ieee transections on information theory - technion

10
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013 1573 Tilings With -Dimensional Chairs and Their Applications to Asymmetric Codes Sarit Buzaglo and Tuvi Etzion, Fellow, IEEE Abstract—An -dimensional chair consists of an -dimensional box from which a smaller -dimensional box is removed. A tiling of an -dimensional chair has two nice applications in some memories using asymmetric codes. The rst one is in the design of codes that correct asymmetric errors with limited magnitude. The second one is in the design of cells -ary write-once memory codes. We show an equivalence between the design of a tiling with an integer lat- tice and the design of a tiling from a generalization of splitting (or of Sidon sequences). A tiling of an -dimensional chair can dene a perfect code for correcting asymmetric errors with limited mag- nitude. We present constructions for such tilings and prove cases where perfect codes for these type of errors do not exist. Index Terms—Asymmetric limited-magnitude errors, lattice, -dimensional chair, perfect codes, splitting, tiling, write-once memory (WOM) codes. I. INTRODUCTION S TORAGE media that are constrained to change of values in any location of information only in one direction were constructed throughout the last fty years. From the older punch cards to later optical disks and modern storage such as ash memories, there was a need to design coding that enables the values of information to be increased but not to be decreased. These kind of storage medias are asymmetric memories. We will call the codes used in these medias, asymmetric codes. Some of these memories behave as write-once memories (or WOMs in short) and coding for them was rst considered in the seminal work of Rivest and Shamir [19]. This work initiated a sequence of papers on this topic, e.g., [6], [9], [10], [32], and [37]. The emerging new storage media of ash memory raised many new interesting problems. Flash memory is a nonvolatile reliable memory with high storage density. Its relatively low cost makes it the ideal memory to replace the magnetic recording technology in storage media. A multilevel ash cell is electronically programmed into threshold levels that can be viewed as elements of the set . Raising the charge level of a cell is an easy operation, but reducing the charge level of a single cell requires to erase the whole block Manuscript received April 18, 2012; revised August 12, 2012; accepted Oc- tober 15, 2012. Date of current version November 12, 2012; date of current version February 12, 2013. This work was supported in part by the Israel Sci- ence Foundation, Jerusalem, Israel, under Grant 230/08. The authors are with the Department of Computer Science, Technion—Israel Institute of Technology, Haifa 32000, Israel (e-mail: [email protected]; [email protected]). Communicated by O. Milenkovic, Associate Editor for Coding Theory. Digital Object Identier 10.1109/TIT.2012.2226925 to which the cell belongs. This makes the reducing of a charge level to be a complicated, slow, and unwanted operation. Hence, the cells of the ash memory act as an asymmetric memory as long as blocks are not erased. This has motivated new research work on WOMs, e.g., [5], [22], [31], [34], and [36]. Moreover, usually in programming of the cells, we let the charge level in a single cell of a ash memory only to be raised, and hence, the errors in a single cell will be asymmetric. Asym- metric error-correcting codes were subject to extensive research due to their applications in coding for computer memories [18]. The errors in a cell of a ash memory are a new type of asym- metric errors that have limited magnitude. Errors in this model are in one direction and are not likely to exceed a certain limit. This means that a cell in level can be raised by an error to level , such that and , where is the error limited magnitude. Asymmetric error-correcting codes with limited magnitude were proposed in [1] and were rst considered for nonvolatile memories in [3] and [4]. Re- cently, several other papers have considered the problem, e.g., [7], [8], [13], and [35]. In this work, we will consider a solution for both the construction problem of asymmetric codes with limited magnitude and the coding problem in WOMs. Our proposed solution will use an older concept in combinatorics named tiling. Given an -dimensional shape , a tiling of with consists of disjoint copies of such that each point of is covered by exactly one copy of . Tiling is a well-established concept in combinatorics and especially in combinatorial geometry. There are many algebraic methods related to tiling [28] and it is an important topic also in coding theory. For example, perfect codes are associated with tilings, where the related sphere is the -dimensional shape . Tiling is done with a shape and we consider only shapes that form an error sphere for asymmetric limited-magnitude codes or their immediate generalization in . The denition of a tiling in will be given in Section II. Two of the most considered shapes for tiling are the cross and the semicross [26], [28]. These were also considered in con- nections to ash memories [21]. In this paper, we will consider another shape which will be called in the sequel an -dimen- sional chair. An -dimensional chair is an -dimensional box from which a smaller -dimensional box is removed from one of its corners. This is a generalization of the original concept which is an -cube from which one vertex was removed [16]. In other places, this shape is called a notched cube [15], [20], [27]. Lattice tiling with this shape will be discussed, regardless of the length of each side of the larger box and the length of each side of the smaller box. We will show an equivalent way 0018-9448/$31.00 © 2012 IEEE

Upload: others

Post on 02-Mar-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IEEE Transections on Information Theory - Technion

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013 1573

Tilings With -Dimensional Chairs and TheirApplications to Asymmetric Codes

Sarit Buzaglo and Tuvi Etzion, Fellow, IEEE

Abstract—An -dimensional chair consists of an -dimensionalbox fromwhich a smaller -dimensional box is removed. A tiling ofan -dimensional chair has two nice applications in somememoriesusing asymmetric codes. The first one is in the design of codes thatcorrect asymmetric errors with limited magnitude. The second oneis in the design of cells -ary write-once memory codes. We showan equivalence between the design of a tiling with an integer lat-tice and the design of a tiling from a generalization of splitting (orof Sidon sequences). A tiling of an -dimensional chair can definea perfect code for correcting asymmetric errors with limited mag-nitude. We present constructions for such tilings and prove caseswhere perfect codes for these type of errors do not exist.

