Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Carol Wang is active.

Publication


Featured researches published by Carol Wang.


IEEE Transactions on Information Theory | 2013

Linear-Algebraic List Decoding for Variants of Reed–Solomon Codes

Venkatesan Guruswami; Carol Wang

Folded Reed-Solomon (RS) codes are an explicit family of codes that achieve the optimal tradeoff between rate and list error-correction capability: specifically, for any ε > 0, Guruswami and Rudra presented an nO(1/ ε) time algorithm to list decode appropriate folded RS codes of rate R from a fraction 1-R-ε of errors. The algorithm is based on multivariate polynomial interpolation and root-finding over extension fields. It was noted by Vadhan that interpolating a linear polynomial suffices for a statement of the above form. Here, we give a simple linear-algebra-based analysis of this variant that eliminates the need for the computationally expensive root-finding step over extension fields (and indeed any mention of extension fields). The entire list-decoding algorithm is linear-algebraic, solving one linear system for the interpolation step, and another linear system to find a small subspace of candidate solutions. Except for the step of pruning this subspace, the algorithm can be implemented to run in quadratic time. We also consider a closely related family of codes, called (order m) derivative codes and defined over fields of large characteristic, which consist of the evaluations of f as well as its first m-1 formal derivatives at N distinct field elements. We show how our linear-algebraic methods for folded RS codes can be used to show that derivative codes can also achieve the above optimal tradeoff. The theoretical drawback of our analysis for folded RS codes and derivative codes is that both the decoding complexity and proven worst-case list-size bound are nΩ(1/ ε). By combining the above idea with a pseudorandom subset of all polynomials as messages, we get a Monte Carlo construction achieving a list-size bound of O(1/ ε2) which is quite close to the existential O(1/ ε) bound (however, the decoding complexity remains nΩ(1/ ε)). Our work highlights that constructing an explicit subspace-evasive subset that has small intersection with low-dimensional subspaces-an interesting problem in pseudorandomness in its own right-could lead to explicit codes with better list-decoding guarantees.


conference on innovations in theoretical computer science | 2012

List decoding subspace codes from insertions and deletions

Venkatesan Guruswami; Srivatsan Narayanan; Carol Wang

We present a construction of subspace codes along with an efficient algorithm for list decoding from both insertions and deletions, handling an information-theoretically maximum fraction of these with polynomially small rate. Our construction is based on a variant of the folded Reed-Solomon codes in the world of linearized polynomials, and the algorithm is inspired by the recent linear-algebraic approach to list decoding [4]. Ours is the first list decoding algorithm for subspace codes that can handle deletions; even one deletion can totally distort the structure of the basis of a subspace and is thus challenging to handle. When there are only insertions, we also present results for list decoding subspace codes that are the linearized analog of Reed-Solomon codes (proposed in [15, 8], and closely related to the Gabidulin codes for rank-metric coding), obtaining some improvements over similar results in [10].


international workshop and international workshop on approximation randomization and combinatorial optimization algorithms and techniques | 2011

Optimal rate list decoding via derivative codes

Venkatesan Guruswami; Carol Wang

The classical family of [n, k]q Reed-Solomon codes over a field Fq consist of the evaluations of polynomials f ∈ Fq[X] of degree < k at n distinct field elements. In this work, we consider a closely related family of codes, called (order m) derivative codes and defined over fields of large characteristic, which consist of the evaluations of f as well as its first m - 1 formal derivatives at n distinct field elements. For large enough m, we show that these codes can be list-decoded in polynomial time from an error fraction approaching 1 - R, where R = k/(nm) is the rate of the code. This gives an alternate construction to folded Reed-Solomon codes for achieving the optimal trade-off between rate and list error-correction radius. Our decoding algorithm is linear-algebraic, and involves solving a linear system to interpolate a multivariate polynomial, and then solving another structured linear system to retrieve the list of candidate polynomials f. The algorithm for derivative codes offers some advantages compared to a similar one for folded Reed-Solomon codes in terms of efficient unique decoding in the presence of side information.


