Joint rewriting and error correction in write-once memories
09946475 ยท 2018-04-17
Assignee
Inventors
- Anxiao Jiang (College Station, TX)
- Yue Li (College Station, TX)
- Eyal En Gad (Pasadena, CA)
- Michael Langberg (Buffalo, NY)
- Jehoshua Bruck (Pasadena, CA)
Cpc classification
G06F11/1012
PHYSICS
G06F3/0679
PHYSICS
G11C17/146
PHYSICS
International classification
G06F12/00
PHYSICS
G06F13/00
PHYSICS
G06F13/28
PHYSICS
Abstract
Both rewriting and error correction are technologies usable for non-volatile memories, such as flash memories. A coding scheme is disclosed herein that combines rewriting and error correction for the write-once memory model. In some embodiments, code construction is based on polar codes, and supports any number of rewrites and corrects a substantial number of errors. The code may be analyzed for a binary symmetric channel. The results can be extended to multi-level cells and more general noise models.
Claims
1. A method to rewrite a memory, the method comprising: determining respective current cell charge levels of a plurality of cells of the memory; generating a plurality of next cell charge levels for the plurality of cells according to a linear transformation that includes a multiplication of an input vector that includes input data, by a matrix of N rows and N columns, wherein each next cell charge level is generated based on a corresponding one of the current cell charge levels, the input data, and additional data that includes a frozen set of a binary symmetric channel (BSC), wherein each next cell charge level is greater than or equal to the corresponding one of the current cell charge levels, wherein the plurality of next cell charge levels represent the input data, and wherein the plurality of next cell charge levels include redundancy for error correction; and storing the plurality of next cell charge levels, which include the redundancy for error correction, in the memory, to enable rewriting of the memory without decrease in the current cell charge levels, wherein the redundancy for error correction enables recovery of most recently written data when noise changes a level of one or more cells, of the plurality of cells, which contain the most recently written data.
2. The method of claim 1, wherein generating the plurality of next cell charge levels according to the linear transformation comprises: generating a first subset of bits of the input vector which are equal to a value of the input data, and a second subset of bits of the input vector which are equal to a constant.
3. A method to rewrite a memory, the method comprising: determining respective current cell charge levels of a plurality of cells of the memory; generating a plurality of next cell charge levels for the plurality of cells according to a linear transformation that includes a multiplication of an input vector that includes input data, by a matrix of N rows and N columns, wherein each next cell charge level is generated based on a corresponding one of the current cell charge levels and based on the input data, wherein each next cell charge level is greater than or equal to the corresponding one of the current cell charge levels, wherein the plurality of next cell charge levels represent the input data, wherein the plurality of next cell charge levels include redundancy for error correction, and wherein generating the plurality of next cell charge levels comprises: generating a first subset of bits of the input vector which are equal to a value of the input data, and a second subset of bits of the input vector which are equal to a constant; and indexing bits of the input vector such that each bit of the input vector has an index that indicates a position within an order of the bits of the input vector, wherein the bits of the first subset of the input vector have indices in a dataset that is based on a first dataset and a second dataset, wherein the bits of the second subset of the input vector have indices in the second dataset, wherein the second dataset includes at least one element, wherein the first dataset includes elements which are absent in the second dataset, wherein at least one index is in neither the first dataset nor the second dataset, and wherein the second dataset is a subset of the first dataset; and storing the plurality of next cell charge levels, which include the redundancy for error correction, in the memory, to enable rewriting of the memory without decrease in the current cell charge levels, and wherein the redundancy for error correction enables recovery of most recently written data when noise changes a level of one or more cells, of the plurality of cells, which contain the most recently written data.
4. The method of claim 3, wherein generating the plurality of next cell charge levels according to the linear transformation further comprises: calculating a plurality of before write values, wherein each of the plurality of before write values is calculated based on a corresponding current cell charge level and on a corresponding dither value of a plurality of dither values, and wherein each of the plurality of before write values is equal to the corresponding current cell charge level exclusive OR-ed (XOR-ed) with the corresponding dither value; and calculating a plurality of after write values, wherein each of the plurality of after write values is calculated based on the corresponding next cell charge level and the corresponding dither value of the plurality of dither values, and wherein each of the plurality of after write values is equal to the corresponding next cell charge level XOR-ed with the corresponding dither value.
5. The method of claim 4, wherein the plurality of after write values is equal to the input vector multiplied by the matrix, and wherein the plurality of next cell charge levels is equal to a bit-wise XOR of the plurality of after write values and the plurality of dither values.
