Dissertations / Theses on the topic 'Algebraic Coding Theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 dissertations / theses for your research on the topic 'Algebraic Coding Theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Cohen, D. A. "A problem in algebraic coding theory." Thesis, University of Oxford, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.380002.
Full textArslan, Ogul. "Some algebraic problems from coding theory." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024938.
Full textLiu, Youjian. "An algebraic space-time coding theory and its applications /." The Ohio State University, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488204276534358.
Full textZappatore, Ilaria. "Simultaneous Rational Function Reconstruction and applications to Algebraic Coding Theory." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS021.
Full textThis dissertation deals with a Computer Algebra problem which has significant consequencesin Algebraic Coding Theory and Error Correcting Codes: the simultaneous rationalfunction reconstruction. Indeed, an accurate analysis of this problem leads to interestingresults in both these scientific domains.More precisely, the simultaneous rational function reconstruction is the problem of reconstructinga vector of rational functions with the same denominator given its evaluations(or more generally given its remainders modulo different polynomials). The peculiarity ofthis problem consists in the fact that the common denominator constraint reduces the numberof evaluation points needed to guarantee the existence of a solution, possibly losing theuniqueness. One of the main contribution of this work consists in the proof that uniquenessis guaranteed for almost all instances of this problem.This result was obtained by elaborating some other contributions and techniques derivedby the applications of SRFR, from the polynomial linear system solving to the decoding ofInterleaved Reed-Solomon codes.In this work, we will also study and present another application of the SRFR problem,concerning the problem of constructing fault-tolerant algorithms: algorithms resilientsto computational errors. These algorithms are constructed by introducing redundancy andusing error correcting codes tools to detect and possibly correct errors which occur duringcomputations. In this application context, we improve an existing fault-tolerant techniquefor polynomial linear system solving by interpolation-evaluation, by focusing on the SRFRproblem related to it
Alzubi, Jafar A. "Forward error correction coding and iterative decoding using algebraic geometric theory." Thesis, Swansea University, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582101.
Full textIannone, Paola. "Automorphism groups of geometric codes." Thesis, University of East Anglia, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.318091.
Full textBarelli, Elise. "On the security of short McEliece keys from algebraic andalgebraic geometry codes with automorphisms." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLX095/document.
Full textIn 1978, McEliece introduce a new public key encryption scheme coming from errors correcting codes theory. The idea is to use an error correcting code whose structure would be hidden, making it impossible to decode a message for anyone who do not know a specific decoding algorithm for the chosen code. The McEliece scheme has some advantages, encryption and decryption are very fast and it is a good candidate for public-key cryptography in the context of quantum computer. The main constraint is that the public key is too large compared to other actual public-key cryptosystems. In this context, we propose to study the using of some quasi-cyclic or quasi-dyadic codes. In this thesis, the two families of interest are: the family of alternant codes and the family of subfield subcode of algebraic geometry codes. We can construct quasi-cyclic alternant codes using an automorphism which acts on the support and the multiplier of the code. In order to estimate the securtiy of these QC codes we study the em{invariant code}. This invariant code is a smaller code derived from the public key. Actually the invariant code is exactly the subcode of code words fixed by the automorphism $sigma$. We show that it is possible to reduce the key-recovery problem on the original quasi-cyclic code to the same problem on the invariant code. This is also true in the case of QC algebraic geometry codes. This result permits us to propose a security analysis of QC codes coming from the Hermitian curve. Moreover, we propose compact key for the McEliece scheme using subfield subcode of AG codes on the Hermitian curve. The case of quasi-dyadic alternant code is also studied. Using the invariant code, with the em{Schur product} and the em{conductor} of two codes, we show weaknesses on the scheme using QD alternant codes with extension degree 2. In the case of the submission DAGS, proposed in the context of NIST competition, an attack exploiting these weakness permits to recover the secret key in few minutes for some proposed parameters
Jansen, Anthony Robert 1973. "Encoding and parsing of algebraic expressions by experienced users of mathematics." Monash University, School of Computer Science and Software Engineering, 2002. http://arrow.monash.edu.au/hdl/1959.1/8059.
