Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published July 2014 | public
Journal Article

Short (Q)-Ary Fixed-Rate WOM Codes for Guaranteed Rewrites and With Hot/Cold Write Differentiation

Abstract

To the body of works on rewrite codes for constrained memories, we add a comprehensive study in a direction that is especially relevant to practical storage. The subject of this paper is codes for the q-ary extension of the write-once memories model, with input sizes that are fixed throughout the write sequence. Seven code constructions are given with guarantees on the number of writes they can support. For the parameters addressed by the constructions, we also prove upper bounds on the number of writes, which prove the optimality of three of the constructions. We concentrate on codes with short block lengths to keep the complexity of decoding and updates within the feasibility of practical implementation. Even with these short blocks the constructed codes are shown to be within a small additive constant from capacity for an arbitrarily large number of input bits. Part of the study addresses a new rewrite model where some of the input bits can be updated multiple times in a write sequence (hot bits), while other are updated at most once (cold bits). We refer to this new model as hot/cold rewrite codes. It is shown that adding cold bits to a rewrite code has a negligible effect on the total number of writes, while adding an important feature of leveling the physical wear of memory cells between hot and cold input data.

Additional Information

© 2014 IEEE. Manuscript received September 19, 2012; accepted January 13, 2014. Date of publication April 18, 2014; date of current version June 12, 2014. Y. Cassuto was supported in part by the European Union Marie Curie CIG Grant, in part by the Intel Center for Computing Intelligence, and in part by the Israeli Ministry of Science and Technology. E. Yaakobi was supported in part by the ISEF Foundation and in part by the Lester Deutsch Fellowship. This paper was presented at the 2012 IEEE International Symposium on Information Theory. The authors wish to thank Tuvi Etzion for valuable discussions, and the anonymous reviewers for improving the clarity of the results.

Additional details

Created:
August 22, 2023
Modified:
October 17, 2023