| dc.contributor.author | Raviv, Netanel | |
| dc.contributor.author | Yaakobi, Eitan | |
| dc.contributor.author | Medard, Muriel | |
| dc.date.accessioned | 2018-02-14T19:28:25Z | |
| dc.date.available | 2018-02-14T19:28:25Z | |
| dc.date.issued | 2016-08 | |
| dc.date.submitted | 2016-07 | |
| dc.identifier.isbn | 978-1-5090-1806-2 | |
| dc.identifier.uri | http://hdl.handle.net/1721.1/113668 | |
| dc.description.abstract | The problem of storing permutations in a distributed manner arises in several common scenarios, such as efficient updates of a large, encrypted, or compressed data set. This problem may be addressed in either a combinatorial or a coding approach. The former approach boils down to presenting large sets of permutations with locality, that is, any symbol of the permutation can be computed from a small set of other symbols. In the latter approach, a permutation may be coded in order to achieve locality. This paper focuses on the combinatorial approach. We provide upper and lower bounds for the maximal size of a set of permutations with locality, and provide several simple constructions which attain the upper bound. In cases where the upper bound is not attained, we provide alternative constructions using Reed-Solomon codes, permutation polynomials, and multi-permutations. | en_US |
| dc.language.iso | en_US | |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
| dc.relation.isversionof | http://dx.doi.org/10.1109/ISIT.2016.7541339 | en_US |
| dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
| dc.source | arXiv | en_US |
| dc.title | Coding for locality in reconstructing permutations | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Raviv, Netanel, Eitan Yaakobi, and Muriel Médard. "Coding for Locality in Reconstructing Permutations." 2016 IEEE International Symposium on Information Theory (ISIT), 10-15 July 2016, Barcelona, Spain, IEEE, 2016, pp. 450–54. | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
| dc.contributor.mitauthor | Medard, Muriel | |
| dc.relation.journal | 2016 IEEE International Symposium on Information Theory (ISIT) | en_US |
| dc.eprint.version | Original manuscript | en_US |
| dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dspace.orderedauthors | Raviv, Netanel; Yaakobi, Eitan; Medard, Muriel | en_US |
| dspace.embargo.terms | N | en_US |
| dc.identifier.orcid | https://orcid.org/0000-0003-4059-407X | |
| mit.license | OPEN_ACCESS_POLICY | en_US |