Abstract:
We initiate a study of constrained codes in which any codeword can be transformed into any other codeword by a sequence of single symbol changes such that the intermediat...Show MoreMetadata
Abstract:
We initiate a study of constrained codes in which any codeword can be transformed into any other codeword by a sequence of single symbol changes such that the intermediate words (after each symbol change) all satisfy the underlying constraint. We shall refer to a set of constrained words with this property as being Hamming connected. Hamming connected constrained codes might be useful for encoding data in storage media when a constraint must be met upon writing data, as might be the case in some emerging storage technologies. The stated property would permit overwriting encoded data without violating the constraint during intermediate writes. We study the Hamming connectedness of (d, k)-run-length limited constraints and a few other special cases. We also consider the decidability of Hamming connectedness for finite memory constraints.
Published in: 2014 IEEE International Symposium on Information Theory
Date of Conference: 29 June 2014 - 04 July 2014
Date Added to IEEE Xplore: 11 August 2014
Electronic ISBN:978-1-4799-5186-4