Skip to main content

Showing 1–11 of 11 results for author: Tolhuizen, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2202.07541  [pdf, other

    cs.IT

    Coding and Bounds for Partially Defective Memory Cells

    Authors: Haider Al Kim, Sven Puchinger, Ludo Tolhuizen, Antonia Wachter-Zeh

    Abstract: This paper considers coding for so-called partially stuck (defect) memory cells. Such memory cells can only store partial information as some of their levels cannot be used fully due to, e.g., wearout. First, we present new constructions that are able to mask $u$ partially stuck cells while correcting at the same time $t$ random errors. The process of "masking" determines a word whose entries coin… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

    Comments: 18 pages, 9 Figures, 5 tables, and has been submitted to IEEE Transactions on Information Theory

  2. arXiv:1806.05427  [pdf, ps, other

    cs.IT

    Maximum weight spectrum codes with reduced length

    Authors: Gerard D Cohen, Ludo Tolhuizen

    Abstract: A q-ary linear code of dimension k is called a maximum weight spectrum (MWS) code if it has the maximum possible number (viz. (q^k-1)/(q-1)) of different non-zero weights. We construct MWS codes from quasi-minimal codes, thus obtaining of much shorter length than hitherto known. By an averaging argument, we show the existence of MWS codes of even shorter length.

    Submitted 14 June, 2018; originally announced June 2018.

    Comments: The second author dedicates this manuscript to the memory of Gerard Cohen, who sadly passed away during its preparation

  3. arXiv:1801.07561  [pdf, ps, other

    cs.CR math.NT

    A Multi-layer Recursive Residue Number System

    Authors: Henk D. L. Hollmann, Ronald Rietman, Sebastiaan de Hoogh, Ludo M. G. M. Tolhuizen, Paul Gorissen

    Abstract: We present a method to increase the dynamical range of a Residue Number System (RNS) by adding virtual RNS layers on top of the original RNS, where the required modular arithmetic for a modulus on any non-bottom layer is implemented by means of an RNS Montgomery multiplication algorithm that uses the RNS on the layer below. As a result, the actual arithmetic is deferred to the bottom layer. The mu… ▽ More

    Submitted 15 January, 2018; originally announced January 2018.

  4. arXiv:1401.7532  [pdf, other

    math.RA cs.CR cs.SC math.NT

    The MMO problem

    Authors: Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gomez, Jaime Gutierrez

    Abstract: We consider a two polynomials analogue of the polynomial interpolation problem. Namely, we consider the Mixing Modular Operations (MMO) problem of recovering two polynomials $f\in \Z_p[x]$ and $g\in \Z_q[x]$ of known degree, where $p$ and $q$ are two (un)known positive integers, from the values of $f(t)\bmod p + g(t)\bmod q$ at polynomially many points $t \in \Z$. We show that if $p$ and $q$ are k… ▽ More

    Submitted 29 January, 2014; originally announced January 2014.

    Comments: Submitted to Interantaional Symposium on Symbolic and Algebraic Computation (ISSAC) 2014

  5. arXiv:1401.1331  [pdf, other

    math.NT cs.CR cs.DS

    Interpolation and Approximation of Polynomials in Finite Fields over a Short Interval from Noisy Values

    Authors: Oscar Garcia-Morchon, Ronald Rietman, Igor E. Shparlinski, Ludo Tolhuizen

    Abstract: Motivated by a recently introduced HIMMO key distribution scheme, we consider a modification of the noisy polynomial interpolation problem of recovering an unknown polynomial $f(X) \in Z[X]$ from approximate values of the residues of $f(t)$ modulo a prime $p$ at polynomially many points $t$ taken from a short interval.

    Submitted 7 January, 2014; originally announced January 2014.