Index Terms—Asymmetric limited-magnitude errors, lattice,-dimensional chair, perfect codes, splitting, tiling, write-oncememory (WOM) codes.

I. INTRODUCTION

S TORAGE media that are constrained to change of valuesin any location of information only in one direction were

constructed throughout the last fifty years. From the older punchcards to later optical disks and modern storage such as flashmemories, there was a need to design coding that enables thevalues of information to be increased but not to be decreased.These kind of storagemedias are asymmetric memories.Wewillcall the codes used in these medias, asymmetric codes. Some ofthese memories behave as write-once memories (or WOMs inshort) and coding for them was first considered in the seminalwork of Rivest and Shamir [19]. This work initiated a sequenceof papers on this topic, e.g., [6], [9], [10], [32], and [37].The emerging new storage media of flash memory raised

many new interesting problems. Flash memory is a nonvolatilereliable memory with high storage density. Its relativelylow cost makes it the ideal memory to replace the magneticrecording technology in storage media. A multilevel flash cellis electronically programmed into threshold levels that canbe viewed as elements of the set . Raisingthe charge level of a cell is an easy operation, but reducing thecharge level of a single cell requires to erase the whole block

Manuscript received April 18, 2012; revised August 12, 2012; accepted Oc-tober 15, 2012. Date of current version November 12, 2012; date of currentversion February 12, 2013. This work was supported in part by the Israel Sci-ence Foundation, Jerusalem, Israel, under Grant 230/08.The authors are with the Department of Computer Science, Technion—Israel

Institute of Technology, Haifa 32000, Israel (e-mail: [email protected];[email protected]).Communicated by O. Milenkovic, Associate Editor for Coding Theory.Digital Object Identifier 10.1109/TIT.2012.2226925

to which the cell belongs. This makes the reducing of a chargelevel to be a complicated, slow, and unwanted operation. Hence,the cells of the flash memory act as an asymmetric memory aslong as blocks are not erased. This has motivated new researchwork on WOMs, e.g., [5], [22], [31], [34], and [36].Moreover, usually in programming of the cells, we let the

charge level in a single cell of a flash memory only to be raised,and hence, the errors in a single cell will be asymmetric. Asym-metric error-correcting codes were subject to extensive researchdue to their applications in coding for computer memories [18].The errors in a cell of a flash memory are a new type of asym-metric errors that have limited magnitude. Errors in this modelare in one direction and are not likely to exceed a certain limit.This means that a cell in level can be raised by an error tolevel , such that and , whereis the error limited magnitude. Asymmetric error-correctingcodes with limited magnitude were proposed in [1] and werefirst considered for nonvolatile memories in [3] and [4]. Re-cently, several other papers have considered the problem, e.g.,[7], [8], [13], and [35].In this work, we will consider a solution for both the

construction problem of asymmetric codes with limitedmagnitude and the coding problem in WOMs. Our proposedsolution will use an older concept in combinatorics namedtiling. Given an -dimensional shape , a tiling of

with consists of disjoint copies of such that eachpoint of is covered by exactly one copy of . Tiling is awell-established concept in combinatorics and especially incombinatorial geometry. There are many algebraic methodsrelated to tiling [28] and it is an important topic also in codingtheory. For example, perfect codes are associated with tilings,where the related sphere is the -dimensional shape . Tiling isdone with a shape and we consider only shapes that form anerror sphere for asymmetric limited-magnitude codes or theirimmediate generalization in . The definition of a tiling inwill be given in Section II.Two of the most considered shapes for tiling are the cross

and the semicross [26], [28]. These were also considered in con-nections to flash memories [21]. In this paper, we will consideranother shape which will be called in the sequel an -dimen-sional chair. An -dimensional chair is an -dimensional boxfrom which a smaller -dimensional box is removed from oneof its corners. This is a generalization of the original conceptwhich is an -cube from which one vertex was removed [16].In other places, this shape is called a notched cube [15], [20],[27]. Lattice tiling with this shape will be discussed, regardlessof the length of each side of the larger box and the length ofeach side of the smaller box. We will show an equivalent way