Full textPeixoto, Rafael 1983. "Funções pesos fracos sobre variedades algébricas." [s.n.], 2011. http://repositorio.unicamp.br/jspui/handle/REPOSIP/307079.
Full textTese (doutorado) - Universidade Estadual de Campinas, Instituto de Matemática, Estatística e Computação Científica
Made available in DSpace on 2018-08-19T03:11:40Z (GMT). No. of bitstreams: 1 Peixoto_Rafael_D.pdf: 876847 bytes, checksum: ae0f5d0ea0f2c3e3d550bc60eb1ac66a (MD5) Previous issue date: 2011
Resumo: Definidas sobre uma F-álgebra, os conceitos de função peso e função peso fraco foram introduzidos de forma a simplificar a teoria dos códigos corretores de erros que utilizam ferramentas da geometria algébrica. Porém, todos os códigos suportados por estes conceitos estão intimamente ligados à códigos provenientes de curvas algébricas, ou seja, os códigos geométricos de Goppa. Uma modificação da noção de função peso foi apresentada permitindo assim construir códigos lineares sobre variedades algébricas. Nesta tese, apresentamos uma generalização da teoria de funções pesos fracos que possibilitou a construção de códigos sobre variedades de dimensão arbitrária. Determinamos uma cota para a distância mínima destes códigos, e finalmente, apresentamos uma caracterização tanto para as álgebras munidas de funções pesos quanto para as álgebras munidas de um conjunto especial de funções pesos fracos
Abstract: Defined on a F-algebra, the concepts of weight and near weight function were introduced to simplify the theory of error correcting codes using tools from algebraic geometry. However, all codes supported by these theories are geometric Goppa codes. The concept of weight function was generalized and used to construct linear codes on algebraic varieties. In this thesis, we present a generalization of near weights theory able to construct codes on higher dimensional varieties, and we define a formula for the minimum distance of such codes. Finally, we characterize the algebras with a weight function and the algebras admitting a special set of two near weight functions
Doutorado
Matematica
Doutor em Matemática
Melo, Nolmar. "Codigos geometricos de Goppa via metodos elementares." [s.n.], 2006. http://repositorio.unicamp.br/jspui/handle/REPOSIP/306316.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Matematica, Estatistica e Computação Cientifica
Made available in DSpace on 2018-08-05T23:44:44Z (GMT). No. of bitstreams: 1 Melo_Nolmar_M.pdf: 705654 bytes, checksum: b8ecfe0cc3ffd2dd2f63bc813a9c4a8d (MD5) Previous issue date: 2006
Resumo: O objetivo central desta dissertação foi o de apresentar os Códigos Geométricos de Goppa via métodos elementares que foram introduzidos por J. H. van Lint, R. Pellikaan e T. Hfhold por volta de 1998. Numa primeira parte da dissertação são apresentados os conceitos fundamentais sobre corpos de funções racionais de uma curva algébrica na direção de se definir os códigos de Goppa de maneira clássica, neste estudo nos baseamos principalmente no livro ¿Algebraic Function Fields and Codes¿ de H. Stichtenoth. A segunda parte inicia-se com a introdução dos conceitos de funções peso, grau e ordem que são fundamentais para o estudo dos Códigos de Goppa via métodos elementares de álgebra linear e de semigrupos, tal estudo foi baseado em ¿Algebraic geometry codes¿ de J. H. van Lint, R. Pellikaan e T. Hfhold.A dissertação termina com a apresentação de exemplos que ilustram os métodos elementares que nos referimos acima
Abstract: The central objective of this dissertation was to present the Goppa Geometry Codes via elementary methods which were introduced by J. H. van Lint, R. Pellikaan and T. Hfhold about 1998. On the first past of such dissertation are presented the fundamental concepts about fields of rational functions of an algebraic curve in the direction as to define the Goppa Codes on a classical manner. In this study we based ourselves mainly on the book ¿Algebraic Function Fields and Codes¿ of H. Stichtenoth. The second part is initiated with an introduction about the functions weight, degree and order which are fundamental for the study of the Goppa Codes throught elementary methods of linear algebra and of semigroups and such study was based on ¿Algebraic Geometry Codes¿ of J. h. van Lint, R. Pellikaan and T. Hfhold. The dissertation ends up with a presentation of examples which illustrate the elementary methods that we have referred to above
Mestrado
Algebra
Mestre em Matemática
Lac, Jacquelyn Ha. "Chinese remainder theorem and its applications." CSUSB ScholarWorks, 2008. https://scholarworks.lib.csusb.edu/etd-project/3373.
