the classic successive-cancellation decoder of Arıkan. In the proposed list decoder, up to $L$ decoding paths are considered concurrently at each decoding stage. Then, a single codeword is selected from the list as output. If the most likely codeword is selected, simulation results show that the… ▽ More

    Submitted 31 May, 2012; originally announced June 2012.

  20. arXiv:1111.4362  [pdf, ps, other

    cs.AR cs.IT

    Hardware Implementation of Successive Cancellation Decoders for Polar Codes

    Authors: Camille Leroux, Alexandre J. Raymond, Gabi Sarkis, Ido Tal, Alexander Vardy, Warren J. Gross

    Abstract: The recently-discovered polar codes are seen as a major breakthrough in coding theory; they provably achieve the theoretical capacity of discrete memoryless channels using the low complexity successive cancellation (SC) decoding algorithm. Motivated by recent developments in polar coding theory, we propose a family of efficient hardware implementations for SC polar decoders. We show that such deco… ▽ More

    Submitted 18 November, 2011; originally announced November 2011.

  21. arXiv:1105.6164  [pdf, other

    cs.IT

    How to Construct Polar Codes

    Authors: Ido Tal, Alexander Vardy

    Abstract: A method for efficiently constructing polar codes is presented and analyzed. Although polar codes are explicitly defined, straightforward construction is intractable since the resulting polar bit-channels have an output alphabet that grows exponentially with he code length. Thus the core problem that needs to be solved is that of faithfully approximating a bit-channel with an intractably large alp… ▽ More

    Submitted 10 April, 2013; v1 submitted 31 May, 2011; originally announced May 2011.

  22. arXiv:1011.2919  [pdf, ps, other

    cs.AR cs.IT

    Hardware architectures for Successive Cancellation Decoding of Polar Codes

    Authors: Camille Leroux, Ido Tal, Alexander Vardy, Warren J. Gross

    Abstract: The recently-discovered polar codes are widely seen as a major breakthrough in coding theory. These codes achieve the capacity of many important channels under successive cancellation decoding. Motivated by the rapid progress in the theory of polar codes, we propose a family of architectures for efficient hardware implementation of successive cancellation decoders. We show that such decoders can b… ▽ More

    Submitted 12 November, 2010; originally announced November 2010.

    Comments: Submitted to ICASSP 2011

  23. arXiv:0906.2372  [pdf, ps, other

    cs.IT

    Bounds on the Rate of 2-D Bit-Stuffing Encoders

    Authors: Ido Tal, Ron M. Roth

    Abstract: A method for bounding the rate of bit-stuffing encoders for 2-D constraints is presented. Instead of considering the original encoder, we consider a related one which is quasi-stationary. We use the quasi-stationary property in order to formulate linear requirements that must hold on the probabilities of the constrained arrays that are generated by the encoder. These requirements are used as par… ▽ More

    Submitted 12 June, 2009; originally announced June 2009.

  24. arXiv:0808.0596  [pdf, ps, other

    cs.IT

    On row-by-row coding for 2-D constraints

    Authors: Ido Tal, Tuvi Etzion, Ron M. Roth

    Abstract: A constant-rate encoder--decoder pair is presented for a fairly large family of two-dimensional (2-D) constraints. Encoding and decoding is done in a row-by-row manner, and is sliding-block decodable. Essentially, the 2-D constraint is turned into a set of independent and relatively simple one-dimensional (1-D) constraints; this is done by dividing the array into fixed-width vertical strips. E… ▽ More

    Submitted 5 August, 2008; originally announced August 2008.

  25. arXiv:0801.1126  [pdf, ps, other

    cs.IT

    Concave Programming Upper Bounds on the Capacity of 2-D Constraints

    Authors: Ido Tal, Ron M. Roth

    Abstract: The capacity of 1-D constraints is given by the entropy of a corresponding stationary maxentropic Markov chain. Namely, the entropy is maximized over a set of probability distributions, which is defined by some linear requirements. In this paper, certain aspects of this characterization are extended to 2-D constraints. The result is a method for calculating an upper bound on the capacity of 2-D… ▽ More

    Submitted 12 June, 2009; v1 submitted 7 January, 2008; originally announced January 2008.