0018-9448/$31.00 © 2012 IEEE

Page 2: IEEE Transections on Information Theory - Technion

1574 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013

to present a lattice tiling. This method will be called a general-ized splitting and it generalizes the concepts of splitting definedin [23]; and the concept of sequences defined and used forthe construction of codes correcting asymmetric errors with lim-ited magnitude in [13]. We will show two applications of tilingswith such a shape. One application is for the construction ofcodes that correct up to asymmetric limited-magnitudeerrors with any given magnitude for each cell; and a second ap-plication is for constructing WOM codes with multiple writing.In the first part of this work, we will consider only tilings with-dimensional chairs. In the second part of this work, we willconsider the applications of tilings with -dimensional chairs.The rest of this paper is organized as follows. In Section II, wedefine the basic concepts for our presentation of tilings with-dimensional chairs. We define the concepts of an -dimen-sional chair and a tiling of the space with a given shape. Wepresent the -dimensional chair as a shape in . When the-dimensional chair consists of unit cubes connected only byunit cubes of smaller dimensions, the -dimensional chair canbe represented as a shape in . For such a shape, we will seekfor an integer tiling. We will be interested in this paper only inlattice tiling and when the shape is in only in integer lat-tice tiling. Two representations for tiling with a shape will begiven. The first representation is with a generator matrix for thelattice tiling and the second is by the concept which is called ageneralized splitting. We will show that these two representa-tions are equivalent. In Section III, we will present a construc-tion for tilings with -dimensional chairs based on generalizedsplitting. The construction will be based on properties of someAbelian groups. In Section IV, we will present a constructionof tiling with -dimensional chairs based on lattices. This con-struction works on any -dimensional chair, while the construc-tion of Section III works only on certain discrete ones. We notethat after the paper was written, it was brought to our attentionthat lattice tilings for notched cubes were given in [15], [20],and [27]. For completeness and since our proof is slightly dif-ferent, we kept this part in this paper. Tiling with a discrete -di-mensional chair can be viewed as a perfect code for correctionof asymmetric errors with limited magnitude. In Section V, wepresent the definition for such codes, not necessarily perfect. Wealso present the necessary definition for such perfect codes. Weexplain what kind of perfect codes are derived from our con-structions and also how non-perfect codes can be derived fromour constructions. In Section VI, we prove that certain perfectcodes for correction of asymmetric errors with limited magni-tude do not exist. In Section VII, we will discuss the applicationof our construction for multiple writing in cells -ary WOM.We conclude this paper in Section VIII.

II. BASIC CONCEPTS

An -dimensional chair , ,, for each , ,

is an -dimensional box from which an-dimensional box was removed from oneof its corners. Formally, it is defined by

Fig. 1. Semicross with and a 3-D chair with and.

For a given -dimensional shape , let denote the volumeof . The following lemma on the volume of is an imme-diate consequence of the definition.

Lemma 1: If andare two vectors in , where for each , ,then

If ,then the -dimensional chair is a discrete shape and itcan be viewed as a collection of connected -dimensional unitcubes in which any two adjacent cubes share a complete-dimensional unit cube. In this case, the formal definition of

the -dimensional chair, which considers only points of , is

Remark 1: It is important to note that ifand

are two integer vectors, then the two definitions coincide onlyif is viewed as a collection of -dimensional unit cubes.Special consideration, in the definition, should be given to theboundaries of the cubes, but this is not an issue for this work.For , if and , then the chair

coincides with the shape known as a corner (or a semicross)[25]. Examples of a 2-D semicross and a 3-D chair are given inFig. 1.A set is a packing of with a shape if copies ofplaced on the points of (in the same relative position of )

are disjoint. A set is a tiling of with a shape if it isa packing and the disjoint copies of in the packing cover .A set is a packing of with a shape if copies ofplaced on the points of (in the same relative position of )

have nonintersecting interiors. The closure of a shapeis the union of with its exterior surface. A set is atiling of with a shape if it is a packing and the closure, ofthe distinct copies of in the packing, covers .In the rest of this section, we will describe two methods to

represent a packing (tiling) with a shape . The first representa-tion is with a lattice. In case that is a discrete shape, we havea second representation with a splitting sequence.A lattice is an additive subgroup of . We will assume

that

Page 3: IEEE Transections on Information Theory - Technion

BUZAGLO AND ETZION: TILINGS WITH -DIMENSIONAL CHAIRS AND THEIR APPLICATIONS TO ASYMMETRIC CODES 1575

where is a set of linearly independent vectorsin . The set of vectors is called the basis for, and the matrix

......

. . ....

having these vectors as its rows is said to be the generator matrixfor . If , then the lattice is called an integer lattice.The volume of a lattice , denoted by , is inversely pro-

portional to the number of lattice points per a unit volume. Thereis a simple expression for the volume of , namely,

.A lattice is a lattice packing (tiling) with a shape if the

set of points of forms a packing (tiling) with . The followinglemma is well known.

Lemma 2: A necessary condition that a lattice defines alattice packing (tiling) with a shape is that( ). A sufficient condition that a lattice packingdefines a lattice tiling with a shape is that .In the sequel, let denote the unit vector with an one in theth coordinate, let denote the all-zero vector, and let de-note the all-one vector. For two vectors ,

, and a scalar , we define the

vector addition ,

and the scalar multiplication . Fora set and a vector , the shift of by is

.Let be an Abelian group and let

be a sequence with elements of . For every, we define

where addition and multiplication are performed in .A set splits an Abelian group with a splitting se-

quence , , for each , ,if the set contains distinct elements from. We will call this operation a generalized splitting. The split-

ting defined in [11] and discussed in [12], [23], [24], and [26]is a special case of the generalized splitting. It was used for theshapes known as cross and semicross [24], [25], and quasi-cross[21]. The sequences defined in [13] and discussed in [13]and [14] for the construction of codes that correct asymmetricerrors with limited magnitude are also a special case of the gen-eralized splitting. These sequences are modification of thewell-known Sidon sequences and their generalizations [2]. Thegeneralized splitting also makes generalization for a methoddiscussed by Varshamov [29], [30]. The generalization can beeasily obtained, but to our knowledge a general and completeproven theory was not given earlier.

Lemma 3: If is a lattice packing of with a shape ,then there exists an Abelian group of order , such thatsplits .

Proof: Let and let be the grouphomomorphism that maps each element to the coset

. Clearly, .Let be a sequence defined by

for each , . Clearly, for each , we have.

Now, assume that there exist two distinct elements, such that

It implies that

Since if and only if , it follows that thereexists , , such that

Therefore, , which contradicts the fact thatis a lattice packing of with the shape .Thus, splits with the splitting sequence .

Lemma 4: Let be an Abelian group and let be a shape in. If splits with a splitting sequence , then there exists a

lattice packing of with the shape , for which .Proof: Consider the group homomorphism

defined by

Clearly, is a lattice and the volume of ,.

To complete the proof, we have to show that is a packingof with the shape . Assume to the contrary that there ex-ists such that . Hence, there existtwo distinct elements such that andtherefore

Therefore, , which contradicts the fact that splitswith the splitting sequence .Thus, is a lattice packing with the shape .

Corollary 1: A lattice tiling of with the shapeexists if and only if there exists an Abelian group of ordersuch that splits .If our shape is not discrete, i.e., cannot be represented

by a set of -dimensional units cubes, two of which are adja-cent only if they share an -dimensional unit cube, thenclearly tiling can be represented with a lattice, but cannot berepresented with a splitting sequence. But, if our shape isin , then we can use both methods as they were proved tobe equivalent. In fact, both methods are complementary. If weconsider the matrix , then the vector

is contained in the related latticeif and only if . Therefore, has some similarity to

Page 4: IEEE Transections on Information Theory - Technion

1576 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013

a parity-check matrix in coding theory. The representation of alattice with its generator matrix seems to be more practical. But,sometimes it is not easy to construct one. Moreover, the split-ting sequence has in many cases a nice structure and from itsstructure, the general structure of the lattice can be found. Thisis the case in the next two sections. In Section III, we presenttwo constructions of tilings based on generalized splitting. Eventhough the second one generalizes the first one, the mathemat-ical structure of the first one has its own beauty, and hence, bothconstructions are given. The construction of the lattice, in ,given in Section IV, was derived based on the structure of thelattices, in , obtained from the construction of the splittingsequences in Section III.

III. CONSTRUCTIONS BASED ON GENERALIZED SPLITTING

In this section, we will present a construction of a tiling with-dimensional chairs based on generalized splitting. The -di-mensional chairs that are considered in this section are discrete,i.e., . We start with a construction in which all the’s are equal to , and all the ’s are equal to . We gen-eralize this construction to a case in which all the ’s, with apossible exception of one, have multiplicative inverses in therelated Abelian group.For the ring , the ring of integers modulo , let be

the multiplicative group of formed from all the elements ofthat have multiplicative inverses in .

Lemma 5: Let , , be two integers and let be thering of integers modulo , i.e., . Then

(P1) and are elements of .(P2) is an element of order in .(P3) equals to zero in .Proof:(P1) By definition, is zero in .We also have that

. It follows thatin , and hence,

. Since is zero in , it followsthat , and hence, if and only if

.(P2) Clearly, and since ,it follows that . This also im-plies that has a multiplicative inverse, and hence,

.Now, note that for each , , wehave . Therefore,

in , and hence, .Thus, the order of in is .(P3) Clearly,

. By definition, , and hence,, , , , and

. Therefore,, which implies that .

Theorem 6: Let , , be two integers,, and . Then, ,

, , splitswith the splitting sequence defined by

Proof: We will show by induction that every element incan be expressed in the form , for some .The basis of induction is .For the induction step, we have to show that if

can be presented as for some (i.e.,, , ,

and for some , ), then also can be presentedin the same way. In other words, , where

.If and there exists such that , then

where , , , and the inductionstep is proved.If and there is no such that , then by

Lemma 5(P3), we have that and hence

i.e., is the required element of and theinduction step is proved.Now, assume that . Let , be the smallest

index such that

Note that for each ,

Therefore

If , then and the induction stepis proved. If , i.e., , then

By iteratively continuing in the same manner, we obtain

and since , we have that

and the induction step is proved.

Page 5: IEEE Transections on Information Theory - Technion

BUZAGLO AND ETZION: TILINGS WITH -DIMENSIONAL CHAIRS AND THEIR APPLICATIONS TO ASYMMETRIC CODES 1577

Since , it follows that the sethas elements.

Corollary 2: For each and , there ex-ists a lattice tiling of with , ,

.The next theorem and its proof are generalizations of The-

orem 6 and its proof.

Theorem 7: Let andbe two vectors in such that for

each , . Let , , ,and assume that for each , , . Then,splits with the splitting sequence definedby

Proof: First, we will show that . Sinceequals zero in , it follows that in , and hence,

. Therefore

As an immediate consequence from definition, we have that foreach ,

Next, we will show that

(1)

Since , it follows that to prove Theorem 7, it issufficient to show that each element in can be expressed as

, for some . The proof will be done by induction.The basis of induction is .In the induction step, we will show that if can be pre-

sented as for some , then the same is true for .In other words, , where

.Assume

where , for each , and thereexists a such that .If or if and there exists

such that , then since , it follows that

where . Clearly, ;if and otherwise . Hence, theinduction step is proved.If and there is no such that ,

then by (1), we have that and hence

i.e., is the required element of andthe induction step is proved.Now, assume that . Let be the smallest

index such that

If , then and the inductionstep is proved. If , then

By iteratively continuing in the same manner, we obtain

and since , we have that

is the element of , and the induction step is proved.