Full textHall, Jon G. "An algebra of high level Petri nets." Thesis, University of Newcastle Upon Tyne, 1996. http://hdl.handle.net/10443/2166.
Full textAntrobus, Jared E. "The State of Lexicodes and Ferrers Diagram Rank-Metric Codes." UKnowledge, 2019. https://uknowledge.uky.edu/math_etds/66.
Full textNardi, Jade. "Quelques retombées de la géométrie des surfaces toriques sur un corps fini sur l'arithmétique et la théorie de l'information." Thesis, Toulouse 3, 2019. http://www.theses.fr/2019TOU30051.
Full textA part of this thesis, at the interface between Computer Science and Mathematics, is dedicated to the study of the parameters ans properties of Goppa codes over Hirzebruch surfaces. From an arithmetical perspective, the question about number of rational points of a variety defined over a finite field, which seemed dealt with by Lefchetz formula, regained interest thanks to error correcting codes. The minimum distance of an algebraic-geometric codes provides an upper bound of the number of rational points of a hypersurface of a given variety and with a fixed Picard class. Since reducible curves are most likely to reach this bound, one can focus on irreducible curves to get sharper bounds. A global strategy to bound the number of points on a variety depending on its ambient space and some of its geometric invariants is exhibited here. Moreover we develop a method for curves on toric surfaces by adapting F.J. Voloch et K.O. Sthör's idea on toric varieties. Finally, we interest in Private Information Retrivial protocols, which aim to ensure that a user can access an entry of a database without revealing any information on it to the database owner. A PIR protocol based on codes over weighted projective planes is displayed here. It enhances other protocols by offering a resistance to servers collusions, at the expense of a loss of storage capacity. This issue is fixed by a lifting process, which leads to asymptotically good families of codes, with the same local properties
Abrahamsson, Olle. "A Gröbner basis algorithm for fast encoding of Reed-Müller codes." Thesis, Linköpings universitet, Matematik och tillämpad matematik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-132429.
Full textEdwards, Brandon Gary. "Coding theory and algebraic curves." Thesis, 1997. http://hdl.handle.net/2429/5939.
Full text"Finite fields, algebraic curves and coding theory." 2006. http://library.cuhk.edu.hk/record=b5896533.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2006.
