Constrained codes as networks of relations

Mosche Schwartz, Jehoshua Bruck

Research output: Contribution to journalArticlepeer-review

21 Scopus citations

Abstract

We address the well-known problem of determining the capacity of constrained coding systems. While the one-dimensional case is well understood to the extent that there are techniques for rigorously deriving the exact capacity, in contrast, computing the exact capacity of a two-dimensional constrained coding system is still an elusive research challenge. The only known exception in the two-dimensional case is an exact (however, not rigorous) solution to the (1,∞) -run-length limited (RLL) system on the hexagonal lattice. Furthermore, only exponential-time algorithms are known for the related problem of counting the exact number of constrained two-dimensional information arrays. We present the first known rigorous technique that yields an exact capacity of a two-dimensional constrained coding system. In addition, we devise an efficient (polynomial time) algorithm for counting the exact number of constrained arrays of any given size. Our approach is a composition of a number of ideas and techniques: describing the capacity problem as a solution to a counting problem in networks of relations, graph-theoretic tools originally developed in the field of statistical mechanics, techniques for efficiently simulating quantum circuits, as well as ideas from the theory related to the spectral distribution of Toeplitz matrices. Using our technique, we derive a closed-form solution to the capacity related to the Path-Cover constraint in a two-dimensional triangular array (the resulting calculated capacity is 0.72399217...). Path-Cover is a generalization of the well known one-dimensional (0.1) b-RLL constraint for which the capacity is known to be 0.69424....

Original languageEnglish
Pages (from-to)2179-2195
Number of pages17
JournalIEEE Transactions on Information Theory
Volume54
Issue number5
DOIs
StatePublished - 1 May 2008

Keywords

  • Capacity of constrained systems
  • Capacity of twodimensional constrained systems
  • Fisher-Kasteleyn-Temperley (FKT) method
  • Holographic reductions
  • Networks of relations
  • Spectral distribution of Toeplitz matrices

Fingerprint

Dive into the research topics of 'Constrained codes as networks of relations'. Together they form a unique fingerprint.

Cite this