Corollary 3: Let andbe two vectors in such that

for each , . Let and assume thatfor at least of the ’s. Then, there exists

a lattice tiling of with .

IV. TILING BASED ON A LATTICE

Next, we consider lattice tiling of with ,where and .We want to remind again that Mihalis Kolountzakis and JamesSchmerl pointed on [15], [20], and [27], where such tiling canbe found. For completeness and since our proof is slightly dif-ferent, we kept this part in this paper. For the proof of the nexttheorem, we need the following lemma.

Lemma 8: Let . Then,if and only if , for ,

and there exist integers and , , such thatand .

Proof: Assume first that , i.e., thereexists . By the definitionof , it follows that

(2)

Page 6: IEEE Transections on Information Theory - Technion

1578 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013

and there exists a such that

(3)

Similarly, for , we have

(4)

and there exists an such that

(5)

It follow from (2) and (4) that andfor each , . Hence,

for each , . It follow from (3) and (4) that. It follows from (5) and (2) that

.Now, let such that for

each , , and there exist such that and. Consider the point

, where .By definition, for each ,

and . Hence, .Clearly, if , then and if , then .

In both cases, since , it follows that we have

We also have , and therefore,. Hence, .

Thus, , i.e., .

The next theorem is a generalization of Corollary 3.

Theorem 9: Let and, , for all .

Let be the lattice generated by the matrix

......

. . .. . .

. . ....

Then, is a lattice tiling of with .Proof: It is easy to verify that

. We will use Lemma 2 to showthat is a tiling of with . For this, it is sufficient toshow that is a packing of with .Let , , and assume to the contrary that

. Since , it follows that thereexist integers , not all zeros, such that

, for every , . By Lemma 8, wehave that for each ,

i.e.,

Since is an integer, it follows that or

. For each , , if , then since, we have that

Hence

(6)

Similarly, if , we have that

If , then by (6), we have

and hence for each , . Similarly, we havefor each , if . If , then since

is an integer, we have that , foreach , . Hence, there is no such that ,which contradicts Lemma 8. Similarly, if , then for each, , , and hence, thereis no such that , which contradicts Lemma8. Therefore, , i.e., for each , , , acontradiction. Hence, is a lattice packing of withThus, by Lemma 2, is a lattice tiling of with .

Remark 2: Note that the construction (Theorem 9) based onlattices covers all the parameters of integers that are not coveredin Section III.

V. ASYMMETRIC ERRORS WITH LIMITED MAGNITUDE

The first application for a tiling of with an -dimensionalchair is in the construction of codes of length that correctasymmetric errors with limited magnitude.Let be an alphabet with letters. For a

word , the Hamming weight of ,, is the number of nonzero entries in , i.e.,

.A code of length over the alphabet is a subset of .

A vector is a -asymmetric-error with lim-ited magnitude if and for each

. The sphere is the set of all -asymmetric errorswith limited magnitude . A code can correct -asym-metric-errors with limited magnitude if for any two codewords

, and any two -asymmetric-errors with limited magni-tude , , such that , , wehave that .The size of the sphere is easily computed.

Lemma 10: .

Corollary 4: .

Page 7: IEEE Transections on Information Theory - Technion

BUZAGLO AND ETZION: TILINGS WITH -DIMENSIONAL CHAIRS AND THEIR APPLICATIONS TO ASYMMETRIC CODES 1579

For simplicity, it is more convenient to consider the code asa subset of , where all the additions are performed modulo .Such a code can be viewed also as a subset of formed bythe set . This code is an extension,from to , of the code . Note, in this code, there is a wraparound (of the alphabet) which does not exist if the alphabet is, as in the previous code.A linear code , over , which corrects -asymmetric-errors

with limited magnitude , viewed as a subset of , is equivalentto an integer lattice packing of with the shape .Therefore, we will call this lattice a lattice code.Let denote the set of lattice codes in that cor-

rect -asymmetric-errors with limited magnitude . A codeis called perfect if it forms a lattice tiling with the

shape . By Corollary 1, we have the following.

Corollary 5: A perfect lattice code exists ifand only if there exists an Abelian group of ordersuch that splits .A code is formed as an extension of a code

over . Assume we want to form a code , where

, which corrects asymmetric errorswith limited magnitude . Assume that a construction with alarge linear code does not exist. One can take a latticecode over an alphabet with letters . Then,

a code over the alphabet is formed by . Note thatthe code is usually not linear. This is a simple constructionthat always works. Of course, we expect that there will be manyalphabets in which better constructions can be found.There exists a perfect lattice code for various

parameters with [13], [14]. Such codes also exist forand all and for the parameters of the Golay codes and thebinary repetition codes of odd length [17].The existence of perfect codes that correct ( )-asym-

metric-errors with limited magnitude was proved in [14]. Therelated sphere is an -dimensional chair ,where and .Sections III and IV provide constructions for such codes withsimpler description and simpler proofs that these codes are suchperfect codes.In fact, the constructions in these sections provide tilings of

many other related shapes. More than that, there might be sce-narios in which different flash cells can have different limitedmagnitude, e.g., if for some cells wewant to increase the numberof charge levels. In this case, we might need a code that cor-rect asymmetric errors with different limited magnitudes for dif-ferent cells. Assume that for the th cell the limited magnitudeis . Our lattice tiling with ,

, , produces the required perfectcode for this scenario.