Includes bibliographical references (leaves 99-100).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Finite Fields --- p.4
Chapter 2.1 --- Basic Properties of Finite Fields --- p.4
Chapter 2.2 --- Existence and Uniqueness of Finite Fields --- p.8
Chapter 2.3 --- Algorithms in Factoring Polynomials --- p.11
Chapter 2.3.1 --- Factorization of xn ´ؤ 1 --- p.11
Chapter 2.3.2 --- Berlekamp Algorithm for Factorizing an Arbitrary Polynomial --- p.13
Chapter 3 --- Algebraic Curves --- p.17
Chapter 3.1 --- Affine and Projective Curves --- p.17
Chapter 3.2 --- Local Properties and Intersections of Curves --- p.19
Chapter 3.3 --- Linear Systems of Curves and Noether's Theorem --- p.24
Chapter 3.4 --- Rational Function and Divisors --- p.29
Chapter 3.5 --- Differentials on a Curve --- p.34
Chapter 3.6 --- Riemann-Roch Theorem --- p.36
Chapter 4 --- Coding Theory --- p.46
Chapter 4.1 --- Introduction to Coding Theory --- p.46
Chapter 4.1.1 --- Basic Definitions for Error-Correcting Code --- p.46
Chapter 4.1.2 --- Geometric Approach to Error-Correcting Capabilities of Codes --- p.48
Chapter 4.2 --- Linear Codes --- p.49
Chapter 4.2.1 --- The Dual of a Linear Code --- p.54
Chapter 4.2.2 --- Syndrome Decoding --- p.57
Chapter 4.2.3 --- Extension of Basic Field --- p.60
Chapter 4.3 --- The Main Problem in Coding Theory --- p.62
Chapter 4.3.1 --- "Elementary Results on Aq(n, d)" --- p.63
Chapter 4.3.2 --- "Lower Bounds on Aq(n, d)" --- p.63
Chapter 4.3.3 --- "Upper Bounds on Aq(n,d)" --- p.65
Chapter 4.3.4 --- Asymptotic Bounds --- p.67
Chapter 4.4 --- Rational Codes --- p.68
Chapter 4.4.1 --- Hamming Codes --- p.68
Chapter 4.4.2 --- Codes on an Oval --- p.69
Chapter 4.4.3 --- Codes on a Twisted Cubic Curve --- p.78
Chapter 4.4.4 --- Normal Rational Codes --- p.82
Chapter 4.5 --- Goppa Codes --- p.84
Chapter 4.5.1 --- Classical Goppa Codes --- p.85
Chapter 4.5.2 --- Geometric Goppa Codes --- p.88
Chapter 4.5.3 --- Good Codes from Algebraic Geometry --- p.91
Chapter 4.6 --- A Recent Non-linear Code Improving the Tsfasman- Vladut-Zink Bound --- p.93
Bibliography --- p.99
"Algebraic curves and applications to coding theory." 1998. http://library.cuhk.edu.hk/record=b5889656.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 1998.
Includes bibliographical references (leaves 122-124).
Abstract also in Chinese.
Chapter 1 --- Complex algebraic curves --- p.6
Chapter 1.1 --- Foundations --- p.6
Chapter 1.1.1 --- Hilbert Nullstellensatz --- p.6
Chapter 1.1.2 --- Complex algebraic curves in C2 --- p.9
Chapter 1.1.3 --- Complex projective curves in P2 --- p.11
Chapter 1.1.4 --- Affine and projective curves --- p.13
Chapter 1.2 --- Algebraic properties of complex projective curves in P2 --- p.16
Chapter 1.2.1 --- Intersection multiplicity --- p.16
Chapter 1.2.2 --- Bezout's theorem and its applications --- p.18
Chapter 1.2.3 --- Cubic curves --- p.21
Chapter 1.3 --- Topological properties of complex projective curves in P2 --- p.23
Chapter 1.4 --- Riemann surfaces --- p.26
Chapter 1.4.1 --- Weierstrass &-function --- p.26
Chapter 1.4.2 --- Riemann surfaces and examples --- p.27
Chapter 1.5 --- Differentials on Riemann surfaces --- p.28
Chapter 1.5.1 --- Holomorphic differentials --- p.28
Chapter 1.5.2 --- Abel's Theorem for tori --- p.31
Chapter 1.5.3 --- The Riemann-Roch theorem --- p.32
Chapter 1.6 --- Singular curves --- p.36
Chapter 1.6.1 --- Resolution of singularities --- p.37
Chapter 1.6.2 --- The topology of singular curves --- p.45
Chapter 2 --- Coding theory --- p.48
Chapter 2.1 --- An introduction to codes --- p.48
Chapter 2.1.1 --- Efficient noiseless coding --- p.51
Chapter 2.1.2 --- The main coding theory problem --- p.56
Chapter 2.2 --- Linear codes --- p.58
Chapter 2.2.1 --- Syndrome decoding --- p.63
Chapter 2.2.2 --- Equivalence of codes --- p.65
Chapter 2.2.3 --- An introduction to cyclic codes --- p.67
Chapter 2.3 --- Special linear codes --- p.71
Chapter 2.3.1 --- Hamming codes --- p.71
Chapter 2.3.2 --- Simplex codes --- p.72
Chapter 2.3.3 --- Reed-Muller codes --- p.73
Chapter 2.3.4 --- BCH codes --- p.75
