Batch codes, introduced by Ishai \textit{et al.}, encode a string $x \in \Sigma^{k}$ into an $m$-tuple of strings, called buckets. In this paper we consider multiset batch codes wherein a set of $t$-users wish to access one bit of information each from the original string. We introduce a concept of optimal batch codes. We first show that binary Hamming codes are optimal batch codes. The main body of this work provides batch properties of Reed-Muller codes. We look at locality and availability properties of first order Reed-Muller codes over any finite field. We then show that binary first order Reed-Muller codes are optimal batch codes when the number of users is 4 and generalize our study to the family of binary Reed-Muller codes which hav...
Lineaarseid partiikoode saab kasutada koormuse ühtlustamiseks hajusandmetalletussüsteemides. Selleks...
In recent years, the production of sequential data has been rapidly increasing. This requires solvin...
We present an asymptotic limit between correctable and uncor-rectable errors on the Reed-Muller code...
Batch codes, introduced by Ishai \textit{et al.}, encode a string $x \in \Sigma^{k}$ into an $m$-tup...
In this paper, we study batch codes, which were introduced by Ishai, Kushilevitz, Ostrovsky and Saha...
A batch code encodes a string x into an m-tuple of strings, called buckets, such that each batch of ...
Given a self-similar structure in codes and de Bruijn sequences, recursive techniques may be used to...
Batch codes, introduced by Ishai, Kushilevitz, Ostrovsky and Sahai, represent the distributed storag...
In this paper, we introduce t-revealing codes in the binary Hamming space F-n. Let C subset of F-n b...
Consider a large database of n data items that need to be stored using m servers. We study how to en...
The notion of a Private Information Retrieval (PIR) code was recently introduced by Fazeli, Vardy an...
The class of multiset combinatorial batch codes (MCBCs) was introduced by Zhang et al. (2018) as a g...
Huffman coding is well known to be useful in certain decision problems involving minimizing the aver...
AbstractFor Reed–Solomon codes with block length n and dimension k, the Johnson theorem states that ...
A binary code of blocklength $n$ and codebook size $M$ is called an $(n,M)$ code, which is studied f...
Lineaarseid partiikoode saab kasutada koormuse ühtlustamiseks hajusandmetalletussüsteemides. Selleks...
In recent years, the production of sequential data has been rapidly increasing. This requires solvin...
We present an asymptotic limit between correctable and uncor-rectable errors on the Reed-Muller code...
Batch codes, introduced by Ishai \textit{et al.}, encode a string $x \in \Sigma^{k}$ into an $m$-tup...
In this paper, we study batch codes, which were introduced by Ishai, Kushilevitz, Ostrovsky and Saha...
A batch code encodes a string x into an m-tuple of strings, called buckets, such that each batch of ...
Given a self-similar structure in codes and de Bruijn sequences, recursive techniques may be used to...
Batch codes, introduced by Ishai, Kushilevitz, Ostrovsky and Sahai, represent the distributed storag...
In this paper, we introduce t-revealing codes in the binary Hamming space F-n. Let C subset of F-n b...
Consider a large database of n data items that need to be stored using m servers. We study how to en...
The notion of a Private Information Retrieval (PIR) code was recently introduced by Fazeli, Vardy an...
The class of multiset combinatorial batch codes (MCBCs) was introduced by Zhang et al. (2018) as a g...
Huffman coding is well known to be useful in certain decision problems involving minimizing the aver...
AbstractFor Reed–Solomon codes with block length n and dimension k, the Johnson theorem states that ...
A binary code of blocklength $n$ and codebook size $M$ is called an $(n,M)$ code, which is studied f...
Lineaarseid partiikoode saab kasutada koormuse ühtlustamiseks hajusandmetalletussüsteemides. Selleks...
In recent years, the production of sequential data has been rapidly increasing. This requires solvin...
We present an asymptotic limit between correctable and uncor-rectable errors on the Reed-Muller code...