Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yuval Cassuto is active.

Publication


Featured researches published by Yuval Cassuto.


IEEE Transactions on Information Theory | 2010

Codes for Asymmetric Limited-Magnitude Errors With Application to Multilevel Flash Memories

Yuval Cassuto; Moshe Schwartz; Vasken Bohossian; Jehoshua Bruck

Several physical effects that limit the reliability and performance of multilevel flash memories induce errors that have low magnitudes and are dominantly asymmetric. This paper studies block codes for asymmetric limited-magnitude errors over q-ary channels. We propose code constructions and bounds for such channels when the number of errors is bounded by t and the error magnitudes are bounded by l. The constructions utilize known codes for symmetric errors, over small alphabets, to protect large-alphabet symbols from asymmetric limited-magnitude errors. The encoding and decoding of these codes are performed over the small alphabet whose size depends only on the maximum error magnitude and is independent of the alphabet size of the outer code. Moreover, the size of the codes is shown to exceed the sizes of known codes (for related error models), and asymptotic rate-optimality results are proved. Extensions of the construction are proposed to accommodate variations on the error model and to include systematic codes as a benefit to practical implementation.


IEEE Transactions on Information Theory | 2009

Cyclic Lowest Density MDS Array Codes

Yuval Cassuto; Jehoshua Bruck

Three new families of lowest density maximum-distance separable (MDS) array codes are constructed, which are cyclic or quasi-cyclic. In addition to their optimal redundancy (MDS) and optimal update complexity (lowest density), the symmetry offered by the new codes can be utilized for simplified implementation in storage applications. The proof of the code properties has an indirect structure: first MDS codes that are not cyclic are constructed, and then transformed to cyclic codes by a minimum-distance preserving transformation.


international symposium on information theory | 2007

Codes for Multi-Level Flash Memories: Correcting Asymmetric Limited-Magnitude Errors

Yuval Cassuto; Moshe Schwartz; Vasken Bohossian; Jehoshua Bruck

Several physical effects that limit the reliability and performance of Multilevel Flash memories induce errors that have low magnitude and are dominantly asymmetric. This paper studies block codes for asymmetric limited-magnitude errors over q-ary channels. We propose code constructions for such channels when the number of errors is bounded by t. The construction uses known codes for symmetric errors over small alphabets to protect large-alphabet symbols from asymmetric limited-magnitude errors. The encoding and decoding of these codes are performed over the small alphabet whose size depends only on the maximum error magnitude and is independent of the alphabet size of the outer code. An extension of the construction is proposed to include systematic codes as a benefit to practical implementation.


Microelectronics Journal | 2014

Logic operations in memory using a memristive Akers array

Yifat Levy; Jehoshua Bruck; Yuval Cassuto; Eby G. Friedman; Avinoam Kolodny; Eitan Yaakobi; Shahar Kvatinsky

In-memory computation is one of the most promising features of memristive memory arrays. In this paper, we propose an array architecture that supports in-memory computation based on a logic array first proposed in 1972 by Sheldon Akers. The Akers logic array satisfies this objective since this array can realize any Boolean function, including bit sorting. We present a hardware version of a modified Akers logic array, where the values stored within the array serve as primary inputs. The proposed logic array uses memristors, which are nonvolatile memory devices with noteworthy properties. An Akers logic array with memristors combines memory and logic operations, where the same array stores data and performs computation. This combination opens opportunities for novel non-von Neumann computer architectures, while reducing power and enhancing memory bandwidth.


