Skip to main content

Showing 1–11 of 11 results for author: Wolf, J K

Searching in archive cs. Search in all archives.
.
  1. On the Capacity of Channels with Timing Synchronization Errors

    Authors: Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf

    Abstract: We consider a new formulation of a class of synchronization error channels and derive analytical bounds and numerical estimates for the capacity of these channels. For the binary channel with only deletions, we obtain an expression for the symmetric information rate in terms of subsequence weights which reduces to a tight lower bound for small deletion probabilities. We are also able to exactly ch… ▽ More

    Submitted 2 October, 2015; v1 submitted 12 February, 2013; originally announced February 2013.

    Comments: 23 pages, 5 figures, submitted to the IEEE Transactions on Information Theory, Feb 2013. Summary of some results presented at ISIT 2011 (http://arxiv.longhoe.net/abs/1106.0070) Revised Feb 2015

  2. arXiv:1210.7515  [pdf, ps, other

    cs.IT

    Rewriting Codes for Flash Memories

    Authors: Eitan Yaakobi, Hessam Mahdavifar, Paul H. Siegel, Alexander Vardy, Jack K. Wolf

    Abstract: Flash memory is a non-volatile computer memory comprising blocks of cells, wherein each cell can take on q different values or levels. While increasing the cell level is easy, reducing the level of a cell can be accomplished only by erasing an entire block. Since block erasures are highly undesirable, coding schemes - known as floating codes (or flash codes) and buffer codes - have been designed i… ▽ More

    Submitted 28 October, 2012; originally announced October 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:0905.1512

  3. arXiv:1106.0075  [pdf, other

    cs.IT

    Windowed Decoding of Spatially Coupled Codes

    Authors: Aravind R. Iyengar, Paul H. Siegel, Rudiger L. Urbanke, Jack K. Wolf

    Abstract: Spatially coupled codes have been of interest recently owing to their superior performance over memoryless binary-input channels. The performance is good both asymptotically, since the belief propagation thresholds approach capacity, as well as for finite lengths, since degree-2 variables that result in high error floors can be completely avoided. However, to realize the promised good performance,… ▽ More

    Submitted 30 November, 2012; v1 submitted 31 May, 2011; originally announced June 2011.

    Comments: Accepted for publication in the IEEE Transactions on Information Theory, November 2012. Summary presented at ISIT 2011 <http://arxiv.longhoe.net/abs/1106.0075v1>

  4. arXiv:1106.0070  [pdf, other

    cs.IT

    Modeling and Information Rates for Synchronization Error Channels

    Authors: Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf

    Abstract: We propose a new channel model for channels with synchronization errors. Using this model, we give simple, non-trivial and, in some cases, tight lower bounds on the capacity for certain synchronization error channels.

    Submitted 31 May, 2011; originally announced June 2011.

    Comments: 5 pages, 1 figure, to be presented at ISIT 2011

  5. Write Channel Model for Bit-Patterned Media Recording

    Authors: Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf

    Abstract: We propose a new write channel model for bit-patterned media recording that reflects the data dependence of write synchronization errors. It is shown that this model accommodates both substitution-like errors and insertion-deletion errors whose statistics are determined by an underlying channel state process. We study information theoretic properties of the write channel model, including the capac… ▽ More

    Submitted 21 October, 2010; originally announced October 2010.

    Comments: 11 pages, 12 figures, journal

  6. arXiv:0911.3992  [pdf, ps, other

    cs.IT

    Storage Coding for Wear Leveling in Flash Memories

    Authors: Anxiao, Jiang, Robert Mateescu, Eitan Yaakobi, Jehoshua Bruck, Paul H. Siegel, Alexander Vardy, Jack K. Wolf

    Abstract: Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell is implemented as either NAND or NOR floating gate. NAND flash is currently the most widely used type of flash memory. In a NAND flash memory, every block of cells consists of numerous pages; rewriting even a single page requires the whole block to be erased and reprogrammed. Block erasures determine b… ▽ More

    Submitted 20 November, 2009; originally announced November 2009.

  7. arXiv:0905.1512  [pdf, ps, other

    cs.IT

    A Nearly Optimal Construction of Flash Codes

    Authors: Hessam Mahdavifar, Paul H. Siegel, Alexander Vardy, Jack K. Wolf, Eitan Yaakobi

    Abstract: Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell can take on q different values or levels. While increasing the cell level is easy, reducing the level of a cell can be accomplished only by erasing an entire block. Since block erasures are highly undesirable, coding schemes - known as floating codes or flash codes - have been designed in order to maxi… ▽ More

    Submitted 10 May, 2009; originally announced May 2009.

  8. arXiv:0901.0702  [pdf, other

    cs.IT

    Multidimensional Flash Codes

    Authors: Eitan Yaakobi, Alexander Vardy, Paul H. Siegel, Jack K. Wolf

    Abstract: Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell can take on q different levels corresponding to the number of electrons it contains. Increasing the cell level is easy; however, reducing a cell level forces all the other cells in the same block to be erased. This erasing operation is undesirable and therefore has to be used as infrequently as possibl… ▽ More

    Submitted 3 April, 2009; v1 submitted 6 January, 2009; originally announced January 2009.

  9. Gaussian Belief Propagation Solver for Systems of Linear Equations

    Authors: Ori Shental, Paul H. Siegel, Jack K. Wolf, Danny Bickson, Danny Dolev

    Abstract: The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we develop a solution based upon Gaussian belief propagation (GaBP) that does not involve direct matrix inversion. The iterative nature of our approach allows for a distributed message-passing implementation of the soluti… ▽ More

    Submitted 9 October, 2008; originally announced October 2008.

    Comments: 5 pages, 2 figures, appeared in the 2008 IEEE International Symposium on Information Theory, Toronto, July 2008

    ACM Class: E.5

    Journal ref: The 2008 IEEE International Symposium on Information Theory (ISIT 2008), Toronto, July 2008

  10. Gaussian Belief Propagation Based Multiuser Detection

    Authors: Danny Bickson, Danny Dolev, Ori Shental, Paul H. Siegel, Jack K. Wolf

    Abstract: In this work, we present a novel construction for solving the linear multiuser detection problem using the Gaussian Belief Propagation algorithm. Our algorithm yields an efficient, iterative and distributed implementation of the MMSE detector. We compare our algorithm's performance to a recent result and show an improved memory consumption, reduced computation steps and a reduction in the number… ▽ More

    Submitted 9 October, 2008; originally announced October 2008.

    Comments: 6 pages, 1 figures, appeared in the 2008 IEEE International Symposium on Information Theory, Toronto, July 2008

    ACM Class: E.5

    Journal ref: The 2008 IEEE International Symposium on Information Theory (ISIT 2008), Toronto, July 2008

  11. arXiv:0810.1119  [pdf, ps, other

    cs.IT

    Gaussian Belief Propagation for Solving Systems of Linear Equations: Theory and Application

    Authors: Ori Shental, Danny Bickson, Paul H. Siegel, Jack K. Wolf, Danny Dolev

    Abstract: The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we develop a solution based upon Gaussian belief propagation (GaBP) that does not involve direct matrix inversion. The iterative nature of our approach allows for a distributed message-passing implementation of the soluti… ▽ More

    Submitted 7 October, 2008; originally announced October 2008.

    Comments: Submitted to IEEE Transactions on Information Theory

    ACM Class: E.4