  6. arXiv:1106.6206  [pdf, ps, other

    cs.IT

    A generalisation of the Gilbert-Varshamov bound and its asymptotic evaluation

    Authors: Ludo Tolhuizen

    Abstract: The Gilbert-Varshamov (GV) lower bound on the maximum cardinality of a q-ary code of length n with minimum Hamming distance at least d can be obtained by application of Turan's theorem to the graph with vertex set {0,1,..,q-1}^n in which two vertices are joined if and only if their Hamming distance is at least d. We generalize the GV bound by applying Turan's theorem to the graph with vertex set C… ▽ More

    Submitted 30 June, 2011; originally announced June 2011.

    Comments: To be presented at 3ICMCTA, the 3rd International Castle Meeting on Coding Theory and Applications, Sept. 11-15, 2011

  7. arXiv:1004.1511  [pdf, ps, other

    cs.IT

    Bounds for codes for a non-symmetric ternary channel

    Authors: Ludo Tolhuizen

    Abstract: We provide bounds for codes for a non-symmetric channel or, equivalently, for ternary codes with the Manhattan distance.

    Submitted 9 April, 2010; originally announced April 2010.

    Comments: To be presented at 31st WIC Symposium on Information Theory in the Benelux, Rotterdam, the Netherlands, May 11-12, 2010

  8. arXiv:0712.2182  [pdf, ps, other

    cs.IT

    Optimal codes for correcting a single (wrap-around) burst of errors

    Authors: Henk D. L. Hollmann, Ludo M. G. M. Tolhuizen

    Abstract: In 2007, Martinian and Trott presented codes for correcting a burst of erasures with a minimum decoding delay. Their construction employs [n,k] codes that can correct any burst of erasures (including wrap-around bursts) of length n-k. The raised the question if such [n,k] codes exist for all integers k and n with 1<= k <= n and all fields (in particular, for the binary field). In this note, we a… ▽ More

    Submitted 13 December, 2007; originally announced December 2007.

    Comments: 10 pages; submitted to IEEE Transactions on Information Theory

  9. arXiv:cs/0607132  [pdf, ps, other

    cs.IT

    On q-ary codes correcting all unidirectional errors of a limited magnitude

    Authors: R. Ahlswede, H. Aydinian, L. H. Khachatrian, L. M. G. M. Tolhuizen

    Abstract: We consider codes over the alphabet Q={0,1,..,q-1}intended for the control of unidirectional errors of level l. That is, the transmission channel is such that the received word cannot contain both a component larger than the transmitted one and a component smaller than the transmitted one. Moreover, the absolute value of the difference between a transmitted component and its received version is… ▽ More

    Submitted 27 July, 2006; originally announced July 2006.

    Comments: 22 pages,no figures. Accepted for publication of Journal of Armenian Academy of Sciences, special issue dedicated to Rom Varshamov

  10. arXiv:cs/0606026  [pdf, ps, other

    cs.IT

    Generating parity check equations for bounded-distance iterative erasure decoding

    Authors: Henk D. L. Hollmann, Ludo M. G. M. Tolhuizen

    Abstract: A generic $(r,m)$-erasure correcting set is a collection of vectors in $\bF_2^r$ which can be used to generate, for each binary linear code of codimension $r$, a collection of parity check equations that enables iterative decoding of all correctable erasure patterns of size at most $m$. That is to say, the only stop** sets of size at most $m$ for the generated parity check equations are the… ▽ More

    Submitted 6 June, 2006; originally announced June 2006.

    Comments: Accepted for publication in Proc Int Symposium on Information Theory 2006, ISIT 06

  11. On parity check collections for iterative erasure decoding that correct all correctable erasure patterns of a given size

    Authors: Henk D. L. Hollmann, Ludo M. G. M. Tolhuizen

    Abstract: Recently there has been interest in the construction of small parity check sets for iterative decoding of the Hamming code with the property that each uncorrectable (or stop**) set of size three is the support of a codeword and hence uncorrectable anyway. Here we reformulate and generalise the problem, and improve on this construction. First we show that a parity check collection that corrects… ▽ More

    Submitted 28 July, 2005; originally announced July 2005.

    Comments: 13 pages, no figures. Submitted to IEEE Transactions on Information Theory, July 28, 2005

    Report number: PR-MS 25.332