Chapter 2.4 --- Bounds on codes --- p.77
Chapter 2.4.1 --- Spheres in Zn --- p.77
Chapter 2.4.2 --- Perfect codes --- p.78
Chapter 2.4.3 --- Famous numbers Ar (n,d) and the sphere-covering and sphere packing bounds --- p.79
Chapter 2.4.4 --- The Singleton and Plotkin bounds --- p.81
Chapter 2.4.5 --- The Gilbert-Varshamov bound --- p.83
Chapter 3 --- Algebraic curves over finite fields and the Goppa codes --- p.85
Chapter 3.1 --- Algebraic curves over finite fields --- p.85
Chapter 3.1.1 --- Affine varieties --- p.85
Chapter 3.1.2 --- Projective varieties --- p.37
Chapter 3.1.3 --- Morphisms --- p.89
Chapter 3.1.4 --- Rational maps --- p.91
Chapter 3.1.5 --- Non-singular varieties --- p.92
Chapter 3.1.6 --- Smooth models of algebraic curves --- p.93
Chapter 3.2 --- Goppa codes --- p.96
Chapter 3.2.1 --- Elementary Goppa codes --- p.96
Chapter 3.2.2 --- The affine and projective lines --- p.98
Chapter 3.2.3 --- Goppa codes on the projective line --- p.102
Chapter 3.2.4 --- Differentials and divisors --- p.105
Chapter 3.2.5 --- Algebraic geometric codes --- p.112
Chapter 3.2.6 --- Codes with better rates than the Varshamov- Gilbert bound and calculation of parameters --- p.116
Bibliography
Thill, Matthew David. "Algebraic Techniques in Coding Theory: Entropy Vectors, Frames, and Constrained Coding." Thesis, 2016. https://thesis.library.caltech.edu/9141/1/MatthewThill2016_thesis.pdf.
Full textThe study of codes, classically motivated by the need to communicate information reliably in the presence of error, has found new life in fields as diverse as network communication, distributed storage of data, and even has connections to the design of linear measurements used in compressive sensing. But in all contexts, a code typically involves exploiting the algebraic or geometric structure underlying an application. In this thesis, we examine several problems in coding theory, and try to gain some insight into the algebraic structure behind them.
The first is the study of the entropy region - the space of all possible vectors of joint entropies which can arise from a set of discrete random variables. Understanding this region is essentially the key to optimizing network codes for a given network. To this end, we employ a group-theoretic method of constructing random variables producing so-called "group-characterizable" entropy vectors, which are capable of approximating any point in the entropy region. We show how small groups can be used to produce entropy vectors which violate the Ingleton inequality, a fundamental bound on entropy vectors arising from the random variables involved in linear network codes. We discuss the suitability of these groups to design codes for networks which could potentially outperform linear coding.
The second topic we discuss is the design of frames with low coherence, closely related to finding spherical codes in which the codewords are unit vectors spaced out around the unit sphere so as to minimize the magnitudes of their mutual inner products. We show how to build frames by selecting a cleverly chosen set of representations of a finite group to produce a "group code" as described by Slepian decades ago. We go on to reinterpret our method as selecting a subset of rows of a group Fourier matrix, allowing us to study and bound our frames' coherences using character theory. We discuss the usefulness of our frames in sparse signal recovery using linear measurements.
The final problem we investigate is that of coding with constraints, most recently motivated by the demand for ways to encode large amounts of data using error-correcting codes so that any small loss can be recovered from a small set of surviving data. Most often, this involves using a systematic linear error-correcting code in which each parity symbol is constrained to be a function of some subset of the message symbols. We derive bounds on the minimum distance of such a code based on its constraints, and characterize when these bounds can be achieved using subcodes of Reed-Solomon codes.
