Interactive error correcting codesInteractive error correcting codes are codes that encode a two party communication protocol to an error-resilient protocol that succeeds even if a constant fraction of the communicated symbols are adversarially corrupted, at the cost of increasing the communication by a constant factor. What is the largest fraction of corruptions that such codes can protect against? If the error-resilient protocol is allowed to communicate large (constant sized) symbols, Braverman and Rao (STOC, 2011) show that the maximum rate of corruptions that can be tolerated is 1 /4. They also give a binary interactive error correcting protocol that only communicates bits and is resilient to 1 /2 fraction of errors, but leave the opti...
Consider two parties who wish to communicate in order to execute some interactive protocol pi. Howev...
Abstract—Motivated by distributed storage applications, we investigate the degree to which capacity ...
We study data structures in the presence of adversarial noise. We want to encode a given object in a...
The problem of constructing error-resilient interactive protocols was introduced in the seminal work...
We consider the task of interactive communication in the presence of adversarial errors and present ...
We consider the task of interactive communication in the presence of adversarial errors and present ...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
How can we encode a communication protocol between two parties to become resilient to adversarial er...
We consider distributed computations between two parties carried out over a noisy channel that may e...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
Error-correcting codes tackle the fundamental problem of recovering from errors during data communic...
When two remote parties wish to perform some computation given that their communication channel may ...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
In this work, we shall investigate error correction in binary messages of finite arbitrary length in...
In interactive coding, Alice and Bob wish to compute some function $f$ of their individual private i...
Consider two parties who wish to communicate in order to execute some interactive protocol pi. Howev...
Abstract—Motivated by distributed storage applications, we investigate the degree to which capacity ...
We study data structures in the presence of adversarial noise. We want to encode a given object in a...
The problem of constructing error-resilient interactive protocols was introduced in the seminal work...
We consider the task of interactive communication in the presence of adversarial errors and present ...
We consider the task of interactive communication in the presence of adversarial errors and present ...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
How can we encode a communication protocol between two parties to become resilient to adversarial er...
We consider distributed computations between two parties carried out over a noisy channel that may e...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
Error-correcting codes tackle the fundamental problem of recovering from errors during data communic...
When two remote parties wish to perform some computation given that their communication channel may ...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
In this work, we shall investigate error correction in binary messages of finite arbitrary length in...
In interactive coding, Alice and Bob wish to compute some function $f$ of their individual private i...
Consider two parties who wish to communicate in order to execute some interactive protocol pi. Howev...
Abstract—Motivated by distributed storage applications, we investigate the degree to which capacity ...
We study data structures in the presence of adversarial noise. We want to encode a given object in a...