6. The method of claim 4, wherein the plurality of dither values includes a plurality of pseudo-random numbers.
7. The method of claim 3, wherein generating the plurality of next cell charge levels according to the linear transformation comprises generating the bits of the input vector according to a linear transformation that includes calculation of the bits in the input vector having an index which is in neither the first dataset nor the second dataset.
8. The method of claim 3, wherein the matrix includes a generating matrix of a polar code, and wherein the first dataset is in a frozen set of the polar code.
9. A method to read a memory, the method comprising: determining respective current cell charge levels of a plurality of cells of the memory, wherein the current cell charge levels represent data and error correction information; generating a plurality of data values for the plurality of cells, by use of an error correction function, from the current cell charge levels, wherein the plurality of data values are generated according to a linear transformation that includes a multiplication of an input vector by a matrix of N rows and N columns, and wherein the input vector comprises a first subset of bits which correspond to the plurality of data values, and a second subset of bits which are equal to a constant; indexing bits of the input vector such that each bit has an index that indicates a position within the input vector, wherein the first subset of bits have indices in a dataset that is based on a first dataset and a second dataset, wherein the second subset of bits have indices in the second dataset, wherein the second dataset includes at least one element, wherein the first dataset includes elements which are absent in the second dataset, wherein at least one index is in neither the first dataset nor the second dataset, and wherein the second dataset is a subset of the first dataset; and transmitting the plurality of data values to a data destination, wherein the transmitted plurality of data values, generated by use of the error correction function, facilitates recovery of most recently written data to the memory when noise changes a level of one or more cells, of the plurality of cells, which contain the most recently written data.
10. The method of claim 9, wherein the input vector equals a bit-wise XOR of the current cell charge levels and a plurality of dither values.
11. The method of claim 9, wherein the multiplication of the input vector by the matrix includes a multiplication of the input vector by an inverse of a generating matrix of a polar code.
12. The method of claim 9, wherein the current cell charge levels define an error correction code that pertains to the error correction information, and wherein generating the plurality of data values comprises: determining a set of data values; and verifying that the set of data values is consistent with the error correction code.
13. A memory system, comprising: a memory that includes a plurality of cells; a processor coupled to the memory and configured to determine respective current cell charge levels of the plurality of cells of the memory; an encoder coupled to the memory and to the processor, and configured to: generate a plurality of next cell charge levels according to a linear transformation that includes a multiplication of an input vector that includes input data, by a matrix of N rows and N columns, wherein each next cell charge level is generated based on a corresponding one of the current cell charge levels and based on the input data, wherein each next cell charge level is greater than or equal to the corresponding one of the current cell charge levels, wherein the plurality of next cell charge levels represent the input data, wherein the plurality of next cell charge levels include redundancy for error correction, wherein the input vector includes bits, and wherein a first subset of bits of the input vector are equal to a value of the input data, and a second subset of bits of the input vector are equal to a constant; and index the bits of the input vector such that each bit has an index that indicates a position within an order of bits, wherein the bits of the first subset have indices in a dataset that is based on a first dataset and a second dataset, wherein the bits of the second subset have indices in the second dataset, wherein the second dataset includes at least one element, wherein the first dataset includes elements which are absent in the second dataset, wherein at least one index is in neither the first dataset nor the second dataset, and wherein the second dataset is a subset of the first dataset; and a write device coupled to the encoder and to the memory, and configured to store the plurality of next cell charge levels, which include the redundancy for error correction, in corresponding cells of the plurality of cells of the memory, to enable rewriting of the memory without decrease in the current cell charge levels, and wherein the redundancy for error correction enables recovery of most recently written data when noise changes a level of one or more cells, of the plurality of cells, which contain the most recently written data.
14. The system of claim 13, wherein the linear transformation comprises: a calculation of a plurality of before write values, wherein each of the plurality of before write values is calculated based on a corresponding current cell charge level and on a corresponding dither value of a plurality of dither values, and wherein each of the plurality of before write values is equal to the corresponding current cell charge level exclusive OR-ed (XOR-ed) with the corresponding dither value; and a calculation of a plurality of after write values, wherein each of the plurality of after write values is calculated based on a corresponding next cell charge level and the corresponding dither value, and wherein each of the plurality of after write values is equal to the corresponding next cell charge level XOR-ed with the corresponding dither value.
