{"id":629,"date":"2014-10-14T05:17:27","date_gmt":"2014-10-14T05:17:27","guid":{"rendered":"http:\/\/revoscience.com\/en\/?p=629"},"modified":"2014-10-17T11:44:43","modified_gmt":"2014-10-17T11:44:43","slug":"new-frontier-in-error-correcting-codes","status":"publish","type":"post","link":"https:\/\/www.revoscience.com\/en\/new-frontier-in-error-correcting-codes\/","title":{"rendered":"New frontier in error-correcting codes"},"content":{"rendered":"<p style=\"color: #222222; text-align: justify;\"><em><strong>Coding scheme for interactive communication is the first to near optimality on three classical measures.<\/strong><\/em><\/p>\n<p style=\"color: #222222; text-align: justify;\"><a href=\"http:\/\/revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-630\" src=\"http:\/\/revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg\" alt=\"MIt-Interactive-Coding\" width=\"639\" height=\"426\" title=\"\" srcset=\"https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg 639w, https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding-300x200.jpg 300w\" sizes=\"auto, (max-width: 639px) 100vw, 639px\" \/><\/a><\/p>\n<p style=\"color: #222222; text-align: justify;\">CAMBRIDGE, Mass&#8211;Error-correcting codes are one of the glories of the information age: They\u2019re what guarantee the flawless transmission of digital information over the airwaves or through copper wire, even in the presence of the corrupting influences that engineers call \u201cnoise.\u201d<\/p>\n<p style=\"color: #222222; text-align: justify;\">But classical error-correcting codes work best with large chunks of data: The bigger the chunk, the higher the rate at which it can be transmitted error-free. In the Internet age, however, distributed computing is becoming more and more common, with devices repeatedly exchanging small chunks of data over long periods of time.<\/p>\n<p style=\"color: #222222; text-align: justify;\">So for the last 20 years, researchers have been investigating interactive-coding schemes, which address the problem of long sequences of short exchanges. Like classical error-correcting codes, interactive codes are evaluated according to three criteria: How much noise can they tolerate? What\u2019s the maximum transmission rate they afford? And how time-consuming are the encoding and decoding processes?<\/p>\n<p style=\"color: #222222; text-align: justify;\">At the IEEE Symposium on Foundations of Computer Science this month, MIT graduate students past and present will describe the first interactive coding scheme to approach the optimum on all three measures.<\/p>\n<p style=\"color: #222222; text-align: justify;\">\u201cPrevious to this work, it was known how to get two out of three of these things to be optimal,\u201d says Mohsen Ghaffari, a graduate student in electrical engineering and computer science and one of the paper\u2019s two co-authors. \u201cThis paper achieves all three of them.\u201d<\/p>\n<p style=\"color: #222222; text-align: justify;\"><strong>Vicious noise<\/strong><\/p>\n<p style=\"color: #222222; text-align: justify;\">Moreover, where Claude Shannon\u2019s groundbreaking 1948 analysis of error-correcting codes considered the case of random noise, in which every bit of transmitted data has the same chance of being corrupted, Ghaffari and his collaborator \u2014 Bernhard Haeupler, who did his graduate work at MIT and is now an assistant professor at Carnegie Mellon University \u2014 consider the more stringent case of \u201cadversarial noise,\u201d in which an antagonist is trying to interfere with transmission in the most disruptive way possible.<\/p>\n<p style=\"color: #222222; text-align: justify;\">\u201cWe don\u2019t know what type of random noise will be the one that actually captures reality,\u201d Ghaffari explains. \u201cIf we knew the best one, we would just use that. But generally, we don\u2019t know. So you try to generate a coding that is as general as possible.\u201d A coding scheme that could thwart an active adversary would also thwart any type of random noise.<\/p>\n<p style=\"color: #222222; text-align: justify;\">Error-correcting codes \u2014 both classical and interactive \u2014 work by adding some extra information to the message to be transmitted. They might, for instance, tack on some bits that describe arithmetic relationships between the message bits. Both the message bits and the extra bits are liable to corruption, so decoding a message \u2014 extracting the true sequence of message bits from the sequence that arrives at the receiver \u2014 is usually a process of iterating back and forth between the message bits and the extra bits, trying to iron out discrepancies.<\/p>\n<p style=\"color: #222222; text-align: justify;\">In interactive communication, the maximum tolerable error rate is one-fourth: If the adversary can corrupt more than a quarter of the bits sent, perfectly reliable communication is impossible. Some prior interactive-coding schemes, Ghaffari explains, could handle that error rate without requiring too many extra bits. But the decoding process was prohibitively complex.