VI. NONEXISTENCE OF SOME PERFECT CODES

Next, we ask whether perfect codes, which correct asym-metric errors with limited magnitude, exist for . Un-fortunately, such codes cannot exist. The proof for this claim isthe goal of this section. Most of the proof is devoted to the casein which the limited magnitude is equal to one. We concludethe section with a proof for .

For a word , we define

We say that a codeword , , covers a wordif there exists an element such that.

Lemma 11: Let , and assume that there exists, , such that , for

every , . Then, or .Proof: Let , , such that, for every , . Assume to the contrary that

and . Letwhere and where

. Clearly, and.

Therefore, , which contradictsthe fact that . Thus, or

.

Lemma 12: Let be a lattice code. Theword, the all-one vector, can be covered only by a codeword

of the form , for some , , where is aninteger, .

Proof: Assume that is the codeword that covers .Then, there exists suchthat , i.e., , and therefore,for each , . Since , it follows that thereare at least two entries that are equal to one in . By Lemma 11,it follows that . Hence, there are at leastentries of which are equal to one. Therefore,for some , , where is an integer, .

Lemma 13: Let be a lattice code. Forevery , , the word can be coveredonly by a codeword of the form , where is an integer,

.Proof: Assume that is a codeword that covers .

Then, there exists suchthat . Clearly, , and for each

, and therefore for each ,. Since , it follows that there are at

most negative coordinates in . Therefore, by Lemma 11,it follows that . Hence, there are at leastcoordinates of that are equal to one. Thus, ,where .

Lemma 14: If there exists a perfect lattice codein , then divides

for some integer ,.

Proof: Let be a perfect lattice code. ByLemma 12 and w.l.o.g., we can assume that is covered by thecodeword , where . Combining this withLemma 13, we deduce that for all , , the word

is covered by the codeword( cannot be equal , since it would coverwhich is already covered by ). We have distinct codewordsin , and since is a lattice, the lattice generated by the

Page 8: IEEE Transections on Information Theory - Technion

1580 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013

set is a sublattice of , and therefore,divides . Let be the matrix

whose rows are

. . ....

.... . .

. . ....

...

Subtracting the first row from every other row, we obtain thedeterminant

. . ....

.... . .

. . ....

...

Subtracting the first column from all the other columns, exceptfrom the last one, we obtain the determinant

. . ....

.... . .

. . ....

...

Finally, replacing the second row by the sum of all the rows,except for the first one, we obtain the determinant

. . ....

.... . .

. . ....

...

Now, it is easy to verify that

.

Theorem 15: There are no perfect lattice codes infor all .

Proof: By Lemma 14, it is sufficient to showthat does not divide

, for .If , then we have to show that does not

divide . It can be readily verified thatfor all , which proves the claim.If , then we have to show that does not

divide . If , then. Hence, we have to show that

does not divide . We will show that for all ,. It is easy to verify that

Therefore, it is sufficient to show that

or equivalently

This is simply proved by induction on for all .To complete the proof, we should only verify that for ,

5, and 6, we have that does not divide .

Theorem 16: There are no perfect lattice codes inif and .

Proof: Let and and assume to the contrary thatthere exists a perfect lattice code . Withoutloss of generality (w.l.o.g.), we can assume by Lemma 12 thatthe word is covered by a codeword ,where is an integer, . From the proof of Lemma 14,we have that for all , , the wordis covered by the codeword . Therefore,

is a codeword. Clearly, and since, it follows that for all , , . Moreover,

and , which contradictsLemma 11. Thus, if and , then there are no perfectlattice codes in .

Combining Theorems 15 and 16, we obtain the main result ofthis section.

Corollary 6: There are no perfect lattice codes inif for any limited magnitude .

The existence of perfect lattice codes in andtheir nonexistence in might give an evidence thatsuch perfect codes would not exist in forand some . It would be interesting to prove such a claimfor and .

VII. APPLICATION TO WOMS

A second possible application for a tiling of with an -di-mensional chair is in constructions of multiple writing in cellsWOMs. Each cell has charge levels . A letterfrom an alphabet of size , , is written intothe cells as many times as possible. In each round, the chargelevel in each cell is greater than or equal to the charge level inthe previous round. It is desired that the number of rounds forwhich we can guarantee to write a new symbol from will bemaximized.An optimal solution for the problem can be described as fol-

lows. Let be an -dimensional array. Letbe a coloring of the array with the alphabet

letters. The rounds of writing and raising the charge levels of

Page 9: IEEE Transections on Information Theory - Technion

BUZAGLO AND ETZION: TILINGS WITH -DIMENSIONAL CHAIRS AND THEIR APPLICATIONS TO ASYMMETRIC CODES 1581

the cells can be described in terms of the coloring of thearray . If in the first round, the symbol is written and thecharge level in cell is raised to , , then the colorin position is . Therefore, we have to find acoloring function such that the number of rounds in which anew symbol can be written will be maximal.Cassuto and Yaakobi [5] have found that using a coloring