15. The system of claim 14, wherein the plurality of after write values is equal to the input vector multiplied by the matrix, and wherein the plurality of next cell charge levels is equal to the bit-wise XOR of the plurality of after write values and the plurality of dither values.
16. The system of claim 14, wherein the plurality of dither values includes a plurality of pseudo-random numbers.
17. The system of claim 13, wherein the linear transformation comprises a calculation of the input vector having an index which is in neither the first dataset nor the second dataset.
18. The system of claim 13, wherein the matrix includes a generating matrix of a polar code, and wherein the first dataset is in a frozen set of the polar code.
19. A memory system, comprising: a memory that includes a plurality of cells; a processor coupled to the memory and configured to determine respective current cell charge levels of the plurality of cells of the memory, wherein the current cell charge levels represent data and error correction information; a decoder coupled to the processor and to the memory, and configured to: generate a plurality of data values for the plurality of cells from the current cell charge levels by use of an error correction function, wherein the plurality of data values for the plurality of cells are generated according to a linear transformation that includes a multiplication of an input vector by a matrix of N rows and N columns, wherein the input vector comprises a first subset of bits which correspond to the plurality of data values, and a second subset of bits which are equal to a constant; and index bits of the input vector such that each bit has an index that indicates a position within the input vector, wherein the first subset of bits have indices in a dataset that is based on a first dataset and a second dataset, wherein the second subset of bits have indices in the second dataset, wherein the second dataset includes at least one element, wherein the first dataset includes elements which are absent in the second dataset, wherein at least one index is in neither the first dataset nor the second dataset, and wherein the second dataset is a subset of the first dataset; and a transmitter coupled the decoder and configured to transmit the plurality of data values to a data destination, wherein the transmitted plurality of data values, generated by use of the error correction function, facilitates recovery of most recently written data to the memory when noise changes a level of one or more cells, of the plurality of cells, which contain the most recently written data.
20. The system of claim 19, wherein the matrix is equal to a m-th Kronecker product of G.sub.2, wherein
21. The system of claim 19, wherein the matrix includes a generating matrix of a polar code.
22. The system of claim 19, wherein the linear transformation implements one of a list-decoding algorithm and a belief-propagation algorithm.
23. The system of claim 19, wherein the data and the error correction information of the current cell charge levels are encoded such that a bit-wise XOR of the current cell charge levels and a plurality of dither values equals the input vector, and wherein the input vector includes a first subset of positions that represent the data, and a second subset of subset having constant values.
24. The system of claim 19, further comprising a bus coupled between the memory and the processor.
25. The method of claim 1, wherein the matrix is equal to a m-th Kronecker product of G.sub.2, wherein
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The foregoing and other features of this disclosure will become more fully apparent from the following description and appended claims, taken in conjunction with the accompanying drawings. Understanding that these drawings depict only several embodiments in accordance with the disclosure and are, therefore, not to be considered limiting of its scope, the disclosure will be described with additional specificity and detail through use of the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10) FIG. illustrates an example of: Degrading channel
(11)
to WOM(,). Here
(12)
The two channels on the left and on the right may be equivalent.
(13)
(14)
and BSC(). Here p.
(15)
(16)
(17)
(18)
(19)
(20)
(21) All of the aspects and other features shown in the drawings are arranged according to at least some embodiments presented herein.
DETAILED DESCRIPTION
(22) In the following detailed description, reference is made to the accompanying drawings, which form a part hereof. In the drawings, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, drawings, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the spirit or scope of the subject matter presented herein. The aspects of the present disclosure, as generally described herein, and illustrated in the Figures, can be arranged, substituted, combined, separated, and designed in a wide variety of different configurations, all of which are explicitly contemplated herein.
(23) This disclosure is generally drawn, inter alia, to methods, apparatus, systems, devices, and computer program products related to joint rewriting and error correction in write-once memories.
(24) Briefly stated, both rewriting and error correction are technologies that may be used for non-volatile memories, such as flash memories. This disclosure presents a coding scheme that combines rewriting and error correction for the write-once memory model. In some embodiments, code construction is based on polar codes, and supports any number of rewrites and corrects a substantial number of errors. The code may be analyzed for a binary symmetric channel. The results can be extended to multi-level cells and more general noise models.
I. Introduction
(25) This disclosure presents a code construction for error-correcting WOM codes. The code construction scheme may support any number of rewrites and can correct a substantial number of errors.
