Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where V. Lalitha is active.

Publication


Featured researches published by V. Lalitha.


international symposium on information theory | 2012

Optimal linear codes with a local-error-correction property

N. Prakash; Govinda M. Kamath; V. Lalitha; P. Vijay Kumar

Motivated by applications to distributed storage, Gopalan et al recently introduced the interesting notion of information-symbol locality in a linear code. By this it is meant that each message symbol appears in a parity-check equation associated with small Hamming weight, thereby enabling recovery of the message symbol by examining a small number of other code symbols. This notion is expanded to the case when all code symbols, not just the message symbols, are covered by such “local” parity. In this paper, we extend the results of Gopalan et. al. so as to permit recovery of an erased code symbol even in the presence of errors in local parity symbols. We present tight bounds on the minimum distance of such codes and exhibit codes that are optimal with respect to the local error-correction property. As a corollary, we obtain an upper bound on the minimum distance of a concatenated code.


information theory and applications | 2013

Codes with local regeneration

Govinda M. Kamath; N. Prakash; V. Lalitha; P. Vijay Kumar

Regenerating codes and codes with locality are two schemes that have recently been proposed to ensure data collection and reliability in a distributed storage network. In a situation where one is attempting to repair a failed node, regenerating codes seek to minimize the amount of data downloaded for node repair, while codes with locality attempt to minimize the number of helper nodes accessed. In this paper, we provide several constructions for a class of vector codes with locality in which the local codes are regenerating codes, that enjoy both advantages. We derive an upper bound on the minimum distance of this class of codes and show that the proposed constructions achieve this bound. The constructions include both the cases where the local regenerating codes correspond to the MSR as well as the MBR point on the storage-repair-bandwidth tradeoff curve of regenerating codes.


IEEE Transactions on Information Theory | 2014

Codes With Local Regeneration and Erasure Correction

Govinda M. Kamath; N. Prakash; V. Lalitha; P. Vijay Kumar

Regenerating codes and codes with locality are two coding schemes that have recently been proposed, which in addition to ensuring data collection and reliability, also enable efficient node repair. In a situation where one is attempting to repair a failed node, regenerating codes seek to minimize the amount of data downloaded for node repair, while codes with locality attempt to minimize the number of helper nodes accessed. This paper presents results in two directions. In one, this paper extends the notion of codes with locality so as to permit local recovery of an erased code symbol even in the presence of multiple erasures, by employing local codes having minimum distance >2. An upper bound on the minimum distance of such codes is presented and codes that are optimal with respect to this bound are constructed. The second direction seeks to build codes that combine the advantages of both codes with locality as well as regenerating codes. These codes, termed here as codes with local regeneration, are codes with locality over a vector alphabet, in which the local codes themselves are regenerating codes. We derive an upper bound on the minimum distance of vector-alphabet codes with locality for the case when their constituent local codes have a certain uniform rank accumulation property. This property is possessed by both minimum storage regeneration (MSR) and minimum bandwidth regeneration (MBR) codes. We provide several constructions of codes with local regeneration which achieve this bound, where the local codes are either MSR or MBR codes. Also included in this paper, is an upper bound on the minimum distance of a general vector code with locality as well as the performance comparison of various code constructions of fixed block length and minimum distance.


international symposium on information theory | 2014

Codes with locality for two erasures

N. Prakash; V. Lalitha; P. Vijay Kumar

In this paper, we study codes with locality that can recover from two erasures via a sequence of two local, parity-check computations. By a local parity-check computation, we mean recovery via a single parity-check equation associated with small Hamming weight. Earlier approaches considered recovery in parallel; the sequential approach allows us to potentially construct codes with improved minimum distance. These codes, which we refer to as locally 2-reconstructible codes, are a natural generalization along one direction, of codes with all-symbol locality introduced by Gopalan et al, in which recovery from a single erasure is considered. By studying the generalized Hamming weights of the dual code, we derive upper bounds on the minimum distance of locally 2-reconstructible codes and provide constructions for a family of codes based on Turán graphs, that are optimal with respect to this bound. The minimum distance bound derived here is universal in the sense that no code which permits all-symbol local recovery from 2 erasures can have larger minimum distance regardless of approach adopted. Our approach also leads to a new bound on the minimum distance of codes with all-symbol locality for the single-erasure case.


international symposium on information theory | 2013

Explicit MBR all-symbol locality codes

Govinda M. Kamath; Natalia Silberstein; N. Prakash; Ankit Singh Rawat; V. Lalitha; Onur Ozan Koyluoglu; P. Vijay Kumar; Sriram Vishwanath

Node failures are inevitable in distributed storage systems (DSS). To enable efficient repair when faced with such failures, two main techniques are known: Regenerating codes, i.e., codes that minimize the total repair bandwidth; and codes with locality, which minimize the number of nodes participating in the repair process. This paper focuses on regenerating codes with locality, using pre-coding based on Gabidulin codes, and presents constructions that utilize minimum bandwidth regenerating (MBR) local codes. The constructions achieve maximum resilience (i.e., optimal minimum distance) and have maximum capacity (i.e., maximum rate). Finally, the same pre-coding mechanism can be combined with a subclass of fractional-repetition codes to enable maximum resilience and repair-by-transfer simultaneously.


allerton conference on communication, control, and computing | 2011

A nested linear codes approach to distributed function computation over subspaces