based on a lattice tiling with a 2-D chair provides the bestknown writing strategy when there are two cells. A coloringof based on a lattice tiling with a shape has

colors. The lattice have cosets, and hence coset repre-sentatives, . The points in of the coset

are colored with the th letter of . Now, the coloring ofentry of given by is equal to the color ofthe point given by the coloring . Themethod given in [5] suggests that a generalization using col-oring based on tiling of with an -dimensional chair will bea good strategy for WOM codes with cells [33]. The analysiswith two cells, i.e., 2-D tiling, was discussed with more detailsin [5]. The analysis for the -dimensional case will be discussedin a future research work by the same authors and another groupas well [33].

VIII. CONCLUSION

We have presented a few constructions for tilings with -di-mensional chairs. The tilings are based either on lattices or ongeneralized splitting. Both methods are equivalent if our spaceis . The generalized splitting is a simple generalization forknown concepts such as splitting and sequences. We haveshown that our tilings can be applied in the design of codesthat correct asymmetric errors with limited magnitude. We fur-ther mentioned a possible application in the design of WOMcodes for multiple writing. Finally, we proved that some perfectcodes for correction of asymmetric errors with limited magni-tude cannot exist.

ACKNOWLEDGMENT

The authors would like to thank Mihalis Kolountzakis andJames Schmerl for pointing on references [15], [20], [27], whichconsider lattice tiling of notched cubes.

REFERENCES

[1] R. Ahlswede, H. Aydinian, and L. Khachatrian, “Unidirectional errorcontrol codes and related combinatorial problems,” in Proc. 8th Int.Workshop Algebr. Combin. Coding Theory, St. Petersburg, Russia,2002, pp. 6–9.

[2] K. O’Bryant, “A complete annotated bibliography of work related toSidon sequences,”Electron. J. Combin., vol. DS11, pp. 1–39, Jul. 2004.

[3] Y. Cassuto, M. Schwartz, V. Bohossian, and J. Bruck, “Codesmulti-level flash memories: Correcting asymmetric limited-magnitudeerrors,” in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, 2007, pp.1176–1180.

[4] Y. Cassuto, M. Schwartz, V. Bohossian, and J. Bruck, “Codes forasymmetric limited-magnitude errors with application to multi-levelflash memories,” IEEE Trans. Inf. Theory, vol. IT-56, no. 4, pp.1582–1595, Apr. 2010.

[5] Y. Cassuto and E. Yaakobi, “Short -ary WOM codes with hot/coldwrite differentiation,” in Proc. IEEE Int. Symp. Inf. Theory, Boston,MA, 2012, pp. 1396–1400.

[6] G. D. Cohen, P. Godlewski, and F. Merkx, “Linear binary code forwrite-once memories,” IEEE Trans. Inf. Theory, vol. IT-32, no. 5, pp.697–700, Sep. 1986.

[7] L. Dolecek, “Towards longer lifetime of emerging technologies usingnumber theory,” in Proc. Workshop Appl. Commun. Theory Emerg.Memory Technol., Miami, FL, 2010, pp. 1936–1940.

[8] N. Elarief and B. Bose, “Optimal, systematic, -ary codes correcting allasymmetric and symmetric errors of limited magnitude,” IEEE Trans.Inf. Theory, vol. IT-56, no. 3, pp. 979–983, Mar. 2010.

[9] A. Fiat and A. Shamir, “Generalized write-once memories,” IEEETrans. Inf. Theory, vol. IT-30, no. 3, pp. 470–480, May 1984.

[10] F. Fu and H. J. Han Vinck, “On the capacity of generalized write oncememory with state transitions described by an arbitrary directed acyclicgraph,” IEEE Trans. Inf. Theory, vol. IT-45, no. 1, pp. 308–313, Jan.1999.

[11] G. Hajós, “Uber einfache und mehrfache Bedeckung des -dimen-sionalen Raumes mit einem Würfelgitter,” Math. Zeit., vol. 47, pp.427–467, 1942.

[12] D. Hickerson, “Splitting of finite groups,” Pacific J. Math., vol. 107,pp. 141–171, 1983.

[13] T. Kløve, B. Bose, and N. Elarief, “Systematic single limited magni-tude asymmetric error correcting codes,” IEEE Trans. Inf. Theory, vol.IT-57, no. 7, pp. 4477–4487, Jul. 2011.

[14] T. Kløve, J. Luo, I. Naydenova, and S. Yari, “Some codes correctingasymmetric errors of limited magnitude,” IEEE Trans. Inf. Theory, vol.IT-57, no. 11, pp. 7459–7472, Nov. 2011.

[15] M. Kolountzakis, “Lattice tilings by cubes: Whole, notched and ex-tended,” Electron. J. Combin., vol. 5, pp. 1–11, 1998.

[16] J.-Y. Lee and R. V. Moody, “Lattice substitution system and modelsets,” Discr. Comput. Geom., vol. 25, pp. 173–201, 2001.

[17] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-CorrectingCodes. Amsterdam, The Netherlands: North-Holland, 1977.