(26) For example, a memory may have N binary cells, where every cell has two charge levels: 0 and 1. The cell-programming method can only change a cell from 0 to 1, but not from 1 to 0. However, noise can change a cell in both directions: from 0 to 1, and from 1 to 0.
(27) The coding for the cell programming has two functions: (1) Rewrite data, which means to store new data that replace old data, and (2) Correct errors. In some embodiments, a coding method may support t writes, where each write is also called a rewrite, and where t is an integer parameter greater than or equal to two.
(28) After a write of data, noise may appear in the cell levels, and certain embodiments of cell programming can correct errors and recover the data stored by the latest write. In some embodiments, each of the writes may use substantially the same process.
(29) As an example, let (s1, s2, . . . , sN) be a binary vector that represent the levels of the N binary cells before a write. Let (s1, s2, . . . , sN) be a binary vector that represent cell levels of the N binary cells after this write. In addition, let (b1, b2, . . . , bM) be a binary vector that represents the data to be written, where the data has M bits. Note the following constraints or conditions: 1) For i=1, 2, . . . , N, si is greater than or equal to si. This is because the cell-programming method increases a cell's level, but may not decrease it. 2) M is an integer parameter known to the system. Its value can be the same or different for the writes. 3) The cell levels (s1, s2, . . . , sN) can be different from the cell levels right after the previous rewrite, because noise may have changed the cell levels since the previous rewrite.
(30) To write the data (b1, b2, . . . , bM), the method may have the following inputs: (1) The current cell levels (s1, s2, . . . , sN), and (2) The new data to store (b1, b2, . . . , bM).
(31) Based on the inputs from (1) and (2), the method computes the output (s1, s2, . . . , sN), and programs the cells to the new levels with the following constraints: 1) For i=1, 2, . . . , N, si is greater than or equal to si. 2) The new cell levels (s1, s2, . . . , siN) represents the new data (b1, b2, . . . , bM), according to the mapping specified by the method.
(32)
(33) Data to be stored in the memory is included with the frozen set for WOM channel 26, and data of the frozen set for WOM channel 26 is provided to the polar encoder 27. In addition, additional data 31 is provided to the polar encoder 27. In the embodiment of
(34) The polar codeword 28 is provided to a set of WOM channel devices 29, which determine cell levels to be written into the WOM. The WOM channel devices 29 determine the cell levels such that the new state of the WOM includes the data of the frozen set and such that the only cell level changes in the WOM are from the 0 state to the 1 state. Embodiments of WOM channel devices are described below in further detail.
(35)
(36) The method of
(37) The method shown in
(38) In the first operation, represented by the flow diagram block 1002, current cell charge levels are determined. As discussed above, writing data into memory causes cell levels to change unidirectionally, for example, 0 to 1, but not 1 to 0. Accordingly, to determine which memory cells to change from 0 to 1, the current cell levels are determined.
(39) In the next encoding operation, indicated by block 1004, next cell charge levels are generated based on the data to be written and on the current cell levels. Examples of techniques for determining next cell levels are discussed in further detail below. At block 1006, the next cell charge levels are written into the memory. For example, the next cell levels may be stored into memory cells of a data device, or maybe provided to a memory of a host device, or may be transmitted to an external destination.
(40) As a result, the rewriting method enable new data to be stored in cells (to replace old data) two or more times without decreasing cell levels. In addition, an error correction method enables the most recently written data to be recovered even though noise may have changed the levels of some of the cells.
(41) In particular, the rewriting operation takes the current cell levels (s1, . . . , sN) and the new data (b1, . . . , bM) as input, and computes new cell levels (s1, . . . , sN), where For i=1, . . . , N, si is greater than or equal to si. In addition, the new cell-level vector (s1, . . . , sN) represents the new data (b1, b2, . . . , bM), according to the mapping specified by the method. Accordingly, given the new cell levels (s1, . . . , sN), the decoding algorithm can uniquely determine the value of the new data (b1, . . . , bM).)
(42) In some embodiments, to generate the next cell levels such as in block 1004, the method may use a binary matrix A.sub.NN=(a.sub.i,j).sub.NN of N rows and N columns, whose value is fixed and known to the system. For example, for i=1, . . . , N and j=1, . . . , N, a.sub.i,j{0,1} is the bit in the i-th row and j-th column of the matrix A.sub.NN. Furthermore, the method may use a subset of {1, 2, . . . , N} denoted by FWOM, and another subset of {1, 2, . . . , N} denoted by FC to generate the next cell levels, such that:
(43) FC contains at least one element. That is, |FC| is greater than or equal to 1,
(44) There are M elements in FWOM but not in FC, that is, |FWOMFC|=M,
(45) At least one element of {1, 2, . . . , N} is neither in FWOM nor in FC. That is, |{1, 2, . . . , N}FWOMFC| is greater than or equal to 1.
