Skip to main content

List Decoding from Erasures: Bounds and Code Constructions

  • Conference paper
  • First Online:
  • 467 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2245))

Abstract

We consider the problem of list decoding from erasures. We establish lower and upper bounds on the rate of a (linear) code that can be list decoded with list size L when up to a fraction p of its symbols are adversarially erased. Our results show that in the limit of large L, the rate of such a code approaches the capacity (1 - p) of the erasure channel. Such nicely list decodable codes are then used as inner codes in a suitable concatenation scheme to give a uniformly constructive family of asymptotically goodbinary linear codes of rate Ω(ɛ2/ lg(1/ɛ)) that can be efficiently list decoded using lists of size O(1/ɛ) from up to a fraction (1-ɛ) of erasures. This improves previous results from [14] in this vein, which achieveda rate of Ω(ɛ3 lg(1/ɛ)).

Work done while the author was at the Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA 02139.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Alon. Personal Communication, October 1999.

    Google Scholar 

  2. N. Alon, J. Bruck, J. Naor, M. Naor and R. Roth. Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs. IEEE Trans. on Information Theory, 38 (1992), pp. 509–516.

    Article  Google Scholar 

  3. N. Alon, O. Goldreich, J. Håstad and R. Peralta. Simple constructions of almost k-wise independent random variables. Random Structures and Algorithms, 3 (1992), pp. 289–304.

    Article  MATH  MathSciNet  Google Scholar 

  4. V. M. Blinovsky. Bounds for codes in the case of list decoding of finite volume. Prob. Information Transmission, 22 (1), pp. 11–25 (in Russian), 1986; pp. 7–19 (in English), 1986.

    Google Scholar 

  5. P. Elias. Coding for two noisy channels. Information Theory, Third London Symposium, September 1955, Buttersworth’s Scientific Publications, pp. 61–76.

    Google Scholar 

  6. P. Elias. List decoding for noisy channels. Wescon Convention Record, Part 2, Institute of Radio Engineers (now IEEE), pp. 94–104, 1957.

    Google Scholar 

  7. P. Elias. Error-correcting codes for list decoding. IEEE Trans. Info. Theory, 37 (1), pp. 5–12, 1991.

    Article  MATH  MathSciNet  Google Scholar 

  8. G. D. Forney. Concatenated Codes. MIT Press, Cambridge, MA, 1996.

    Google Scholar 

  9. A. Gal, S. Halevi, R. J. Lipton and E. Petrank. Computing from partial solutions. Proc. of 14th Annual IEEE Conference on Computation Complexity, pp. 34–45, 1999.

    Google Scholar 

  10. V. Guruswami. List Decoding of Error-Correcting Codes. Ph.D thesis, Massachusetts Institute of Technology, August 2001.

    Google Scholar 

  11. V. Guruswami, J. Håstad, M. Sudan and D. Zuckerman. Combinatorial Bounds for List Decoding. Proceedings of the 38th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, October 2000.

    Google Scholar 

  12. V. Guruswami and P. Indyk. Untitled Manuscript, April 2001.

    Google Scholar 

  13. V. Guruswami and M. Sudan. Improved Decoding of Reed-Solomon and Algebraicgeometric codes. IEEE Transactions on Information Theory, 45 (1999), pp. 1757–1767.

    Article  MATH  MathSciNet  Google Scholar 

  14. V. Guruswami and M. Sudan. List decoding algorithms for certain concatenated codes. Proc. of 32nd ACM Symposium on the Theory of Computing (STOC), May 2000, pp. 181–190.

    Google Scholar 

  15. V. Guruswami and M. Sudan. The Johnson Bound: Revisitedand Improved. Submitted for publication, December 2000.

    Google Scholar 

  16. R. R. Nielsen and T. Høholdt. Decoding Reed-Solomon codes beyond half the minimum distance. Proceedings of the International conference on Coding Theory and Cryptography, 1998.

    Google Scholar 

  17. R. Roth and G. Ruckenstein. Efficient decoding of Reed-Solomon codes beyond half the minimum distance. IEEE Transactions on Information Theory, 46(1), pp. 246–257, January 2000.

    Article  MATH  MathSciNet  Google Scholar 

  18. J. H. van Lint. Introduction to Coding Theory. Graduate Texts in Mathematics 86, (Third Edition) Springer-Verlag, Berlin, 1999.

    Google Scholar 

  19. J. M. Wozencraft. List Decoding. Quarterly Progress Report, Research Laboratory of Electronics, MIT, Vol. 48 (1958), pp. 90–95.

    Google Scholar 

  20. V. V. Zyablov and M. S. Pinsker. List cascade decoding. In Prob. Information Transmission, 17 (4), pp. 29–34 (in Russian), 1981; pp. 236–240 (in English), 1982.

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Guruswami, V. (2001). List Decoding from Erasures: Bounds and Code Constructions. In: Hariharan, R., Vinay, V., Mukund, M. (eds) FST TCS 2001: Foundations of Software Technology and Theoretical Computer Science. FSTTCS 2001. Lecture Notes in Computer Science, vol 2245. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45294-X_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-45294-X_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43002-5

  • Online ISBN: 978-3-540-45294-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics