[ { "id": "https://authors.library.caltech.edu/records/psvjm-vmv70", "eprint_id": 102792, "eprint_status": "archive", "datestamp": "2023-08-19 21:36:25", "lastmod": "2023-10-20 00:30:32", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Raviv-N", "name": { "family": "Raviv", "given": "Netanel" }, "orcid": "0000-0002-1686-1994" }, { "id": "Jain-Siddharth", "name": { "family": "Jain", "given": "Siddharth" }, "orcid": "0000-0002-9164-6119" }, { "id": "Upadhyaya-P", "name": { "family": "Upadhyaya", "given": "Pulakesh" }, "orcid": "0000-0003-1054-1380" }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" }, { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" }, "orcid": "0000-0002-0120-7930" } ] }, "title": "CodNN \u2013 Robust Neural Networks From Coded Classification", "ispublished": "unpub", "full_text_status": "public", "note": "\u00a9 2020 IEEE.\n\n
Submitted - 2004.10700.pdf
", "abstract": "Deep Neural Networks (DNNs) are a revolutionary force in the ongoing information revolution, and yet their intrinsic properties remain a mystery. In particular, it is widely known that DNNs are highly sensitive to noise, whether adversarial or random. This poses a fundamental challenge for hardware implementations of DNNs, and for their deployment in critical applications such as autonomous driving.In this paper we construct robust DNNs via error correcting codes. By our approach, either the data or internal layers of the DNN are coded with error correcting codes, and successful computation under noise is guaranteed. Since DNNs can be seen as a layered concatenation of classification tasks, our research begins with the core task of classifying noisy coded inputs, and progresses towards robust DNNs.We focus on binary data and linear codes. Our main result is that the prevalent parity code can guarantee robustness for a large family of DNNs, which includes the recently popularized binarized neural networks. Further, we show that the coded classification problem has a deep connection to Fourier analysis of Boolean functions.In contrast to existing solutions in the literature, our results do not rely on altering the training process of the DNN, and provide mathematically rigorous guarantees rather than experimental evidence.", "date": "2020-06", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "2688-2693", "id_number": "CaltechAUTHORS:20200427-091804171", "isbn": "978-1-7281-6432-8", "book_title": "2020 IEEE International Symposium on Information Theory (ISIT)", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20200427-091804171", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "doi": "10.1109/ISIT44484.2020.9174480", "primary_object": { "basename": "2004.10700.pdf", "url": "https://authors.library.caltech.edu/records/psvjm-vmv70/files/2004.10700.pdf" }, "resource_type": "book_section", "pub_year": "2020", "author_list": "Raviv, Netanel; Jain, Siddharth; et el." }, { "id": "https://authors.library.caltech.edu/records/jqw53-1hh11", "eprint_id": 106993, "eprint_status": "archive", "datestamp": "2023-08-19 19:51:26", "lastmod": "2023-10-23 15:15:32", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Huang-Kunping", "name": { "family": "Huang", "given": "Kunping" } }, { "id": "Raviv-Netanel", "name": { "family": "Raviv", "given": "Netanel" }, "orcid": "0000-0002-1686-1994" }, { "id": "Jain-Siddharth", "name": { "family": "Jain", "given": "Siddharth" }, "orcid": "0000-0002-9164-6119" }, { "id": "Upadhyaya-Pulakesh", "name": { "family": "Upadhyaya", "given": "Pulakesh" }, "orcid": "0000-0003-1054-1380" }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" }, { "id": "Siegel-Paul-H", "name": { "family": "Siegel", "given": "Paul H." }, "orcid": "0000-0002-2539-4646" }, { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" }, "orcid": "0000-0002-0120-7930" } ] }, "title": "Improve Robustness of Deep Neural Networks by Coding", "ispublished": "unpub", "full_text_status": "restricted", "note": "\u00a9 2020 IEEE.", "abstract": "Deep neural networks (DNNs) typically have many weights. When errors appear in their weights, which are usually stored in non-volatile memories, their performance can degrade significantly. We review two recently presented approaches that improve the robustness of DNNs in complementary ways. In the first approach, we use error-correcting codes as external redundancy to protect the weights from errors. A deep reinforcement learning algorithm is used to optimize the redundancy-performance tradeoff. In the second approach, internal redundancy is added to neurons via coding. It enables neurons to perform robust inference in noisy environments.", "date": "2020-02-02", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "1-7", "id_number": "CaltechAUTHORS:20201209-153308085", "isbn": "9781728141909", "book_title": "2020 Information Theory and Applications Workshop (ITA)", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20201209-153308085", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "doi": "10.1109/ita50056.2020.9244998", "resource_type": "book_section", "pub_year": "2020", "author_list": "Huang, Kunping; Raviv, Netanel; et el." }, { "id": "https://authors.library.caltech.edu/records/vnf04-m3829", "eprint_id": 84525, "eprint_status": "archive", "datestamp": "2023-08-19 05:25:51", "lastmod": "2023-10-18 16:18:27", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" } }, { "id": "Upadhyaya-P", "name": { "family": "Upadhyaya", "given": "Pulakesh" } }, { "id": "Wang-Ying", "name": { "family": "Wang", "given": "Ying" } }, { "id": "Narayanan-K-R", "name": { "family": "Narayanan", "given": "Krishna R." } }, { "id": "Zhou-Hongchao", "name": { "family": "Zhou", "given": "Hongchao" } }, { "id": "Sima-Jin", "name": { "family": "Sima", "given": "Jin" }, "orcid": "0000-0003-4588-9790" }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "Stopping Set Elimination for LDPC Codes", "ispublished": "unpub", "full_text_status": "restricted", "note": "\u00a9 2017 IEEE. \n\nDate Added to IEEE Xplore: 18 January 2018.", "abstract": "This work studies the Stopping-Set Elimination Problem, namely, given a stopping set, how to remove the fewest erasures so that the remaining erasures can be decoded by belief propagation in k iterations (including k =\u221e). The NP-hardness of the problem is proven. An approximation algorithm is presented for k = 1. And efficient exact algorithms are presented for general k when the stopping sets form trees.", "date": "2017-10", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "700-707", "id_number": "CaltechAUTHORS:20180125-132316726", "isbn": "978-1-5386-3267-3", "book_title": "2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton)", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20180125-132316726", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "doi": "10.1109/ALLERTON.2017.8262806", "resource_type": "book_section", "pub_year": "2017", "author_list": "Jiang, Anxiao (Andrew); Upadhyaya, Pulakesh; et el." }, { "id": "https://authors.library.caltech.edu/records/bm7m7-z9t46", "eprint_id": 81233, "eprint_status": "archive", "datestamp": "2023-08-19 01:19:48", "lastmod": "2023-10-17 19:41:00", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" } }, { "id": "Upadhyaya-P", "name": { "family": "Upadhyaya", "given": "Pulakesh" } }, { "id": "Haratsch-E-F", "name": { "family": "Haratsch", "given": "Erich F." } }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "Correcting errors by natural redundancy", "ispublished": "unpub", "full_text_status": "restricted", "note": "\u00a9 2017 IEEE. \n\nDate Added to IEEE Xplore: 31 August 2017.", "abstract": "For the storage of big data, there are significant challenges with its long-term reliability. This paper studies how to use the natural redundancy in data for error correction, and how to combine it with error-correcting codes to effectively improve data reliability. It explores several aspects of natural redundancy, including the discovery of natural redundancy in compressed data, the efficient decoding of codes with random structures, the capacity of error-correcting codes that contain natural redundancy, and the time-complexity tradeoff between source coding and channel coding.", "date": "2017-02", "date_type": "published", "publisher": "IEEE", "pagerange": "1-8", "id_number": "CaltechAUTHORS:20170907-081956775", "isbn": "978-1-5090-5293-6", "book_title": "2017 Information Theory and Applications Workshop (ITA)", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20170907-081956775", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "collection": "CaltechAUTHORS", "doi": "10.1109/ITA.2017.8023455", "resource_type": "book_section", "pub_year": "2017", "author_list": "Jiang, Anxiao (Andrew); Upadhyaya, Pulakesh; et el." }, { "id": "https://authors.library.caltech.edu/records/53g4r-0wb20", "eprint_id": 74142, "eprint_status": "archive", "datestamp": "2023-08-19 13:44:34", "lastmod": "2023-10-24 22:08:37", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Li-Yue", "name": { "family": "Li", "given": "Yue" } }, { "id": "Wang-Yue", "name": { "family": "Wang", "given": "Yue" } }, { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" } }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "Content-assisted