<\/p>\n<p style=\"color: #222222; text-align: justify;\"><strong>Making a list<\/strong><\/p>\n<p style=\"color: #222222; text-align: justify;\">To keep the complexity down, Ghaffari and Haeupler adopted a technique called list decoding. Rather than iterating back and forth between message bits and extra bits until the single most probable interpretation emerges, their algorithm iterates just long enough to create a list of likely candidates. At the end of their mutual computation, each of the interacting devices may have a list with hundreds of entries.<\/p>\n<p style=\"color: #222222; text-align: justify;\">But each device, while it has only imperfect knowledge of the messages sent by the other, has perfect knowledge of the messages it sent. So if, at the computation\u2019s end, the devices simply exchange lists, each has enough additional information to zero in on the optimal decoding.<\/p>\n<p style=\"color: #222222; text-align: justify;\">The maximum tolerable error rate for an interactive-coding scheme \u2014 one-fourth \u2014 is a theoretical result. The minimum length of an encoded message and the minimum decoding complexity, on the other hand, are surmises based on observation.<\/p>\n<p style=\"color: #222222; text-align: justify;\">But Ghaffari and Haeupler\u2019s decoding algorithm is nearly linear, meaning that its execution time is roughly proportional to the length of the messages exchanged.<\/p>\n<p style=\"color: #222222; text-align: justify;\">But linear relationships are still defined by constants: y = x is a linear relationship, but so is y = 1,000,000,000x. A linear algorithm that takes an extra second of computation for each additional bit of data it considers isn\u2019t as good as a linear algorithm that takes an extra microsecond.<\/p>\n<p style=\"color: #222222; text-align: justify;\"><span style=\"color: #c0c0c0;\"><em>Note: Written by Larry Hardesty, \u00a0and provided by\u00a0MIT News Office<\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Coding scheme for interactive communication is the first to near optimality on three classical measures. CAMBRIDGE, Mass&#8211;Error-correcting codes are one of the glories of the information age: They\u2019re what guarantee the flawless transmission of digital information over the airwaves or through copper wire, even in the presence of the corrupting influences that engineers call \u201cnoise.\u201d [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":630,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,17],"tags":[],"class_list":["post-629","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-science","category-research"],"featured_image_urls":{"full":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",639,426,false],"thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding-150x150.jpg",150,150,true],"medium":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",639,426,false],"large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",639,426,false],"1536x1536":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",639,426,false],"2048x2048":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",639,426,false],"ultp_layout_landscape_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",639,426,false],"ultp_layout_landscape":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",639,426,false],"ultp_layout_portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",600,400,false],"ultp_layout_square":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",600,400,false],"newspaper-x-single-post":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",639,426,false],"newspaper-x-recent-post-big":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",540,360,false],"newspaper-x-recent-post-list-image":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",95,63,false],"web-stories-poster-portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",639,426,false],"web-stories-publisher-logo":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",96,64,false],"web-stories-thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2014\/10\/MIt-Interactive-Coding.jpg",150,100,false]},"author_info":{"info":["RevoScience"]},"category_info":"<a href=\"https:\/\/www.revoscience.com\/en\/category\/computer-science\/\" rel=\"category tag\">Computer Science<\/a> <a href=\"https:\/\/www.revoscience.com\/en\/category\/news\/research\/\" rel=\"category tag\">Research<\/a>","tag_info":"Research","comment_count":"0","_links":{"self":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/comments?post=629"}],"version-history":[{"count":0,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/629\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media\/630"}],"wp:attachment":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media?parent=629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/categories?post=629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/tags?post=629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}