symposium on discrete algorithms | 2017

Maximally recoverable codes for grid-like topologies

Parikshit Gopalan; Guangda Hu; Swastik Kopparty; Shubhangi Saraf; Carol Wang; Sergey Yekhanin

The explosion in the volumes of data being stored online has resulted in distributed storage systems transitioning to erasure coding based schemes. Yet, the codes being deployed in practice are fairly short. In this work, we address what we view as the main coding theoretic barrier to deploying longer codes in storage: at large lengths, failures are not independent and correlated failures are inevitable. This motivates designing codes that allow quick data recovery even after large correlated failures, and which have efficient encoding and decoding. We propose that code design for distributed storage be viewed as a two-step process. The first step is choose a topology of the code, which incorporates knowledge about the correlated failures that need to be handled, and ensures local recovery from such failures. In the second step one specifies a code with the chosen topology by choosing coefficients from a finite field. In this step, one tries to balance reliability (which is better over larger fields) with encoding and decoding efficiency (which is better over smaller fields). This work initiates an in-depth study of this reliability/efficiency tradeoff. We consider the field-size needed for achieving maximal recoverability: the strongest reliability possible with a given topology. We propose a family of topologies called grid-like topologies which unify a number of topologies considered both in theory and practice, and prove a collection of results about maximally recoverable codes in such topologies including the first super-polynomial lower bound on the field size.


international workshop and international workshop on approximation randomization and combinatorial optimization algorithms and techniques | 2015

Deletion Codes in the High-noise and High-rate Regimes

Venkatesan Guruswami; Carol Wang

The noise model of deletions poses significant challenges in coding theory, with basic questions like the capacity of the binary deletion channel still being open. In this paper, we study the harder model of worst-case deletions, with a focus on constructing efficiently encodable and decodable codes for the two extreme regimes of high-noise and high-rate. Specifically, we construct polynomial-time decodable codes with the following trade-offs (for any epsilon > 0): (1) Codes that can correct a fraction 1-epsilon of deletions with rate poly(eps) over an alphabet of size poly(1/epsilon); (2) Binary codes of rate 1-O~(sqrt(epsilon)) that can correct a fraction eps of deletions; and (3) Binary codes that can be list decoded from a fraction (1/2-epsilon) of deletions with rate poly(epsion) Our work is the first to achieve the qualitative goals of correcting a deletion fraction approaching 1 over bounded alphabets, and correcting a constant fraction of bit deletions with rate aproaching 1. The above results bring our understanding of deletion code constructions in these regimes to a similar level as worst-case errors.


allerton conference on communication, control, and computing | 2016

On the capacity of the binary adversarial wiretap channel

Carol Wang

New bounds on the semantic secrecy capacity of the binary adversarial wiretap channel are established. Against an adversary which reads a ρ<inf>r</inf> fraction of the transmitted codeword and modifies a ρ<inf>w</inf> fraction of the codeword, we show an achievable rate of 1 − h(ρ<inf>w</inf>) − ρ<inf>r</inf>, where h(·) is the binary entropy function. We also give an upper bound which is nearly matching when ρ<inf>r</inf> is small.


Electronic Colloquium on Computational Complexity | 2013

Explicit rank-metric codes list-decodable with optimal redundancy

Venkatesan Guruswami; Carol Wang


IEEE Transactions on Information Theory | 2017

Deletion Codes in the High-Noise and High-Rate Regimes

Venkatesan Guruswami; Carol Wang


IEEE Transactions on Information Theory | 2016

Explicit List-Decodable Rank-Metric and Subspace Codes via Subspace Designs

Venkatesan Guruswami; Carol Wang; Chaoping Xing


Electronic Colloquium on Computational Complexity | 2012

Linear-algebraic list decoding for variants of Reed-Solomon codes.

Venkatesan Guruswami; Carol Wang

Collaboration


Dive into the Carol Wang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vincent Y. F. Tan

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Ling-Hua Chang

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Po-Ning Chen

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Yunghsiang S. Han

Dongguan University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ameya Velingker

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chaoping Xing

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Mehul Motani

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge