2022 IEEE International Symposium on Information Theory (ISIT) 2022
DOI: 10.1109/isit50566.2022.9834350
|View full text |Cite
|
Sign up to set email alerts
|

Equivalence of Insertion/Deletion Correcting Codes for d-dimensional Arrays

Abstract: We consider the problem of correcting insertion and deletion errors in the d-dimensional space. This problem is well understood for vectors (one-dimensional space) and was recently studied for arrays (two-dimensional space). For vectors and arrays, the problem is motivated by several practical applications such as DNA-based storage and racetrack memories. From a theoretical perspective, it is interesting to know whether the same properties of insertion/deletion correcting codes generalize to the d-dimensional … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Other natural extensions beyond those studied in this paper include the finite column size regime, where tools from finite-blocklength information theory could be useful, and practical algorithms with theoretical guarantees. An extensive analysis of the parallels between database matching under synchronization errors and two-dimensional synchronization channels [59], [60] and the construction of codes tailored to correct the error patterns investigated in this paper could be an interesting line of future work. Finally, one can extend our adversarial setting into a noisy one where the privacy-preserving mechanism not only deletes columns but also introduces intentional noise on the microdata, and investigate the adversarial matching capacity through a worst-case analysis.…”
Section: Discussionmentioning
confidence: 99%
“…Other natural extensions beyond those studied in this paper include the finite column size regime, where tools from finite-blocklength information theory could be useful, and practical algorithms with theoretical guarantees. An extensive analysis of the parallels between database matching under synchronization errors and two-dimensional synchronization channels [59], [60] and the construction of codes tailored to correct the error patterns investigated in this paper could be an interesting line of future work. Finally, one can extend our adversarial setting into a noisy one where the privacy-preserving mechanism not only deletes columns but also introduces intentional noise on the microdata, and investigate the adversarial matching capacity through a worst-case analysis.…”
Section: Discussionmentioning
confidence: 99%