Search Results - "Roth, Ron M."
-
1
Higher-Order MDS Codes
Published in IEEE transactions on information theory (01-12-2022)“…An improved Singleton-type upper bound is presented for the list decoding radius of linear codes, in terms of the code parameters <inline-formula> <tex-math…”
Get full text
Journal Article -
2
Corrections to “Analog Error-Correcting Codes”
Published in IEEE transactions on information theory (01-06-2023)“…In the above article [1] , Lemma 2 contained an error, which also affects the proof of Theorem 1 therein. Specifically, Theorem 1 holds only when [Formula…”
Get full text
Journal Article -
3
Error-Detection Schemes for Analog Content-Addressable Memories
Published in IEEE transactions on computers (01-07-2024)“…Analog content-addressable memories (in short, a-CAMs) have been recently introduced as accelerators for machine-learning tasks, such as tree-based inference…”
Get full text
Journal Article -
4
Asymptotic Bounds on the Rate of Locally Repairable Codes
Published in IEEE transactions on information theory (01-03-2022)“…New asymptotic upper bounds are presented on the rate of sequences of locally repairable codes (LRCs) with a prescribed relative minimum distance and locality…”
Get full text
Journal Article -
5
Analog Error-Correcting Codes
Published in IEEE transactions on information theory (01-07-2020)“…Coding schemes are presented that provide the ability to locate computational errors above a prescribed threshold while using analog resistive devices for…”
Get full text
Journal Article -
6
Construction of Sidon Spaces With Applications to Coding
Published in IEEE transactions on information theory (01-06-2018)“…A subspace of a finite extension field is called a Sidon space if the product of any two of its elements is unique up to a scalar multiplier from the base…”
Get full text
Journal Article -
7
Fault-Tolerant Dot-Product Engines
Published in IEEE transactions on information theory (01-04-2019)“…Coding schemes are presented that provide the ability to correct and detect computational errors while using dot-product engines for integer vector-matrix…”
Get full text
Journal Article -
8
Two-Dimensional Maximum-Likelihood Sequence Detection Is NP Hard
Published in IEEE transactions on information theory (01-12-2011)“…A 2-D version of the classical maximum-likelihood sequence detection (MLSD) problem is considered for a binary antipodal signal that is corrupted by linear…”
Get full text
Journal Article -
9
On Decoding Rank-Metric Codes Over Large Fields
Published in IEEE transactions on information theory (01-02-2018)“…A decoding algorithm is presented for a rank-metric array codes that are based on diagonal interleaving of maximum-distance separable codes. With respect to…”
Get full text
Journal Article -
10
On the Pointwise Threshold Behavior of the Binary Erasure Polarization Subchannels
Published in IEEE transactions on information theory (01-10-2019)“…It is shown that when Arıkan's <inline-formula> <tex-math notation="LaTeX">n </tex-math></inline-formula>-level polarization transformation is applied to the…”
Get full text
Journal Article -
11
On the Capacity of Generalized Ising Channels
Published in IEEE transactions on information theory (01-04-2017)“…Nearly tight lower and upper bounds on the capacity of generalized Ising channels are presented. For the case where feedback is allowed, a closed-form…”
Get full text
Journal Article -
12
On Spectral Design Methods for Quasi-Cyclic Codes
Published in IEEE transactions on information theory (01-05-2019)“…A method is provided for constructing upper triangular square matrices over the univariate polynomial ring over a finite field, under certain constraints on…”
Get full text
Journal Article -
13
On the Implementation of Boolean Functions on Content-Addressable Memories
Published in IEEE journal on selected areas in information theory (2023)“…Let <inline-formula> <tex-math notation="LaTeX">[q\rangle </tex-math></inline-formula> denote the integer set <inline-formula> <tex-math…”
Get full text
Journal Article -
14
Variable-Length Constrained Coding and Kraft Conditions: The Parity-Preserving Case
Published in IEEE transactions on information theory (01-09-2021)“…Previous work by the authors on parity-preserving fixed-length constrained encoders is extended to the variable-length case. Parity-preserving variable-length…”
Get full text
Journal Article -
15
On Bi-Modal Constrained Coding
Published in IEEE transactions on information theory (01-03-2021)“…Bi-modal (respectively, multi-modal) constrained coding refers to an encoding model whereby a user input block can be mapped to two (respectively, multiple)…”
Get full text
Journal Article -
16
Long Cyclic Codes Over GF(4) and GF(8) Better Than BCH Codes in the High-Rate Region
Published in IEEE transactions on information theory (01-01-2017)“…An explicit construction of an infinite family of cyclic codes is presented which, over GF(4) (resp., GF(8)), have approximately 8/9 (resp., 48/49) the…”
Get full text
Journal Article -
17
Coding for Combined Block-Symbol Error Correction
Published in IEEE transactions on information theory (01-05-2014)“…We design low-complexity error correction coding schemes for channels that introduce different types of errors and erasures: on the one hand, the proposed…”
Get full text
Journal Article -
18
Bounds and Constructions for Granular Media Coding
Published in IEEE transactions on information theory (01-04-2014)“…Bounds on the rates of grain-correcting codes are presented. The lower bounds are Gilbert-Varshamov-like ones, whereas the upper bounds improve on the…”
Get full text
Journal Article -
19
Burst List Decoding of Interleaved Reed-Solomon Codes
Published in IEEE transactions on information theory (01-01-2014)“…It is shown that interleaved Reed-Solomon codes can be list-decoded for burst errors while attaining the generalized Reiger bound for list decoding. A…”
Get full text
Journal Article -
20
Low Complexity Two-Dimensional Weight-Constrained Codes
Published in IEEE transactions on information theory (01-06-2012)“…Two low complexity coding techniques are described for mapping arbitrary data to and from m × n binary arrays in which the Hamming weight of each row…”
Get full text
Journal Article