file decoding for nonvolatile memories", "ispublished": "unpub", "full_text_status": "restricted", "note": "\u00a9 2012 IEEE. \n\nThis work was supported in part by the NSF CAREER Award CCF-0747415 and the NSF grant CCF-1217944.", "abstract": "Nonvolatile memories (NVMs) such as flash memories play a significant role in meeting the data storage requirements of today's computation activities. The rapid increase of storage density for NVMs however brings reliability issues due to closer alignment of adjacent cells on chip, and more levels that are programmed into a cell. We propose a new method for error correction, which uses the random access capability of NVMs and the redundancy that inherently exists in information content. Although it is theoretically possible to remove the redundancy via data compression, existing source coding algorithms do not remove all of it for efficient computation. We propose a method that can be combined with existing storage solutions for text files, namely content-assisted decoding. Using the statistical properties of words and phrases in the text of a given language, our decoder identifies the location of each subcodeword representing some word in a given input noisy codeword, and flips the bits to compute a most likely word sequence. The decoder can be adapted to work together with traditional ECC decoders to keep the number of errors within the correction capability of traditional decoders. The combined decoding framework is evaluated with a set of benchmark files.", "date": "2012-12", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "937-941", "id_number": "CaltechAUTHORS:20170207-175141968", "isbn": "978-1-4673-5051-8", "book_title": "2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR)", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20170207-175141968", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CCF-0747415" }, { "agency": "NSF", "grant_number": "CCF-1217944" } ] }, "doi": "10.1109/ACSSC.2012.6489154", "resource_type": "book_section", "pub_year": "2012", "author_list": "Li, Yue; Wang, Yue; et el." }, { "id": "https://authors.library.caltech.edu/records/dpzzx-7bf24", "eprint_id": 74277, "eprint_status": "archive", "datestamp": "2023-08-19 07:23:50", "lastmod": "2023-10-24 22:16:32", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" } }, { "id": "Zhou-Hongchao", "name": { "family": "Zhou", "given": "Hongchao" } }, { "id": "Wang-Zhiying", "name": { "family": "Wang", "given": "Zhiying" } }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "Patterned cells for phase change memories", "ispublished": "unpub", "full_text_status": "public", "note": "\u00a9 2011 IEEE. \n\nThis work was supported in part by the NSF CAREER Award CCF-0747415, the NSF grant ECCS-0802107, and by an NSF-NRI award.", "abstract": "Phase-change memory (PCM) is an emerging nonvolatile memory technology that promises very high performance. It currently uses discrete cell levels to represent data, controlled by a single amorphous/crystalline domain in a cell. To improve data density, more levels per cell are needed. There exist a number of challenges, including cell programming noise, drifting of cell levels, and the high power requirement for cell programming. In this paper, we present a new cell structure called patterned cell, and explore its data representation schemes. Multiple domains per cell are used, and their connectivity is used to store data. We analyze its storage capacity, and study its error-correction capability and the construction of error-control codes.", "date": "2011-07", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "2333-2337", "id_number": "CaltechAUTHORS:20170213-160905267", "isbn": "978-1-4577-0595-3", "book_title": "2011 IEEE International Symposium on Information Theory Proceedings", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20170213-160905267", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CCF-0747415" }, { "agency": "NSF", "grant_number": "ECCS-0802107" } ] }, "doi": "10.1109/ISIT.2011.6033979", "resource_type": "book_section", "pub_year": "2011", "author_list": "Jiang, Anxiao (Andrew); Zhou, Hongchao; et el." }, { "id": "https://authors.library.caltech.edu/records/kbrtc-fah11", "eprint_id": 74990, "eprint_status": "archive", "datestamp": "2023-08-19 02:44:24", "lastmod": "2023-10-25 14:38:31", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" } }, { "id": "Langberg-M", "name": { "family": "Langberg", "given": "Michael" }, "orcid": "0000-0002-7470-0718" }, { "id": "Mateescu-R", "name": { "family": "Mateescu", "given": "Robert" } }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "Data movement and aggregation in flash memories", "ispublished": "unpub", "full_text_status": "public", "note": "\u00a9 2010 IEEE. \n\nThis work was supported in part by the NSF CAREER Award CCF-0747415, NSF grant ECCS-0802107, ISF grant 480/08, and Caltech Lee Center for Advanced Networking.\n\nPublished - 05513391.pdf
