Abstract
We investigate the problem of local reconstruction, as deflned by Saks and Seshadhri (2008), in the context of error correcting codes. The flrst problem we address is that of message reconstruction, where given oracle access to a corrupted encoding w 2 f0;1g n of some message x 2 f0;1g k our goal is to probabilistically recover x (or some portion of it). This should be done by a procedure (reconstructor) that given an index i as input, probes w at few locations and outputs the value of xi. The reconstructor can (and indeed must) be randomized, with all its randomness specifled in advance by a single random seed, and the main requirement is that for most random seeds, all values are reconstructed correctly (notice that swapping the order of \for most random seeds and \for all x1;:::;xk makes the deflnition equivalent to standard Local Decoding). A message reconstructor can serve as a \fllter that allows evaluating certain classes of algorithms on x safely and e-ciently. For instance, to run a parallel algorithm, one can initialize several copies of the reconstructor with the same random seed, and then they can autonomously handle decoding requests while producing outputs that are consistent with the original message x. Another motivation for studying message reconstruction arises from the theory of Locally Decodable Codes. The second problem that we address is codeword reconstruction, which is similarly deflned, but instead of reconstructing the message the goal is to reconstruct the codeword itself, given an oracle access to its corrupted version. Error correcting codes that admit message and codeword reconstruction can be obtained from Locally Decodable Codes (LDC) and Self Correctible Codes (SCC) respectively. The main contribution of this paper is a proof that in terms of query complexity, these are close to be the best possible constructions, even when we disregard the length of the encoding.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Similar Papers
More From: Theory of Computing
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.