Subscribe free to our newsletters via your




TECH SPACE
New frontier in error-correcting codes
by Staff Writers
Boston MA (SPX) Oct 10, 2014


Illustration courtesy Jose-Luis Olivares/MIT.

Error-correcting codes are one of the glories of the information age: They're what guarantee the flawless transmission of digital information over the airwaves or through copper wire, even in the presence of the corrupting influences that engineers call "noise."

But classical error-correcting codes work best with large chunks of data: The bigger the chunk, the higher the rate at which it can be transmitted error-free. In the Internet age, however, distributed computing is becoming more and more common, with devices repeatedly exchanging small chunks of data over long periods of time.

So for the last 20 years, researchers have been investigating interactive-coding schemes, which address the problem of long sequences of short exchanges. Like classical error-correcting codes, interactive codes are evaluated according to three criteria: How much noise can they tolerate? What's the maximum transmission rate they afford? And how time-consuming are the encoding and decoding processes?

At the IEEE Symposium on Foundations of Computer Science this month, MIT graduate students past and present will describe the first interactive coding scheme to approach the optimum on all three measures.

"Previous to this work, it was known how to get two out of three of these things to be optimal," says Mohsen Ghaffari, a graduate student in electrical engineering and computer science and one of the paper's two co-authors. "This paper achieves all three of them."

Vicious noise
Moreover, where Claude Shannon's groundbreaking 1948 analysis of error-correcting codes considered the case of random noise, in which every bit of transmitted data has the same chance of being corrupted, Ghaffari and his collaborator - Bernhard Haeupler, who did his graduate work at MIT and is now an assistant professor at Carnegie Mellon University - consider the more stringent case of "adversarial noise," in which an antagonist is trying to interfere with transmission in the most disruptive way possible.

"We don't know what type of random noise will be the one that actually captures reality," Ghaffari explains.

"If we knew the best one, we would just use that. But generally, we don't know. So you try to generate a coding that is as general as possible." A coding scheme that could thwart an active adversary would also thwart any type of random noise.

Error-correcting codes - both classical and interactive - work by adding some extra information to the message to be transmitted. They might, for instance, tack on some bits that describe arithmetic relationships between the message bits.

Both the message bits and the extra bits are liable to corruption, so decoding a message - extracting the true sequence of message bits from the sequence that arrives at the receiver - is usually a process of iterating back and forth between the message bits and the extra bits, trying to iron out discrepancies.

In interactive communication, the maximum tolerable error rate is one-fourth: If the adversary can corrupt more than a quarter of the bits sent, perfectly reliable communication is impossible. Some prior interactive-coding schemes, Ghaffari explains, could handle that error rate without requiring too many extra bits. But the decoding process was prohibitively complex.

Making a list
To keep the complexity down, Ghaffari and Haeupler adopted a technique called list decoding. Rather than iterating back and forth between message bits and extra bits until the single most probable interpretation emerges, their algorithm iterates just long enough to create a list of likely candidates. At the end of their mutual computation, each of the interacting devices may have a list with hundreds of entries.

But each device, while it has only imperfect knowledge of the messages sent by the other, has perfect knowledge of the messages it sent. So if, at the computation's end, the devices simply exchange lists, each has enough additional information to zero in on the optimal decoding.

The maximum tolerable error rate for an interactive-coding scheme - one-fourth - is a theoretical result. The minimum length of an encoded message and the minimum decoding complexity, on the other hand, are surmises based on observation.

But Ghaffari and Haeupler's decoding algorithm is nearly linear, meaning that its execution time is roughly proportional to the length of the messages exchanged.

But linear relationships are still defined by constants: y = x is a linear relationship, but so is y = 1,000,000,000x. A linear algorithm that takes an extra second of computation for each additional bit of data it considers isn't as good as a linear algorithm that takes an extra microsecond.

.


Related Links
Massachusetts Institute of Technology
Space Technology News - Applications and Research






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





TECH SPACE
Microsoft to tap $2-trillion Indian cloud market
New Delhi (AFP) Sept 30, 2014
Microsoft announced plans Tuesday to offer its commercial cloud services from Indian data centres as it seeks to tap what it calls a $2-trillion market in the country where Internet use is growing rapidly. The move is part of the US tech giant's strategy to prepare for a world in which all data is stored online in locked accounts as it attempts to keep its market edge, with desktop use decli ... read more


TECH SPACE
In Nobel season, laureates fret for sickly Earth

Pakistan bars relief goods to flood-hit Indian Kashmir

Predicting landslides with light

Japan, Mexico to join UN peacekeeping

TECH SPACE
Russia Unable To Reject Foreign Parts in GLONASS Satellites

Talks Over GLONASS Station Locations in US on Hold

Sam Houston State study examines use of GIS in policing

Western Sanctions Fail to Impede GLONASS Satellite Production

TECH SPACE
Protected caves in Oregon change ideas of early Americans

Scientists are closer to understanding human height

DNA analysis suggests humanity has more mothers than fathers

Curiosity helps the brain acquire new information

TECH SPACE
Creepy Crawlers Play Key Role in Structure of Grasslands

UN biodiversity meet warns of unmet targets

Washington State lets citizens name discovered wolf packs

Wyoming gubernatorial candidate wants wolf hunt, ignores feds

TECH SPACE
'Vaccinated' mosquitos released in Rio to combat dengue

1,400 US troops soon headed to Liberia for Ebola mission

China to open first high security bio laboratory

Ebola epidemic battering Liberian economy: minister

TECH SPACE
Man stabs four school kids to death in southern China: Xinhua

Parents protest in China after school stampede kills 6

Six Nobel laureates boycott summit over Dalai Lama visa

China puts former top economic planner on trial

TECH SPACE
Hijacked Singaporean ship released near Nigeria: Seoul

Chinese fish farmer freed after Malaysia kidnapping

TECH SPACE
IMF keeps China growth forecast at 7.4%, warns of 'near-term risks'

World Bank cuts China, East Asia growth forecasts

Indonesian graft busters launch anti-corruption app

'Umbrella Revolution' risks cold shower for HK business




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.