", "abstract": "NAND flash memories have become the most widely used type of non-volatile memories. In a NAND flash memory, every block of memory cells consists of numerous pages, and rewriting a single page requires the whole block to be erased. As block erasures significantly reduce the longevity, speed and power efficiency of flash memories, it is critical to minimize the number of erasures when data are reorganized. This leads to the data movement problem, where data need to be switched in blocks, and the objective is to minimize the number of block erasures. It has been shown that optimal solutions can be obtained by coding. However, coding-based algorithms with the minimum coding complexity still remain an important topic to study. \n\nIn this paper, we present a very efficient data movement algorithm with coding over GF(2) and with the minimum storage requirement. We also study data movement with more auxiliary blocks and present its corresponding solution. Furthermore, we extend the study to the data aggregation problem, where data can not only be moved but also aggregated. We present both non-coding and coding-based solutions, and rigorously prove the performance gain by using coding.", "date": "2010-06", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "1918-1922", "id_number": "CaltechAUTHORS:20170309-135756699", "isbn": "978-1-4244-7892-7", "book_title": "2010 IEEE International Symposium on Information Theory", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20170309-135756699", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CCF-0747415" }, { "agency": "NSF", "grant_number": "ECCS-0802107" }, { "agency": "Israel Science Foundation", "grant_number": "480/08" }, { "agency": "Caltech Lee Center for Advanced Networking" } ] }, "doi": "10.1109/ISIT.2010.5513391", "primary_object": { "basename": "05513391.pdf", "url": "https://authors.library.caltech.edu/records/kbrtc-fah11/files/05513391.pdf" }, "resource_type": "book_section", "pub_year": "2010", "author_list": "Jiang, Anxiao (Andrew); Langberg, Michael; et el." }, { "id": "https://authors.library.caltech.edu/records/wtbra-ykx96", "eprint_id": 75295, "eprint_status": "archive", "datestamp": "2023-08-18 23:59:45", "lastmod": "2023-10-25 14:55:29", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" } }, { "id": "Langberg-M", "name": { "family": "Langberg", "given": "Michael" }, "orcid": "0000-0002-7470-0718" }, { "id": "Mateescu-R", "name": { "family": "Mateescu", "given": "Robert" } }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "Data movement in flash memories", "ispublished": "unpub", "full_text_status": "public", "note": "\u00a9 2009 IEEE. \n\nThis work was supported in part by the NSF CAREER Award CCF-0747415, NSF grant ECCS-0802107, ISF grant 480/08, and Caltech Lee Center for Advanced Networking.\n\nPublished - 05394879.pdf
", "abstract": "NAND flash memories are the most widely used non-volatile memories, and data movement is common in flash storage systems. We study data movement solutions that minimize the number of block erasures, which are very important for the efficiency and longevity of flash memories. To move data among n blocks with the help of \u0394 auxiliary blocks, where every block contains m pages, we present algorithms that use \u03b8(n \u00b7 min{m, log_\u0394 n}) erasures without the tool of coding. We prove this is almost the best possible for non-coding solutions by presenting a nearly matching lower bound. Optimal data movement can be achieved using coding, where only \u03b8(n) erasures are needed. We present a coding-based algorithm, which has very low coding complexity, for optimal data movement. We further show the NP hardness of both coding-based and non-coding schemes when the objective is to optimize data movement on a per instance basis.", "date": "2009-09", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "1031-1038", "id_number": "CaltechAUTHORS:20170321-173656746", "isbn": "978-1-4244-5871-4", "book_title": "47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20170321-173656746", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CCF-0747415" }, { "agency": "NSF", "grant_number": "ECCS-0802107" }, { "agency": "Israel