(46) FC is a subset of FWOM. That is, FCFWOM.
(47) Furthermore, in some embodiments, to generate the next cell levels, the method may use a binary vector (g1, g2, : : : , gN) called a dither, whose value is known to the system. The value of the dither can be the same or different for each of the rewrites. Two other binary vectors (v1, v2, . . . , vN) and (v1, v2, . . . , vN) may be determined as follows:
(48) For i=1, . . . , N, vi=sigi is called the value of the i-th cell before the write. Here is the exclusive-OR operation.
(49) For i=1, . . . , N, vi=sigi is called the value of the i-th cell after the write.
(50) Furthermore, let A.sup.1.sub.NN be the inverse of the matrix A.sub.NN, and let (u1, u2, . . . , uN) be the binary vector (u1, u2, . . . , uN)=(v1, v2, . . . , vN) A.sup.1.sub.NN. In addition, the vector (u1, u2, . . . , uN) may have the following properties:
(51) The value of the bits {u.sub.i|1iN, iF.sub.WOMF.sub.C}namely those bits in (u1, . . . , uN) whose indices are in FWOM FCequals the value of the data (b1, ,bM).
(52) The value of the bits {u.sub.i|iF.sub.C} is a constant (such as all 0s or any other fixed value) known to the system.
(53) The value of the bits {u.sub.i|1iN, iFWOMFC} is computed by the method for rewriting.
(54) In some embodiments, the number of cells whose levels are change from 0 to 1 by the rewriting method is minimized or otherwise reduced. Accordingly, the method may minimize or otherwise reduce the value of .sub.i=1.sup.N s.sub.is.sub.i.
(55) In some embodiments, the method may use the following 1.sup.st probabilistic model to describe the relationship between cell levels (s1, . . . , sN) and (s1, . . . sN). Let
(56)
and let [0, 1] be a real-number parameter whose value is known to the system. For i=1, . . . , N,
(57)
(58) In some embodiments, the method may use the new cell levels (s1, . . . , sN) as the vector that maximizes or otherwise increases the value Pr{(s1, . . . , sN)|(s1, . . . , sN)}.
(59) In some embodiments, the method may choose the new cell levels (s1, . . . , sN) as the vector that maximizes or otherwise increases the value Pr{(s1, . . . , sN)|(s1, . . . , sN)}.
(60) In some embodiments, to generate the next cell levels, the method may compute the value of bits u1, u2, . . . , uN sequentially, and subsequently computes the value of cell levels (s1, . . . , sN) as (s1, . . . , sN)=(v1, . . . , vN)(g1, . . . , gN)=(u2, . . . , uN).Math.A.sup.1.sub.NN(g1, . . . , gN). For i=1, . . . , N, the method computes the following:
(61) 1: If iF.sub.WOMF.sub.C and i is the j-th element in F.sub.WOMF.sub.C (for j{1, 2, . . . , M}), let u.sub.i=b.sub.j (the j-th bit in the new data). Otherwise, go to step 2.
(62) 2. If iF.sub.C, let .sub.i be the constant value specified previously (such as the value 0). Otherwise, go to step 3.
(63) 3. If i{1, 2, . . . , N}F.sub.WOM, let .sub.i take the value that maximizes the value of Pr{.sub.2|(.sub.1, .sub.1), . . . , (s.sub.N, .sub.N), .sub.1, . . . , .sub.i1} assuming that each of .sub.i+1, . . . , .sub.N is equally likely to be 0 and 1.
(64) In some embodiments, the method may use the following 2.sup.nd probabilistic model to describe the relationship between vectors (v1, . . . , vN) and ((s1,v1), . . . , (sn,vn)). For I=1, . . . , N. Pr((s.sub.i, .sub.i)=(1,0)|.sub.i=0)=1, Pr((s.sub.i, .sub.i)=(0,0)|.sub.i=0)=(1), Pr((s.sub.i, .sub.i)=(0,1)|.sub.i=0)=, Pr((s.sub.i, .sub.i)=(1,1)|.sub.t=0)=0, Pr((s.sub.i, .sub.i)=(1,0)|.sub.t=1)=0, Pr((s.sub.i, .sub.i)=(0,0)|.sub.i=1)=, Pr(s.sub.i, .sub.i)=(0,1)|.sub.i=1=(1), Pr((s.sub.i, .sub.i)=(1,1)|.sub.i=1)=1.
