2010
DOI: 10.1109/tit.2010.2048455
|View full text |Cite
|
Sign up to set email alerts
|

Codes in Permutations and Error Correction for Rank Modulation

Abstract: Codes for rank modulation have been recently proposed as a means of protecting flash memory devices from errors. We study basic coding theoretic problems for such codes, representing them as subsets of the set of permutations of $n$ elements equipped with the Kendall tau distance. We derive several lower and upper bounds on the size of codes. These bounds enable us to establish the exact scaling of the size of optimal codes for large values of $n$. We also show the existence of codes whose size is within a con… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
168
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 152 publications
(168 citation statements)
references
References 12 publications
0
168
0
Order By: Relevance
“…Yehezkeally and Schwartz [16] proposed one of the longest snakes in S 3 of size 3, denoted by [2,3,1]) and T C = (t 3 , t 3 , t 3 ). Next, we construct a snakeĈ 4 in S 4 from C 3 T C in S 3 using the above construction, whereĈ 4 = (π 0 ,π 1 ,π 2 ,π 3 ).…”
Section: A Snake In S 4 From One Of the Longest Snakes In Smentioning
confidence: 99%
See 1 more Smart Citation
“…Yehezkeally and Schwartz [16] proposed one of the longest snakes in S 3 of size 3, denoted by [2,3,1]) and T C = (t 3 , t 3 , t 3 ). Next, we construct a snakeĈ 4 in S 4 from C 3 T C in S 3 using the above construction, whereĈ 4 = (π 0 ,π 1 ,π 2 ,π 3 ).…”
Section: A Snake In S 4 From One Of the Longest Snakes In Smentioning
confidence: 99%
“…To detect and/or correct such errors we need an appropriate distance measure in the permutations. There are several metrics on the permutations such as the ∞ -metric [12,15], the Ulam metric [5] and the Kendall's τ -metric [2,11]. In this paper, we will consider only the Kendall's τ -metric.…”
mentioning
confidence: 99%
“…Suppose the two adjacent symbols 12 and 2 are deleted, then π = (2, 6,12,1,9,5,13,4,8,10,3,7,11) is received. By checking the positions of values from [1,4] and [10,13] in π, we have R = [4,7] and R = [3,6]. That is a = k j = 4, b = 8 in Algorithm 2, and there is no h j in [a, a + s − 1] = [4,6].…”
Section: Constructionsmentioning
confidence: 99%
“…1. In a stable deletion, the remaining components of the permutation gives the vector (5,3,8,4,6,7,1), whereas in an unstable deletion the remaining components of the permutation gives the vector (4, 2, 7, 3, 5, 6, 1).…”
Section: Introductionmentioning
confidence: 99%
“…Non-volatile memory technologies are stimulating research in many areas of communication theory, as not only have they become extraordinarily important in the semiconductor industry, they also possess unique characteristics that motivate new paradigms in how these memories are written to, how one treats errors and how one trades off memory lifetime with capacity; for a sample of these works see [1]- [14].…”
Section: Motivationmentioning
confidence: 99%