Coding for locality in reconstructing permutations

The problem of storing permutations in a distributed manner arises in several common scenarios, such as efficient updates of a large, encrypted, or compressed data set. This problem may be addressed in either a combinatorial or a coding approach. The former approach boils down to presenting large se...

Full description

Bibliographic Details
Main Authors: Raviv, Netanel (Author), Yaakobi, Eitan (Author), Medard, Muriel (Contributor)
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers (IEEE), 2018-02-14T19:28:25Z.
Subjects:
Online Access:Get fulltext
LEADER 01604 am a22001933u 4500
001 113668
042 |a dc 
100 1 0 |a Raviv, Netanel  |e author 
100 1 0 |a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science  |e contributor 
100 1 0 |a Medard, Muriel  |e contributor 
700 1 0 |a Yaakobi, Eitan  |e author 
700 1 0 |a Medard, Muriel  |e author 
245 0 0 |a Coding for locality in reconstructing permutations 
260 |b Institute of Electrical and Electronics Engineers (IEEE),   |c 2018-02-14T19:28:25Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/113668 
520 |a The problem of storing permutations in a distributed manner arises in several common scenarios, such as efficient updates of a large, encrypted, or compressed data set. This problem may be addressed in either a combinatorial or a coding approach. The former approach boils down to presenting large sets of permutations with locality, that is, any symbol of the permutation can be computed from a small set of other symbols. In the latter approach, a permutation may be coded in order to achieve locality. This paper focuses on the combinatorial approach. We provide upper and lower bounds for the maximal size of a set of permutations with locality, and provide several simple constructions which attain the upper bound. In cases where the upper bound is not attained, we provide alternative constructions using Reed-Solomon codes, permutation polynomials, and multi-permutations. 
546 |a en_US 
655 7 |a Article 
773 |t 2016 IEEE International Symposium on Information Theory (ISIT)