Science Foundation", "grant_number": "480/08" }, { "agency": "Caltech Lee Center for Advanced Networking" } ] }, "doi": "10.1109/ALLERTON.2009.5394879", "primary_object": { "basename": "05394879.pdf", "url": "https://authors.library.caltech.edu/records/wtbra-ykx96/files/05394879.pdf" }, "resource_type": "book_section", "pub_year": "2009", "author_list": "Jiang, Anxiao (Andrew); Langberg, Michael; et el." }, { "id": "https://authors.library.caltech.edu/records/7f210-bjx91", "eprint_id": 19447, "eprint_status": "archive", "datestamp": "2023-08-20 02:36:06", "lastmod": "2023-10-20 20:42:16", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Wang-Zhiying", "name": { "family": "Wang", "given": "Zhiying" } }, { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" } }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "On the capacity of bounded rank modulation for flash memories", "ispublished": "unpub", "full_text_status": "public", "note": "\u00a9 2009 IEEE.\n\nThis work was supported in part by the NSF CAREER Award CCF-0747415, the NSF grant ECCS-0802107, and the Caltech Lee Center for Advanced Networking.\n\nPublished - Wang2009p110862009_Ieee_International_Symposium_On_Information_Theory_Vols_1-_4.pdf
", "abstract": "Rank modulation has been introduced as a new information representation scheme for flash memories. Given the charge levels of a group of flash cells, sorting is used to induce a permutation, which in turn represents data. Motivated by the lower sorting complexity of smaller cell groups, we consider bounded rank modulation, where a sequence of permutations of given sizes are used to represent data. We study the capacity of bounded rank modulation under the condition that permutations can overlap for higher capacity.", "date": "2009-08-18", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "1234-1238", "id_number": "CaltechAUTHORS:20100816-142932373", "isbn": "978-1-4244-4312-3", "book_title": "ISIT 2009", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20100816-142932373", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CCF-0747415" }, { "agency": "NSF", "grant_number": "ECCS-0802107" }, { "agency": "Caltech Lee Center for Advanced Networking" } ] }, "doi": "10.1109/ISIT.2009.5205972", "primary_object": { "basename": "Wang2009p110862009_Ieee_International_Symposium_On_Information_Theory_Vols_1-_4.pdf", "url": "https://authors.library.caltech.edu/records/7f210-bjx91/files/Wang2009p110862009_Ieee_International_Symposium_On_Information_Theory_Vols_1-_4.pdf" }, "resource_type": "book_section", "pub_year": "2009", "author_list": "Wang, Zhiying; Jiang, Anxiao (Andrew); et el." }, { "id": "https://authors.library.caltech.edu/records/4k7ny-2dc62", "eprint_id": 75294, "eprint_status": "archive", "datestamp": "2023-08-20 01:55:20", "lastmod": "2023-10-25 14:55:26", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" } }, { "id": "Langberg-M", "name": { "family": "Langberg", "given": "Michael" }, "orcid": "0000-0002-7470-0718" }, { "id": "Schwartz-Moshe", "name": { "family": "Schwartz", "given": "Moshe" }, "orcid": "0000-0002-1449-0026" }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "Universal rewriting in constrained memories", "ispublished": "unpub", "full_text_status": "public", "note": "\u00a9 2009 IEEE. \n\nThis work was supported in part by the NSF CAREER Award CCF-0747415, the NSF grant ECCS-0802107, the ISF grant 480/08, the GIF grant 2179-1785.10/2007, and the Caltech Lee Center for Advanced Networking.\n\nPublished - 05205981.pdf
", "abstract": "A constrained memory is a storage device whose elements change their states under some constraints. A typical example is flash memories, in which cell levels are easy to increase but hard to decrease. In a general rewriting model, the stored data changes with some pattern determined by the application. In a constrained memory, an appropriate representation is needed for the stored data to enable efficient rewriting. \n\nIn this paper, we define the general rewriting problem using a graph model. This model generalizes many known rewriting models such as floating codes, WOM codes, buffer codes, etc. We present a novel rewriting scheme for the flash-memory model and prove it is asymptotically optimal in a wide range of scenarios. \n\nWe further study randomization and probability distributions to data rewriting and study the expected performance. We present a randomized code for all rewriting sequences