Proceedings of the Forty-Eighth Annual ACM Symposium on Theory of Computing 2016
DOI: 10.1145/2897518.2897526
|View full text |Cite
|
Sign up to set email alerts
|

Efficiently decoding Reed-Muller codes from random errors

Abstract: Reed-Muller codes encode an m-variate polynomial of degree r by evaluating it on all points in {0, 1} m . We denote this code by RM (m, r). The minimal distance of RM(m, r) is 2 m−r and so it cannot correct more than half that number of errors in the worst case. For random errors one may hope for a better result.In this work we give an efficient algorithm (in the block length n = 2 m ) for decoding random errors in Reed-Muller codes far beyond the minimal distance. Specifically, for low rate codes (of degree r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
28
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(28 citation statements)
references
References 34 publications
0
28
0
Order By: Relevance
“…In particular, [28,Theorem 1.8] shows that an error pattern can be corrected by RM(n − (2t + 2), n) under block-MAP decoding whenever an erasure pattern with the same support can be corrected by RM(n − (t + 1), n) under block-MAP decoding. Using the algorithm in [88], these error patterns can even be corrected efficiently. Combined with our results for the BEC, [88,Corollary 14] shows that there exists a deterministic algorithm that runs in time at most n 4 and is able to correct (1/2−o(1))2 n random errors in RM(n, o( √ n))…”
Section: Beyond the Erasure Channelmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, [28,Theorem 1.8] shows that an error pattern can be corrected by RM(n − (2t + 2), n) under block-MAP decoding whenever an erasure pattern with the same support can be corrected by RM(n − (t + 1), n) under block-MAP decoding. Using the algorithm in [88], these error patterns can even be corrected efficiently. Combined with our results for the BEC, [88,Corollary 14] shows that there exists a deterministic algorithm that runs in time at most n 4 and is able to correct (1/2−o(1))2 n random errors in RM(n, o( √ n))…”
Section: Beyond the Erasure Channelmentioning
confidence: 99%
“…Using the algorithm in [88], these error patterns can even be corrected efficiently. Combined with our results for the BEC, [88,Corollary 14] shows that there exists a deterministic algorithm that runs in time at most n 4 and is able to correct (1/2−o(1))2 n random errors in RM(n, o( √ n))…”
Section: Beyond the Erasure Channelmentioning
confidence: 99%
“…In [12], minimum-weight parity checks are employed taking advantage of the large automorphism group of RM codes. Berlekamp-Welch type algorithms on random errors and erasures are considered and analyzed in [13], [14]. Successive cancellation (SC) decoding [9] and SC list (SCL) decoding [15], initially proposed for polar codes, are also applicable to RM codes as they share a similar construction.…”
Section: Introductionmentioning
confidence: 99%
“…It was proven in [3,4] that long low-rate RM codes RM (m, r) of order r = o(m) and length n = 2 m approach the maximum possible code rates C m on channels W m under the maximumlikelihood (ML) decoding. Even in this case, code rates R n decline exponentially as m r 2 −m and require exponential decoding complexity.…”
Section: Introductionmentioning
confidence: 99%