Steiner, Lisa. "A C*-Algebraic Approach to Quantum Coding Theory." Phd thesis, 2008. https://tuprints.ulb.tu-darmstadt.de/1000/1/thesis.pdf.
Full text"The development of algebraic-geometric codes & their applications." 1999. http://library.cuhk.edu.hk/record=b5890065.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 1999.
Includes bibliographical references (leaves 68-69).
Abstracts in English and Chinese.
Chapter 0 --- Introduction --- p.5
Chapter 1 --- Introduction to Coding Theory --- p.9
Chapter 1.1 --- Definition of a code --- p.10
Chapter 1.2 --- Maximum Likelihood Decoding --- p.11
Chapter 1.3 --- Syndrome Decoding --- p.12
Chapter 1.4 --- Two Kinds of Errors and Concatenated Code --- p.14
Chapter 2 --- Basic Knowledge of Algebraic Curve --- p.16
Chapter 2.1 --- Affine and Projective Curve --- p.16
Chapter 2.2 --- Regular Functions and Maps --- p.17
Chapter 2.3 --- Divisors and Differential forms --- p.19
Chapter 2.4 --- Riemann-Roch Theorem --- p.21
Chapter 3 --- Construction of Algebraic Geometric Code --- p.23
Chapter 3.1 --- L-construction --- p.23
Chapter 3.2 --- Ω -construction --- p.24
Chapter 3.3 --- Duality --- p.26
Chapter 4 --- Basic Error Processing --- p.28
Chapter 4.1 --- Error Locators and Syndromes --- p.28
Chapter 4.2 --- Finding an Error Locator --- p.29
Chapter 5 --- Full Error Processing for Code on Curve of Genus1 --- p.34
Chapter 5.1 --- Syndrome table --- p.34
Chapter 5.2 --- Syndrome table --- p.36
Chapter 5.3 --- The algorithm of Full Error Processing --- p.38
Chapter 5.4 --- A simple Example --- p.40
Chapter 6 --- General Full Error Processing --- p.47
Chapter 6.1 --- Row Candidate and Column Candidate --- p.47
Chapter 6.2 --- Consistency --- p.49
Chapter 6.3 --- Majority voting --- p.50
Chapter 6.4 --- Example --- p.53
Chapter 7 --- Application of Algebraic Geometric Code --- p.60
Chapter 7.1 --- Communication --- p.60
Chapter 7.2 --- Cryptosystem --- p.62
Bibliography
Steiner, Lisa [Verfasser]. "A C*-algebraic approach to quantum coding theory / von Lisa Steiner." 2008. http://d-nb.info/993822096/34.
Full textKrishna, Hari. "Computational complexity of bilinear forms-algebraic coding theory and applications to digital communication systems." Thesis, 1985. http://spectrum.library.concordia.ca/2777/1/NL21846.pdf.
Full textVides, Maximiliano Guillermo. "Métricas sobre grupos y anillos con aplicaciones a la teoría de códigos." Doctoral thesis, 2018. http://hdl.handle.net/11086/6573.
Full text(5929862), Xuejiao Kang. "Fault Tolerance in Linear Algebraic Methods using Erasure Coded Computations." Thesis, 2019.
Find full textAs parallel and distributed systems scale to hundreds of thousands of cores and beyond, fault tolerance becomes increasingly important -- particularly on systems with limited I/O capacity and bandwidth. Error correcting codes (ECCs) are used in communication systems where errors arise when bits are corrupted silently in a message. Error correcting codes can detect and correct erroneous bits. Erasure codes, an instance of error correcting codes that deal with data erasures, are widely used in storage systems. An erasure code addsredundancy to the data to tolerate erasures.
In this thesis, erasure coded computations are proposed as a novel approach to dealing with processor faults in parallel and distributed systems. We first give a brief review of traditional fault tolerance methods, error correcting codes, and erasure coded storage. The benefits and challenges of erasure coded computations with respect to coding scheme, fault models and system support are also presented.