and a deterministic code for rewriting following any i.i.d, distribution. Both codes are shown to be optimal asymptotically.", "date": "2009-06", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "1219-1223", "id_number": "CaltechAUTHORS:20170321-172544029", "isbn": "978-1-4244-4312-3", "book_title": "2009 IEEE International Symposium on Information Theory", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20170321-172544029", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CCF-0747415" }, { "agency": "NSF", "grant_number": "ECCS-0802107" }, { "agency": "Israel Science Foundation", "grant_number": "480/08" }, { "agency": "German-Israeli Foundation for Research and Development", "grant_number": "2179-1785.10/2007" }, { "agency": "Caltech Lee Center for Advanced Networking" } ] }, "doi": "10.1109/ISIT.2009.5205981", "primary_object": { "basename": "05205981.pdf", "url": "https://authors.library.caltech.edu/records/4k7ny-2dc62/files/05205981.pdf" }, "resource_type": "book_section", "pub_year": "2009", "author_list": "Jiang, Anxiao (Andrew); Langberg, Michael; et el." }, { "id": "https://authors.library.caltech.edu/records/j7xa3-njj15", "eprint_id": 76962, "eprint_status": "archive", "datestamp": "2023-08-19 20:23:49", "lastmod": "2023-10-25 17:02:16", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Bohossian-V", "name": { "family": "Bohossian", "given": "Vasken" } }, { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" } }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "Buffer Coding for Asymmetric Multi-Level Memory", "ispublished": "unpub", "full_text_status": "public", "note": "\u00a9 2007 IEEE. \n\nThis work was supported in part by the Lee Center for Advanced Networking at the California Institute of Technology.\n\nPublished - 04557384.pdf
", "abstract": "Certain storage media such as flash memories use write-asymmetric, multi-level storage elements. In such media, data is stored in a multi-level memory cell the contents of which can only be increased, or reset. The reset operation is expensive and should be delayed as much as possible. Mathematically, we consider the problem of writing a binary sequence into write-asymmetric q-ary cells, while recording the last r bits written. We want to maximize t, the number of possible writes, before a reset is needed. We introduce the term Buffer Code, to describe the solution to this problem. A buffer code is a code that remembers the r most recent values of a variable. We present the construction of a single-cell (n = 1) buffer code that can store a binary (l = 2) variable with t = [q/2^(r - 1)] + r - 2 and a universal upper bound to the number of rewrites that a single-cell buffer code can have: ..... We also show a binary buffer code with arbitrary n, q, r, namely, the code uses n q-ary cells to remember the r most recent values of one binary variable. The code can rewrite the variable times, which is asymptotically optimal in q and n. . We then extend the code construction for the case r = 2, and obtain a code that can rewrite the variable t = (q - 1)(n - 2) + 1 times. When q = 2, the code is strictly optimal.", "date": "2007-06", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "1186-1190", "id_number": "CaltechAUTHORS:20170426-152709376", "isbn": "978-1-4244-1397-3", "book_title": "2007 IEEE International Symposium on Information Theory", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20170426-152709376", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "Caltech Lee Center for Advanced Networking" } ] }, "doi": "10.1109/ISIT.2007.4557384", "primary_object": { "basename": "04557384.pdf", "url": "https://authors.library.caltech.edu/records/j7xa3-njj15/files/04557384.pdf" }, "resource_type": "book_section", "pub_year": "2007", "author_list": "Bohossian, Vasken; Jiang, Anxiao (Andrew); et el." }, { "id": "https://authors.library.caltech.edu/records/192v0-rz826", "eprint_id": 76717, "eprint_status": "archive", "datestamp": "2023-08-19 20:22:56", "lastmod": "2023-10-25 16:44:35", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" } }, { "id": "Bohossian-V", "name": { "family": "Bohossian", "given": "Vasken" } }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "Floating Codes for Joint Information Storage in Write Asymmetric Memories", "ispublished": "unpub", "full_text_status": "public", "note": "\u00a9 2007 IEEE. \n\nThis work was supported in part by the Lee Center for Advanced Networking at the California Institute of Technology.\n\nPublished - 04557381.pdf
