TY - GEN
T1 - Criss-Cross Deletion Correcting Codes
AU - Bitar, Rawad
AU - Smagloy, Ilia
AU - Welter, Lorenz
AU - Wachter-Zeh, Antonia
AU - Yaakobi, Eitan
N1 - Publisher Copyright: © 2020 IEICE.
PY - 2020/10/24
Y1 - 2020/10/24
N2 - This paper studies the problem of constructing codes correcting deletions in arrays. Under ts model, it is assumed that an n × n array can experience deletions of rows and columns. These deletion errors are referred to as (tr, tc)-criss-cross deletions if tr rows and tc columns are deleted, while a code correcting these deletion patterns is called a (tr, tc)-criss-cross deletion correcting code. The definitions forcriss-cross insertions are similar.Similar to the one-dimensional case, it is first shown that the problems of correcting criss-cross deletions and criss-cross insertions are equivalent. Then, we mostly investigate the case of (1, 1)criss-cross deletions. An asymptotic upper bound on the cardinality of (1, 1)-criss-cross deletion correcting codes is shown which assures that the asymptotic redundancy is at least 2n-2+2 log n bits. Finally, a code construction with an explicit decoding algorithm is presented. The redundancy of the construction is away from the lower bound by at most 2 log n+ 9 + 2 log e bits.
AB - This paper studies the problem of constructing codes correcting deletions in arrays. Under ts model, it is assumed that an n × n array can experience deletions of rows and columns. These deletion errors are referred to as (tr, tc)-criss-cross deletions if tr rows and tc columns are deleted, while a code correcting these deletion patterns is called a (tr, tc)-criss-cross deletion correcting code. The definitions forcriss-cross insertions are similar.Similar to the one-dimensional case, it is first shown that the problems of correcting criss-cross deletions and criss-cross insertions are equivalent. Then, we mostly investigate the case of (1, 1)criss-cross deletions. An asymptotic upper bound on the cardinality of (1, 1)-criss-cross deletion correcting codes is shown which assures that the asymptotic redundancy is at least 2n-2+2 log n bits. Finally, a code construction with an explicit decoding algorithm is presented. The redundancy of the construction is away from the lower bound by at most 2 log n+ 9 + 2 log e bits.
UR - http://www.scopus.com/inward/record.url?scp=85102024692&partnerID=8YFLogxK
U2 - https://doi.org/10.34385/proc.65.B06-7
DO - https://doi.org/10.34385/proc.65.B06-7
M3 - منشور من مؤتمر
T3 - Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020
SP - 304
EP - 308
BT - Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020
T2 - 16th International Symposium on Information Theory and its Applications, ISITA 2020
Y2 - 24 October 2020 through 27 October 2020
ER -