In the first part of my thesis, I demonstrate the novel concept of erasure coded computations for linear system solvers. Erasure coding augments a given problem instance with redundant data. This augmented problem is executed in a fault oblivious manner in a faulty parallel environment. In the event of faults, we show how we can compute the true solution from potentially fault-prone solutions using a computationally inexpensive procedure. The results on diverse linear systems show that our technique has several important advantages: (i) as the hardware platform scales in size and in number of faults, our scheme yields increasing improvement in resource utilization, compared to traditional schemes; (ii) the proposed scheme is easy to code as the core algorithm remains the same; (iii) the general scheme is flexible to accommodate a range of computation and communication trade-offs.
We propose a new coding scheme for augmenting the input matrix that satisfies the recovery equations of erasure coding with high probability in the event of random failures. This coding scheme also minimizes fill (non-zero elements introduced by the coding block), while being amenable to efficient partitioning across processing nodes. Our experimental results show that the scheme adds minimal overhead for fault tolerance, yields excellent parallel efficiency and scalability, and is robust to different fault arrival models and fault rates.
Building on these results, we show how we can minimize, to optimality, the overhead associated with our problem augmentation techniques for linear system solvers. Specifically, we present a technique that adaptively augments the problem only when faults are detected. At any point during execution, we only solve a system with the same size as the original input system. This has several advantages in terms of maintaining the size and conditioning of the system, as well as in only adding the minimal amount of computation needed to tolerate the observed faults. We present, in details, the augmentation process, the parallel formulation, and the performance of our method. Specifically, we show that the proposed adaptive fault tolerance mechanism has minimal overhead in terms of FLOP counts with respect to the original solver executing in a non-faulty environment, has good convergence properties, and yields excellent parallel performance.
Based on the promising results for linear system solvers, we apply the concept of erasure coded computation to eigenvalue problems, which arise in many applications including machine learning and scientific simulations. Erasure coded computation is used to design a fault tolerant eigenvalue solver. The original eigenvalue problem is reformulated into a generalized eigenvalue problem defined on appropriate augmented matrices. We present the augmentation scheme, the necessary conditions for augmentation blocks, and the proofs of equivalence of the original eigenvalue problem and the reformulated generalized eigenvalue problem. Finally, we show how the eigenvalues can be derived from the augmented system in the event of faults.
We present detailed experiments, which demonstrate the excellent convergence properties of our fault tolerant TraceMin eigensolver in the average case. In the worst case where the row-column pairs that have the most impact on eigenvalues are erased, we present a novel scheme that computes the augmentation blocks as the computation proceeds, using the estimates of leverage scores of row-column pairs as they are computed by the iterative process. We demonstrate low overhead, excellent scalability in terms of the number of faults, and the robustness to different fault arrival models and fault rates for our method.
In summary, this thesis presents a novel approach to fault tolerance based on erasure coded computations, demonstrates it in the context of important linear algebra kernels, and validates its performance on a diverse set of problems on scalable parallel computing platforms. As parallel systems scale to hundreds of thousands of processing cores and beyond, these techniques present the most scalable fault tolerant mechanisms currently available.
"Network coding theory based on commutative algebra and matroids." Thesis, 2009. http://library.cuhk.edu.hk/record=b6075422.
Full textThesis (Ph.D.)--Chinese University of Hong Kong, 2009.
Includes bibliographical references (leaves 95-99).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstract also in Chinese.
Hardy, Yorick. "Classical and quantum computing." Thesis, 2008. http://hdl.handle.net/10210/489.
Full textVinodh, K. "Cooperative Communication Protocols : Diversity-Multiplexing Gain Tradeoff And Code Constructions." Thesis, 2007. http://hdl.handle.net/2005/505.
Full textDas, Smarajit. "Low-PAPR, Low-delay, High-Rate Space-Time Block Codes From Orthogonal Designs." Thesis, 2009. http://hdl.handle.net/2005/1046.
Full text