international symposium on information theory | 2006

Low Complexity Encoding for Network Codes

Sidharth Jaggi; Yuval Cassuto; Michelle Effros

In this paper we consider the per-node run-time complexity of network multicast codes. We show that the randomized algebraic network code design algorithms described extensively in the literature result in codes that on average require a number of operations that scales quadratically with the block-length m of the codes. We then propose an alternative type of linear network code whose complexity scales linearly in m and still enjoys the attractive properties of random algebraic network codes. We also show that these codes are optimal in the sense that any rate-optimal linear network code must have at least a linear scaling in run-time complexity


international symposium on information theory | 2013

Sneak-path constraints in memristor crossbar arrays

Yuval Cassuto; Shahar Kvatinsky; Eitan Yaakobi

In a memristor crossbar array, a memristor is positioned on each row-column intersection, and its resistance, low or high, represents two logical states. The state of every memristor can be sensed by the current flowing through the memristor. In this work, we study the sneak path problem in crossbars arrays, in which current can sneak through other cells, resulting in reading a wrong state of the memristor. Our main contributions are a new characterization of arrays free of sneak paths, and efficient methods to read the array cells while avoiding sneak paths. To each read method we match a constraint on the array content that guarantees sneak-path free readout, and calculate the resulting capacity.


IEEE Transactions on Information Theory | 2011

Codes for Symbol-Pair Read Channels

Yuval Cassuto; Mario Blaum

A new coding framework is established for channels whose outputs are overlapping pairs of symbols. Such channels are motivated by storage applications in which the spatial resolution of the reader may be insufficient to isolate adjacent symbols. Reading symbols as pairs changes the coding-theoretic error model from the standard bounded number of symbol errors to a bounded number of pair errors. Starting from the most basic coding-theoretic questions, the paper studies codes that protect against pair-errors. It provides answers on pair-error correctability conditions, code construction and decoding, and lower and upper bounds on code sizes. Asymptotic analysis of pair-error correction shows that there exist pair-error codes with rates that are strictly higher than the best known codes in the Hamming metric.


international symposium on information theory | 2006

Cyclic Low-Density MDS Array Codes

Yuval Cassuto; Jehoshua Bruck

We construct two infinite families of low density MDS array codes which are also cyclic. One of these families includes the first such sub-family with redundancy parameter r > 2. The two constructions have different algebraic formulations, though they both have the same indirect structure. First MDS codes that are not cyclic are constructed and then by applying a certain mapping to their parity check matrices, non-equivalent cyclic codes with the same distance and density properties are obtained. Using the same proof techniques, a third infinite family of quasi-cyclic codes can be constructed


ieee conference on mass storage systems and technologies | 2014

NAND flash architectures reducing write amplification through multi-write codes

Saher Odeh; Yuval Cassuto

Multi-write codes hold great promise to reduce write amplification in flash-based storage devices. In this work we propose two novel mapping architectures that show clear advantage over known schemes using multi-write codes, and over schemes not using such codes. We demonstrate the advantage of the proposed architectures by evaluating them with industry-accepted benchmark traces. The results show write amplification savings of double-digit percentages, for as low as 10% over-provisioning. In addition to showing the superiority of the new architectures on real-world workloads, the paper includes a study of the write-amplification performance on synthetically-generated workloads with time locality. In addition, some analytical insight is provided to assist the deployment of the architectures in real storage devices with varying device parameters.


international symposium on information theory | 2011

Symbol-pair codes: Algebraic constructions and asymptotic bounds

Yuval Cassuto; Simon Litsyn

For the recently proposed model of symbol-pair channels, we advance the pair-error coding theory with algebraic cyclic-code constructions and asymptotic bounds on code rates. Cyclic codes for pair-errors are constructed by a careful use of duals of known tools from cyclic-code theory. Asymptotic lower bounds on code rates show that codes for pair-errors provably exist for rates strictly higher than codes for the Hamming metric.

Collaboration


Dive into the Yuval Cassuto's collaboration.

Top Co-Authors

Avatar

Jehoshua Bruck

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Rami Cohen

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Evyatar Hemo

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Eitan Yaakobi

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Shahar Kvatinsky

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Moshe Schwartz

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Isaac Keslassy

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Michael Segal

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Tal Mizrahi

Technion – Israel Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge