A code C {0,1}^k →{0,1}^n is a q-locally decodable code
(q-LDC) if one c...
A simple, recently observed generalization of the classical Singleton bo...
For quantum error-correcting codes to be realizable, it is important tha...
We present an explicit construction of a sequence of rate 1/2 Wozencraft...
Reed–Solomon codes are a classic family of error-correcting codes consis...
In the setting of error-correcting codes with feedback, Alice wishes to
...
For a constraint satisfaction problem (CSP), a robust satisfaction algor...
We prove that the Minimum Distance Problem (MDP) on linear codes over an...
Polarization is an unprecedented coding technique in that it not only
ac...
Let ℋ(k,n,p) be the distribution on k-uniform hypergraphs where
every su...
A matrix A is said to have the ℓ_p-Restricted Isometry Property
(ℓ_p-RIP...
We consider the problem of designing low-redundancy codes in settings wh...
We prove the existence of Reed-Solomon codes of any desired rate R ∈
(0,...
We present an algorithm for strongly refuting smoothed instances of all
...
Random subspaces X of ℝ^n of dimension proportional to n are,
with high ...
We propose a framework to study the effect of local recovery requirement...
We introduce the problem of finding a satisfying assignment to a CNF for...
We revisit the linear programming bounds for the size vs. distance trade...
We prove that there exists an absolute constant δ>0 such any binary
code...
Promise Constraint Satisfaction Problems (PCSPs) are a generalization of...
An (n,r,h,a,q)-Local Reconstruction Code is a linear code over
𝔽_q of le...
The first part of the paper presents a review of the gold-standard testi...
We give an efficient algorithm to strongly refute semi-random
instances ...
The Shannon capacity of a graph is a fundamental quantity in zero-error
...
Suppose that 𝒫 is a property that may be satisfied by a random
code C ⊂Σ...
A famous conjecture of Tuza states that the minimum number of edges need...
We give an explicit construction of length-n binary codes capable of
cor...
This paper studies linear and affine error-correcting codes for
correcti...
A family of error-correcting codes is list-decodable from error fraction...
Modern distributed computation infrastructures are often plagued by
unav...
Let W be a binary-input memoryless symmetric (BMS) channel with Shannon
...
We give a complete answer to the following basic question: "What is the
...
In the field of constraint satisfaction problems (CSP), promise CSPs are...
Minimum storage regenerating (MSR) codes are MDS codes which allow for
r...
The k-ExactCover problem is a parameterized version of the ExactCover
pr...
Under the Strong Exponential Time Hypothesis, an integer linear program ...
Non-malleable secret sharing was recently studied by Goyal and Kumar in
...
We study the complexity of Boolean constraint satisfaction problems (CSP...
An (n,k,ℓ)-vector MDS code is a F-linear subspace of
(F^ℓ)^n (for some f...
We study the problem of approximating the value of a Unique Game instanc...
We show that the entire class of polar codes (up to a natural necessary
...
Locally repairable codes (LRCs) have received significant recent attenti...
Using a mild variant of polar codes we design linear compression schemes...
Local Reconstruction Codes (LRCs) allow for recovery from a small number...
Secret sharing is a fundamental cryptographic primitive. One of the main...
Promise CSPs are a relaxation of constraint satisfaction problems where ...
ϵ-Minimum Storage Regenerating (ϵ-MSR) codes form a special
class of Max...
A locally repairable code (LRC) with locality r allows for the recovery ...
We say a subset C ⊆{1,2,...,k}^n is a k-hash code (also
called k-separat...
We consider the (ℓ_p,ℓ_r)-Grothendieck problem, which seeks to
maximize ...