", "abstract": "Memories whose storage cells transit irreversibly between states have been common since the start of the data storage technology. In recent years, flash memories and other non-volatile memories based on floating-gate cells have become a very important family of such memories. We model them by the write asymmetric memory (WAM), a memory where each cell is in one of q states - state 0, 1, middotmiddotmiddot, q - 1 - and can only transit from a lower state to a higher state. Data stored in a WAM can be rewritten by shifting the cells to higher states. Since the state transition is irreversible, the number of times of rewriting is limited. When multiple variables are stored in a WAM, we study codes, which we call floating codes, that maximize the total number of times the variables can be written and rewritten. In this paper, we present several families of floating codes that either are optimal, or approach optimality as the codes get longer. We also present bounds to the performance of general floating codes. The results show that floating codes can integrate the rewriting capabilities of different variables to a surprisingly high degree.", "date": "2007-06", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Piscataway, NJ", "pagerange": "1166-1170", "id_number": "CaltechAUTHORS:20170419-152416338", "isbn": "978-1-4244-1397-3", "book_title": "2007 IEEE International Symposium on Information Theory", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20170419-152416338", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "Caltech Lee Center for Advanced Networking" } ] }, "doi": "10.1109/ISIT.2007.4557381", "primary_object": { "basename": "04557381.pdf", "url": "https://authors.library.caltech.edu/records/192v0-rz826/files/04557381.pdf" }, "resource_type": "book_section", "pub_year": "2007", "author_list": "Jiang, Anxiao (Andrew); Bohossian, Vasken; et el." }, { "id": "https://authors.library.caltech.edu/records/t4bc1-d9a83", "eprint_id": 26080, "eprint_status": "archive", "datestamp": "2023-08-19 11:20:15", "lastmod": "2023-10-24 16:13:21", "type": "book_section", "metadata_visibility": "show", "creators": { "items": [ { "id": "Jiang-Anxiao-Andrew", "name": { "family": "Jiang", "given": "Anxiao (Andrew)" }, "orcid": "0000-0002-0120-7930" }, { "id": "Bruck-J", "name": { "family": "Bruck", "given": "Jehoshua" }, "orcid": "0000-0001-8474-0812" } ] }, "title": "Optimal Content Placement for En-Route Web Caching", "ispublished": "unpub", "full_text_status": "public", "note": "\u00a9 2003 IEEE.\nIssue Date: 16-18 April 2003.\nDate of Current Version: 28 May 2003.\n\nThis work was supported in part by the Lee Center for Advanced Networking\nat the California Institute of Technology.\n\nSubmitted - etr050.pdf
Submitted - etr050.ps
", "abstract": "This paper studies the optimal placement of web files for en-route web caching. It is shown that existing placement policies are all solving restricted partial problems of the file placement problem, and therefore give only sub-optimal solutions. A dynamic programming algorithm of low complexity which computes the optimal solution is presented. It is shown both analytically and experimentally that the file-placement solution output by our algorithm outperforms existing en-route caching policies. The optimal placement of web files can be implemented with a reasonable level of cache coordination and management overhead for en-route caching; and importantly, it can be achieved with or without using data prefetching.", "date": "2003-04-16", "date_type": "published", "publisher": "IEEE", "place_of_pub": "Los Alamitos, CA", "pagerange": "9-16", "id_number": "CaltechPARADISE:ETR050", "isbn": "0-7695-1938-5", "book_title": "Second IEEE International Symposium on Network Computing and Applications", "official_url": "https://resolver.caltech.edu/CaltechPARADISE:ETR050", "rights": "You are granted permission for individual, educational, research and non-commercial reproduction, distribution, display and performance of this work in any format.", "funders": { "items": [ { "agency": "Caltech Lee Center for Advanced Networking" } ] }, "local_group": { "items": [ { "id": "Parallel-and-Distributed-Systems-Group" } ] }, "doi": "10.1109/NCA.2003.1201132", "primary_object": { "basename": "etr050.pdf", "url": "https://authors.library.caltech.edu/records/t4bc1-d9a83/files/etr050.pdf" }, "related_objects": [ { "basename": "etr050.ps", "url": "https://authors.library.caltech.edu/records/t4bc1-d9a83/files/etr050.ps" } ], "resource_type": "book_section", "pub_year": "2003", "author_list": "Jiang, Anxiao (Andrew) and Bruck, Jehoshua" } ]