We consider the task of interactive communication in the presence of adversarial errors and present tight bounds on the tolerable error-rates in a number of different settings. Most significantly, we explore adaptive interactive communication where the communicating parties decide who should speak next based on the history of the interaction. In particular, this allows this decision to depend on estimates of the amount of errors that have occurred so far. Braverman and Rao [STOC’11] show that non-adaptively one can code for any constant error rate below 1/4 but not more. They asked whether this bound could be improved using adaptivity. We answer this open question in the affirmative (with a slightly different collection of resources): Our a...
We revisit the problem of reliable interactive communication over a noisy channel, and obtain the fi...
Communication is a universal process by which two or more individuals exchange information. A commun...
Communication is critical to distributed computing, parallel computing, or any situation in which au...
We consider the task of interactive communication in the presence of adversarial errors and present ...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
Interactive error correcting codesInteractive error correcting codes are codes that encode a two par...
The problem of constructing error-resilient interactive protocols was introduced in the seminal work...
How can we encode a communication protocol between two parties to become resilient to adversarial er...
Consider two parties who wish to communicate in order to execute some interactive protocol pi. Howev...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
When two remote parties wish to perform some computation given that their communication channel may ...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
Error correction and message authentication are well studied in the literature, and various efficien...
We revisit the setting of coding for interactive communication, CIC, (initiated by Schulman 96\u27) ...
In interactive coding, Alice and Bob wish to compute some function $f$ of their individual private i...
We revisit the problem of reliable interactive communication over a noisy channel, and obtain the fi...
Communication is a universal process by which two or more individuals exchange information. A commun...
Communication is critical to distributed computing, parallel computing, or any situation in which au...
We consider the task of interactive communication in the presence of adversarial errors and present ...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
Interactive error correcting codesInteractive error correcting codes are codes that encode a two par...
The problem of constructing error-resilient interactive protocols was introduced in the seminal work...
How can we encode a communication protocol between two parties to become resilient to adversarial er...
Consider two parties who wish to communicate in order to execute some interactive protocol pi. Howev...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
When two remote parties wish to perform some computation given that their communication channel may ...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
Error correction and message authentication are well studied in the literature, and various efficien...
We revisit the setting of coding for interactive communication, CIC, (initiated by Schulman 96\u27) ...
In interactive coding, Alice and Bob wish to compute some function $f$ of their individual private i...
We revisit the problem of reliable interactive communication over a noisy channel, and obtain the fi...
Communication is a universal process by which two or more individuals exchange information. A commun...
Communication is critical to distributed computing, parallel computing, or any situation in which au...