• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

List-Decodable Codes

Cached

  • Download as a PDF

Download Links

  • [www.deas.harvard.edu]
  • [www.eecs.harvard.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by n.n.
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{n.n._list-decodablecodes,
    author = {n.n.},
    title = { List-Decodable Codes},
    year = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

The field of coding theory is motivated by the problem of communicating reliably over noisy channels — where the data sent over the channel may come out corrupted on the other end, but we nevertheless want the receiver to be able to correct the errors and recover the original message. There is a vast literature studying aspects of this problem from the perspectives of electrical engineering (communications and information theory), computer science (algorithms and complexity), and mathematics (combinatorics and algebra). In this survey, we are interested in codes as “pseudorandom objects. ” In particular, a generalization of the notion of an error-correcting code yields a framework that we will use to unify all of the main pseudorandom objects covered in this survey (averaging samplers, expander graphs, randomness extractors, list-decodable codes, pseudorandom generators).

Keyphrases

list-decodable code    expander graph    error-correcting code yield    noisy channel    pseudorandom object    original message    computer science    electrical engineering    data sent    information theory    vast literature    main pseudorandom object    randomness extractor    pseudorandom generator   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University