2018 IEEE International Symposium on Information Theory (ISIT) 2018
DOI: 10.1109/isit.2018.8437593
|View full text |Cite
|
Sign up to set email alerts
|

On Taking Advantage of Multiple Requests in Error Correcting Codes

Abstract: In most notions of locality in error correcting codes-notably locally recoverable codes (LRCs) and locally decodable codes (LDCs)-a decoder seeks to learn a single symbol of a message while looking at only a few symbols of the corresponding codeword. However, suppose that one wants to recover r > 1 symbols of the message. The two extremes are repeating the single-query algorithm r times (this is the intuition behind LRCs with availability, primitive multiset batch codes, and PIR codes) or simply running a glob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Existing literature on locality of codes [25], [26], [27], [28], [29], [30] usually considers a code where each code symbol appears exactly once. The associated codeword reflects this convention.…”
Section: Computational Localitymentioning
confidence: 99%
See 1 more Smart Citation
“…Existing literature on locality of codes [25], [26], [27], [28], [29], [30] usually considers a code where each code symbol appears exactly once. The associated codeword reflects this convention.…”
Section: Computational Localitymentioning
confidence: 99%
“…To do so, we define a new notion of locality for computation, denoted computational locality, via locality properties of an appropriately defined code. The topic of the locality of codes has a rich literature [25], [26], [27], [28], [29], [30]. For instance, there are well known "local recovery schemes"-procedures to recover one erased code symbol by querying a few other code symbols, for several classes of codes such as Reed-Muller codes.…”
Section: Introductionmentioning
confidence: 99%
“…This is similar to Private information retrieval (PIR) codes, which differ in that t duplicates of the same element must be reconstructed. Other schemes dealing with multiple requests are addressed in [11]. For batch and PIR codes where the queries do not all necessarily occur at the same time, see [12].…”
Section: Introductionmentioning
confidence: 99%