[18] T. R. N. Rao and E. Fujiwara, Error-Control Coding for ComputerSystems. Englewood Cliffs, NJ: Prentice-Hall, 1989.

[19] R. L. Rivest and A. Shamir, “How to reuse a write-once memory,” Inf.Control, vol. 55, pp. 1–19, 1982.

[20] J. H. Schmerl, “Tiling space with notched cubes,” Discr. Math., vol.133, pp. 225–235, 1994.

[21] M. Schwartz, “Quasi-cross lattice tilings with applications to flashmemory,” in Proc. IEEE Int. Symp. Inf. Theory, St. Petersburg, Russia,2011, pp. 2133–2137.

[22] A. Shpilka, New constructions of WOM codes using the Wozencraftensemble [Online]. Available: arxiv.org/abs/1110.6590

[23] S. Stein, “Factoring by subsets,” Pacific J. Math., vol. 22, pp. 523–541,1967.

[24] S. Stein, “Algebraic tiling,” Amer. Math. Mon., vol. 81, pp. 445–462,1967.

[25] S. Stein, “Packing of by certain error spheres,” IEEE Trans. Inf.Theory, vol. IT-30, no. 2, pp. 356–363, Mar. 1984.

[26] S. Stein, “Tiling, packing, and covering by clusters,” Rocky MountainJ. Math., vol. 16, pp. 277–321, 1986.

[27] S. Stein, “The notched cube tiles ,” Discr. Math., vol. 80, pp.335–337, 1990.

[28] S. Stein and S. Szabó, Algebra and Tiling. Cambridge, U.K.: Cam-bridge Univ. Press, 1994.

[29] R. R. Varshamov, “On some specifics error-correcting linear codes,”Rep. Acad. Sci. USSR, vol. 157, pp. 546–548, 1964.

[30] R. R. Varshamov, “On the theory of asymmetric codes,” Rep. Acad.Sci. USSR, vol. 164, pp. 757–760, 1965.

[31] L. Wang, M. Qin, E. Yaakobi, Y.-H. Kim, and P. H. Siegel, “WOMwith retained messages,” in Proc. IEEE Int. Symp. Inf. Theory, Boston,MA, 2012, pp. 1396–1400.

[32] J. K. Wolf, A. D. Wyner, J. Ziv, and J. Korner, “Coding for write-oncememory,” Bell Labs. Tech. J., vol. 63, pp. 1089–1112, 1984.

[33] E. Yaakobi, Personal communication 2012.[34] E. Yaakobi and A. Shpilka, “High sum-rate three-write and non-binary

WOM codes,” inProc. IEEE Int. Symp. Inf. Theory, Boston,MA, 2012,pp. 1391–1395.

[35] E. Yaakobi, P. H. Siegel, A. Vardy, and J. K. Wolf, “On codes thatcorrect asymmetric errors with graded magnitude distribution,” inProc. IEEE Int. Symp. Inf. Theory, St. Petersburg, Russia, 2011, pp.1021–1025.

[36] E. Yaakobi, P. H. Siegel, A. Vardy, and J. K. Wolf, “Multiple error-correcting WOM-codes,” IEEE Trans. Inf. Theory, vol. IT-58, no. 4,pp. 2220–2230, Apr. 2012.

[37] Z. Zemor and G. D. Cohen, “Error-correcting WOM-codes,” IEEETrans. Inf. Theory, vol. IT-37, no. 3, pp. 730–734, May 1991.

Page 10: IEEE Transections on Information Theory - Technion

1582 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013

Sarit Buzaglo was born in Israel in 1983. She received the B.A. and M.Sc. de-grees from the Technion—Israel Institute of Technology, Haifa, Israel, in 2007and 2010, respectively, from the department of Mathematics. She is currentlya Ph.D. student in the Computer Science Department at the Technion. Her re-search interests include algebraic error-correction coding, coding theory, dis-crete geometry, and combinatorics.

Tuvi Etzion (M’89–SM’94–F’04) was born in Tel Aviv, Israel, in 1956. Hereceived the B.A., M.Sc., and D.Sc. degrees from the Technion—Israel Instituteof Technology, Haifa, Israel, in 1980, 1982, and 1984, respectively.From 1984 he held a position in the department of Computer Science at

the Technion, where he has a Professor position. During the years 1986-1987he was Visiting Research Professor with the Department of Electrical En-gineering—Systems at the University of Southern California, Los Angeles.During the summers of 1990 and 1991 he was visiting Bellcore in Morristown,New Jersey. During the years 1994–1996 he was a Visiting Research Fellowin the Computer Science Department at Royal Holloway College, Egham,England. He also had several visits to the Coordinated Science Laboratoryat University of Illinois in Urbana-Champaign during the years 1995–1998,two visits to HP Bristol during the summers of 1996, 2000, a few visits to thedepartment of Electrical Engineering, University of California at San Diegoduring the years 2000–2012, and several visits to the Mathematics departmentat Royal Holloway College, Egham, England, during the years 2007–2009.His research interests include applications of discrete mathematics to prob-

lems in computer science and information theory, coding theory, and combina-torial designs.Dr. Etzion was an Associate Editor for Coding Theory for the IEEE

TRANSACTIONS ON INFORMATION THEORY from 2006 till 2009.