2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS) 2018
DOI: 10.1109/focs.2018.00028
|View full text |Cite
|
Sign up to set email alerts
|

Deterministic Document Exchange Protocols, and Almost Optimal Binary Codes for Edit Errors

Abstract: We note that by combining the techniques in [15] and [16], one can get an explicit binary code that corrects k block transpositions with O( √ kn) redundant bits. However to our knowledge this result has not appeared anywhere in the literature, and moreover it requires at least Ω( √ n) redundant bits even to correct one block transposition.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(61 citation statements)
references
References 23 publications
0
61
0
Order By: Relevance
“…Our efficient randomized hashing scheme takes any n-bit file F and for any k computes an optimal sized O(k log n k )-bit summary from which one can reconstruct F given a related Supported in part by NSF grants CCF-1618280, CCF-1814603, CCF-1527110, NSF CAREER award CCF-1750808, and a Sloan Research Fellowship. 1 The same derandomization result was simultaneously and independently discovered by [3,Cheng, Jin, Li and Wu; FOCS '18]. Both works were put on arxiv days apart [4], [5].…”
Section: Introductionmentioning
confidence: 62%
See 1 more Smart Citation
“…Our efficient randomized hashing scheme takes any n-bit file F and for any k computes an optimal sized O(k log n k )-bit summary from which one can reconstruct F given a related Supported in part by NSF grants CCF-1618280, CCF-1814603, CCF-1527110, NSF CAREER award CCF-1750808, and a Sloan Research Fellowship. 1 The same derandomization result was simultaneously and independently discovered by [3,Cheng, Jin, Li and Wu; FOCS '18]. Both works were put on arxiv days apart [4], [5].…”
Section: Introductionmentioning
confidence: 62%
“…This paper solely focuses on such single-round document exchange schemes. For simplicity, like all other prior works, we assume that a good upper bound k on the edit distance ED(F, F ′ ) is known 3 .…”
Section: Introductionmentioning
confidence: 99%
“…It is easy to show that there exist families of codes which correct an fraction of deletions and insertions with rate approaching 1 as → 0. In fact, almost optimal explicit constructions of efficiently decodable codes of this type are known [26,27].…”
Section: Discussionmentioning
confidence: 99%
“…The following result is relevant to our analysis. Lemma 9 ([41,42]). For every m and t < m there exists an efficiently encodable and decodable systematic code C edit ⊆ {0, 1} m+r with encoder Enc edit : {0, 1} m → {0, 1} m+r and redundancy r = O t log 2 m t + t that can efficiently correct up to t edit errors.…”
Section: Nearly-optimal Systematic Codes For Edit Errorsmentioning
confidence: 99%
“…We make this statement rigorous in the following lemma. We note that the technique in the lemma below has already been used in [42] to obtain strings satisfying related properties, such as substring-uniqueness, with high probability.…”
Section: Low Redundancy Codes Reconstructable From Polynomially Many mentioning
confidence: 99%