2018
DOI: 10.48550/arxiv.1811.12447
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

On the Performance of Reed-Muller Codes with respect to Random Errors and Erasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
27
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(28 citation statements)
references
References 0 publications
1
27
0
Order By: Relevance
“…Observe that when the degree r is linear in m Theorem 6 only applies to weights that are some constant smaller than 1/2 and does not give information about the number of polynomials that have bias o(1). Such a result was obtained by Sberlo and Shpilka [43], and it played an important role in their results on the capacity of RM codes. They first proved a result for the case that r < m/2 and then for the general case (with a weaker bound).…”
Section: A Resultssupporting
confidence: 57%
See 3 more Smart Citations
“…Observe that when the degree r is linear in m Theorem 6 only applies to weights that are some constant smaller than 1/2 and does not give information about the number of polynomials that have bias o(1). Such a result was obtained by Sberlo and Shpilka [43], and it played an important role in their results on the capacity of RM codes. They first proved a result for the case that r < m/2 and then for the general case (with a weaker bound).…”
Section: A Resultssupporting
confidence: 57%
“…IV-A RM codes achieve capacity at low rate [10], [43] RM codes polarize and Twin-RM codes achieve capacity on any BMS [17] . .…”
Section: Capacity Resultsmentioning
confidence: 98%
See 2 more Smart Citations
“…Finally, we derive an upper bound on the rate of the largest (1, ∞)-RLL subcodes of the specific RM codes that we had used in our lower bounds. Our novel method of analysis uses properties of the weight distribution of RM codes-a topic that has received revived attention over the last decade (see, for example, the survey [12] and the papers [13], [14] and [15]). We hope that our techniques will prove useful in deriving upper bounds for other (𝑑, 𝑘)-and (𝑑, ∞)-RLL constraints, and will be extended, in future work, to any sequence of RM codes that is capacity-achieving over the unconstrained BMS channel.…”
Section: Introductionmentioning
confidence: 99%