V. Lalitha; N. Prakash; K. Vinodh; P. Vijay Kumar; S. Sandeep Pradhan

In this paper, we consider a distributed function computation setting, where there are m distributed but correlated sources X1, …, Xm and a receiver interested in computing an s-dimensional subspace generated by [X1, …, Xm]T for some (to x s) matrix Γ of rank s. We construct a scheme based on nested linear codes and characterize the achievable rates obtained using the scheme. The proposed nested-linear-code approach performs at least as well as the Slepian-Wolf scheme in terms of sum-rate performance for all subspaces and source distributions. In addition, for a large class of distributions and subspaces, the scheme improves upon the Slepian-Wolf approach. The nested-linear-code scheme may be viewed as uniting under a common framework, both the Korner-Marton approach of using a common linear encoder as well as the Slepian-Wolf approach of employing different encoders at each source. Along the way, we prove an interesting and fundamental structural result on the nature of subspaces of an m-dimensional vector space V with respect to a normalized measure of entropy. Here, each element in V corresponds to a distinct linear combination of a set {Xi}mi=1 of m random variables whose joint probability distribution function is given.


allerton conference on communication, control, and computing | 2010

On the achievable rates of sources having a group alphabet in a distributed source coding setting

K. Vinodh; V. Lalitha; N. Prakash; P. Vijay Kumar; S. Sandeep Pradhan

We consider the problem of compression via homomorphic encoding of a source having a group alphabet. This is motivated by the problem of distributed function computation, where it is known that if one is only interested in computing a function of several sources, then one can at times improve upon the compression rate required by the Slepian-Wolf bound. The functions of interest are those which could be represented by the binary operation in the group.


IEEE Journal on Selected Areas in Communications | 2013

Linear Coding Schemes for the Distributed Computation of Subspaces

V. Lalitha; N. Prakash; K. Vinodh; P.V. Kumar; S. Sandeep Pradhan

Let X1, ..., Xm be a set of m statistically dependent sources over the common alphabet Fq, that are linearly independent when considered as functions over the sample space. We consider a distributed function computation setting in which the receiver is interested in the lossless computation of the elements of an s-dimensional subspace W spanned by the elements of the row vector [X1, ..., Xm]Γ in which the (m × s) matrix Γ has rank s. A sequence of three increasingly refined approaches is presented, all based on linear encoders. The first approach uses a common matrix to encode all the sources and a Korner-Marton like receiver to directly compute W. The second improves upon the first by showing that it is often more efficient to compute a carefully chosen superspace U of W. The superspace is identified by showing that the joint distribution of the {Xi} induces a unique decomposition of the set of all linear combinations of the {Xi}, into a chain of subspaces identified by a normalized measure of entropy. This subspace chain also suggests a third approach, one that employs nested codes. For any joint distribution of the {Xi} and any W, the sum-rate of the nested code approach is no larger than that under the Slepian-Wolf (SW) approach. Under the SW approach, W is computed by first recovering each of the {Xi}. For a large class of joint distributions and subspaces W, the nested code approach is shown to improve upon SW. Additionally, a class of source distributions and subspaces are identified, for which the nested-code approach is sum-rate optimal.


international conference on acoustics, speech, and signal processing | 2011

Subspace-based DOA estimation using Fractional Lower Order statistics

K. V. S. Hari; V. Lalitha

Direction Of Arrival (DOA) estimation, using a sensor array, in the presence of non-Gaussian noise using Fractional Lower-Order Moments (FLOM)matrices is studied. In this paper, a new FLOM based technique using the Fractional Lower Order Infinity Norm based Covariance (FLIC) Matrix is proposed. The bounded property and the low-rank subspace structure of the FLIC matrix is derived. Performance of FLIC based DOA estimation using MUSIC, ESPRIT, is shown to be better than other FLOM based methods.


Journal of Communications | 2010

DMT of Wireless Networks: An Overview (Invited Paper)

K. Vinodh; Nilmani Prakash; V. Lalitha; P. Vijay Kumar

The efficient operation of single-source, single-sink wireless networks is considered with the diversity-multiplexing gain tradeoff (DMT) as the measure of performance. Whereas in the case of a point-to-point MIMO channel the DMT is determined by the fading statistics, in the case of a network, the DMT is additionally, a function of the time schedule according to which the network is operated, as well as the protocol that dictates the mode of operation of the intermediate relays. In general, it is only possible at present, to provide upper bounds on the DMT of the network in terms of the DMT of the MIMO channel appearing across cuts in the network. This paper presents a tutorial overview on the DMT of half-duplex multi-hop wireless networks that also attempts to identify where possible, codes that achieve the DMT. For example, it is shown how one can construct codes that achieve the DMT of a network under a given schedule and either an amplify-and-forward or decode-andforward protocol. Also contained in the paper, are discussions on the DMT of the multiple-access channel as well as the impact of feedback on the DMT of a MIMO channel.

Collaboration


Dive into the V. Lalitha's collaboration.

Top Co-Authors

Avatar

N. Prakash

Indian Institute of Science

View shared research outputs
Top Co-Authors

Avatar

P. Vijay Kumar

Indian Institute of Science

View shared research outputs
Top Co-Authors

Avatar

K. Vinodh

Indian Institute of Science

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

K. V. S. Hari

Indian Institute of Science

View shared research outputs
Top Co-Authors

Avatar

M. Nikhil Krishnan

Indian Institute of Science

View shared research outputs
Top Co-Authors

Avatar

N. E. Venkatesan

Indian Institute of Science

View shared research outputs
Top Co-Authors

Avatar

P.V. Kumar

Indian Institute of Science

View shared research outputs
Researchain Logo
Decentralizing Knowledge