SlideShare uma empresa Scribd logo
1 de 27
Locally Decodable Codes Sergey Yekhanin Microsoft Research
Data storage ,[object Object]
Keep it readily available for users,[object Object]
Keep it readily available for users
Very large overhead
Moderate reliability
Local recovery:     Loose one machine, access one
Data storage: Erasure coding ,[object Object]
Keep it readily available for users… ,[object Object]
High reliability
No local recovery:     Loose one machine, access k … … k data chunks n-k parity chunks Need: Erasure codes with local decoding
Local decoding: example E(X) X1 X2 X3 X X1 X2 X3 X1X2 X1X3 X2X3 X1X2X3 ,[object Object]
 After 3 erasures, any information bit can recovered with locality 2
 After 3 erasures, any parity bit can be recovered with locality 2,[object Object]
 After 3 erasures, any information bit can recovered with locality 2
 After 3 erasures, any parity bit can be recovered with locality 2,[object Object]
Parameters Ideally: High rate:        close to   .                  or  Strong locality: Very small        Constant.  One cannot minimize      and    simultaneously. There is a trade-off.
Parameters Ideally: High rate:        close to   .                  or  Strong locality: Very small       Constant.  Potential applications for data transmission / storage. Applications in complexity theory / cryptography.
Early constructions: Reed Muller codes Parameters: The code consists of evaluations of all degree      polynomials in     variables over a finite field  High rate: No locality at rates above 0.5 Locality            at rate   Strong locality:                    for constant
State of the art: codes High rate: [KSY10] Multiplicity codes:  Locality            at rate  Strong locality: [Y08, R07, KY09,E09, DGY10, BET10a, IS10, CFL+10,BET10b,SY]      Matching vector codes:                      for constant                                                                   for
State of the art: lower bounds[KT,KdW,W,W] High rate: [KSY10] Multiplicity codes:  Locality            at rate  Strong locality: [Y08, R07, E09, DGY10, BET10a, IS10, CFL+10,BET10b,SY11]      Matching vector codes:                      for constant                                                                   for                Locality lower bound: Length lower bound:
State of the art: constructions Matching vector codes Reed Muller codes Multiplicity codes
Plan Reed Muller codes Multiplicity codes Matching vector codes
Reed Muller codes Parameters:  Code: Evaluations of degree      polynomials over  Set:  Polynomial                      yields a codeword: Parameters:
Reed Muller codes: local decoding Key observation: Restriction of a codeword to an affine line yields an evaluation of a univariate polynomial       of degree  To recover the value at  Pick a random affine line through Do noisy polynomial interpolation. ,[object Object],[object Object]
Multiplicity codes Parameters:  Code: Evaluations of degree      polynomials over  	                                       and their partial derivatives. Set: Polynomial                      yields a codeword:  Parameters:
Multiplicity codes: local decoding Fact: Derivatives of       in two independent directions determine the derivatives in all directions. Key observation: Restriction of a codeword to an affine line yields an evaluation of a univariate polynomial         of degree

Mais conteúdo relacionado

Mais procurados (20)

Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correction
 
Reed Solomon Frame Structures Revealed
Reed Solomon Frame Structures RevealedReed Solomon Frame Structures Revealed
Reed Solomon Frame Structures Revealed
 
Convolution codes and turbo codes
Convolution codes and turbo codesConvolution codes and turbo codes
Convolution codes and turbo codes
 
Channel coding
Channel coding  Channel coding
Channel coding
 
Turbo Code
Turbo Code Turbo Code
Turbo Code
 
Basics of channel coding
Basics of channel codingBasics of channel coding
Basics of channel coding
 
Turbo Codes
Turbo CodesTurbo Codes
Turbo Codes
 
Hossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on GraphsHossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on Graphs
 
Slides
SlidesSlides
Slides
 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
 
LDPC Codes
LDPC CodesLDPC Codes
LDPC Codes
 
ma92008id393
ma92008id393ma92008id393
ma92008id393
 
Shannon Fano
Shannon FanoShannon Fano
Shannon Fano
 
Basics of coding theory
Basics of coding theoryBasics of coding theory
Basics of coding theory
 
Channel Coding (Digital communication)
Channel Coding (Digital communication)Channel Coding (Digital communication)
Channel Coding (Digital communication)
 
Turbocode
TurbocodeTurbocode
Turbocode
 
Coding theory updated
Coding theory updatedCoding theory updated
Coding theory updated
 
Source coding
Source codingSource coding
Source coding
 
Error Control coding
Error Control codingError Control coding
Error Control coding
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomon
 

Semelhante a Csr2011 june17 09_30_yekhanin

02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knightDevanshi Piprottar
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...Scality
 
My review on low density parity check codes
My review on low density parity check codesMy review on low density parity check codes
My review on low density parity check codespulugurtha venkatesh
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N CorrectionAnkan Adhikari
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityIAEME Publication
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...ijwmn
 
Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)nes
 
Analysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax CommunicationsAnalysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax CommunicationsWilliam Chipman
 
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...IOSR Journals
 

Semelhante a Csr2011 june17 09_30_yekhanin (20)

Turbo codes.ppt
Turbo codes.pptTurbo codes.ppt
Turbo codes.ppt
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
 
Unit6 Part3.ppt
Unit6 Part3.pptUnit6 Part3.ppt
Unit6 Part3.ppt
 
C04922125
C04922125C04922125
C04922125
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...
 
Channel Coding.ppt
Channel Coding.pptChannel Coding.ppt
Channel Coding.ppt
 
My review on low density parity check codes
My review on low density parity check codesMy review on low density parity check codes
My review on low density parity check codes
 
Y25124127
Y25124127Y25124127
Y25124127
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicity
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
 
E42032732
E42032732E42032732
E42032732
 
Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)
 
error control coding
error control coding error control coding
error control coding
 
C6 agramakrishnan1
C6 agramakrishnan1C6 agramakrishnan1
C6 agramakrishnan1
 
Analysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax CommunicationsAnalysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax Communications
 
I Tlecture 13a
I Tlecture 13aI Tlecture 13a
I Tlecture 13a
 
Compression
CompressionCompression
Compression
 
Compression
CompressionCompression
Compression
 
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
 

Mais de CSR2011

Csr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCsr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCSR2011
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCSR2011
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCSR2011
 
Csr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCsr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCSR2011
 
Csr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCsr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCSR2011
 
Csr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCsr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCSR2011
 
Csr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCsr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCSR2011
 
Csr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCsr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCSR2011
 
Csr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCsr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCSR2011
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCSR2011
 
Csr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCsr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCSR2011
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCSR2011
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCSR2011
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCSR2011
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCSR2011
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCSR2011
 
Csr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCsr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCSR2011
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCSR2011
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCSR2011
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCSR2011
 

Mais de CSR2011 (20)

Csr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCsr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigoriev
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoff
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoff
 
Csr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCsr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudan
 
Csr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCsr2011 june18 15_45_avron
Csr2011 june18 15_45_avron
 
Csr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCsr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilka
 
Csr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCsr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyen
 
Csr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCsr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskin
 
Csr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCsr2011 june18 11_30_remila
Csr2011 june18 11_30_remila
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanov
 
Csr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCsr2011 june17 16_30_blin
Csr2011 june17 16_30_blin
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morin
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyi
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonati
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
 
Csr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCsr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminski
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morin
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyi
 

Csr2011 june17 09_30_yekhanin

  • 1. Locally Decodable Codes Sergey Yekhanin Microsoft Research
  • 2.
  • 3.
  • 4. Keep it readily available for users
  • 7. Local recovery: Loose one machine, access one
  • 8.
  • 9.
  • 11. No local recovery: Loose one machine, access k … … k data chunks n-k parity chunks Need: Erasure codes with local decoding
  • 12.
  • 13. After 3 erasures, any information bit can recovered with locality 2
  • 14.
  • 15. After 3 erasures, any information bit can recovered with locality 2
  • 16.
  • 17. Parameters Ideally: High rate: close to . or Strong locality: Very small Constant. One cannot minimize and simultaneously. There is a trade-off.
  • 18. Parameters Ideally: High rate: close to . or Strong locality: Very small Constant. Potential applications for data transmission / storage. Applications in complexity theory / cryptography.
  • 19. Early constructions: Reed Muller codes Parameters: The code consists of evaluations of all degree polynomials in variables over a finite field High rate: No locality at rates above 0.5 Locality at rate Strong locality: for constant
  • 20. State of the art: codes High rate: [KSY10] Multiplicity codes: Locality at rate Strong locality: [Y08, R07, KY09,E09, DGY10, BET10a, IS10, CFL+10,BET10b,SY] Matching vector codes: for constant for
  • 21. State of the art: lower bounds[KT,KdW,W,W] High rate: [KSY10] Multiplicity codes: Locality at rate Strong locality: [Y08, R07, E09, DGY10, BET10a, IS10, CFL+10,BET10b,SY11] Matching vector codes: for constant for Locality lower bound: Length lower bound:
  • 22. State of the art: constructions Matching vector codes Reed Muller codes Multiplicity codes
  • 23. Plan Reed Muller codes Multiplicity codes Matching vector codes
  • 24. Reed Muller codes Parameters: Code: Evaluations of degree polynomials over Set: Polynomial yields a codeword: Parameters:
  • 25.
  • 26. Multiplicity codes Parameters: Code: Evaluations of degree polynomials over and their partial derivatives. Set: Polynomial yields a codeword: Parameters:
  • 27. Multiplicity codes: local decoding Fact: Derivatives of in two independent directions determine the derivatives in all directions. Key observation: Restriction of a codeword to an affine line yields an evaluation of a univariate polynomial of degree
  • 28.
  • 29.
  • 31. Matching vectors Definition: Let We say that form a matching family if : For all For all Core theorem: A matching vector family of size yields an query code of length
  • 32.
  • 33. RM codes vs. Multiplicity codes
  • 34. Summary Despite progress, the true trade-off between codeword length and locality is still a mystery. Are there codes of positive rate with ? Are there codes of polynomial length and ? A technical question: what is the size of the largest family of subsets of such that For all modulo six; For all modulo six.