(65) In some embodiments, the method may choose the new cell levels (s1, . . . , sN) as the vector that maximizes or otherwise increases the value Pr{(s1, . . . , sN)|(s1, . . . , sN)}.
(66) In some embodiments, the method may choose the new cell levels (s1, . . . , sN) as the vector that maximizes or otherwise increases the value Pr{(s1, . . . , sN)|(s1, . . . , sN)}.
(67) In some embodiments, the method may compute the value of bits u1, u2, . . . , uN sequentially, and subsequently computes the value of levels (s1, . . . , sN) as (s1, . . . , sN)=(v1, . . . , vN) (g1, . . . , gN)=(u2, . . . , uN).Math.A.sup.1.sub.NN(g1, . . . , gN). For i=1, . . . , N the method may compute the following:
(68) 1: If iF.sub.WOMF.sub.C and i is the j-th element in F.sub.WOMF.sub.C (for j{1, 2, . . . , M}), let u.sub.i=b.sub.j (the j-th bit in the new data). Otherwise, go to step 2.
(69) 2: If iF.sub.C, let u.sub.t be the constant value specified previously (such as the value 0. Otherwise, go to step 3.
(70) 3: If i{1, 2, . . . , N}F.sub.WOM, let .sub.i take the value that maximizes the value of Pr{.sub.i|(s.sub.1, .sub.1), . . . , (s.sub.N, .sub.N), .sub.1, . . . , .sub.i1} assuming that each of .sub.i+1, . . . , .sub.N is equally likely to be 0 and 1.
(71) In some embodiments, the matrix A.sub.NN, may be specified as follows. Let m be a positive integer, and let N=2.sup.m, Let
(72)
and let A.sub.NN=G.sub.2.sup.m be the m-th Krobecker product of G.sub.2.
(73) In some embodiments, the dither may be a pseudo-random number, which can be generated by a pseudo-random-number generator using a seed number as input. The seed number may be stored in the system.
(74) In some embodiments, the method may compute the value of bits u1, u2, . . . , uN sequentially, and subsequently computes the value of cell levels (s1, . . . , sN) as (s1, . . . sN) 1, . . . , vN)(g1, . . . , gN)=(u2, . . . , uN).Math.A.sup.1.sub.NN(g1, . . . , gN). For i=1, . . . , N, the method may compute the following: Step 1: Let y=(y.sub.1, y.sub.2 . . . , y.sub.N)=((s.sub.1, .sub.1), (s.sub.2, .sub.2, . . . . , (s.sub.N, .sub.N)) be a vector of N elements, where every element y.sub.i=(s.sub.i, .sub.i) is a pair of bits. Step 2: Let J=(j.sub.1, j.sub.2), . . . j.sub.M)=F.sub.WOMF.sub.C where j.sub.1<j.sub.2< . . . <j.sub.m. Let u.sub.F.sub.
(75)
with the base cases
W.sub.1.sup.1((1,0),(*)|0)=1
W.sub.1.sup.1((0,0),(*)|0)=(1)
W.sub.1.sup.1((0,1),(*)|0)=
W.sub.1.sup.1((1,1),(*)|0)=0
W.sub.1.sup.1((1,0),(*)|1)=0
W.sub.1.sup.1((0,0),(*)|1)=
W.sub.1.sup.1((0,1),(*)|1)=(1)
W.sub.1.sup.1((1,1),(*)|1)=1.(3) where (*) denotes an empty vector. The operator {circle around (l)} between two binary vectors denotes the element-wise exclusive-OR computation. The operator between two bits denotes the binary exclusive-OR computation. Step 5: For i=1, 2, . . . , N, if i.Math.F.sub.WOM, then do the following: Step 5.1: Let L.sub.N.sup.i (y, (u.sub.1, u.sub.2, . . . , u.sub.i1)) take the value W.sub.N.sup.i (y, (u.sub.1, u.sub.2, . . . , u.sub.i1)|u.sub.i=0)/W.sub.N.sup.i(y, (u.sub.1, u.sub.2, . . . , u.sub.i1)|u.sub.i=1). Step 5.2: Let u.sub.i take the value 0 with probability
(76)
(77)
(78) In some embodiments, the matrix A.sub.NN may be the generating matrix of a polar code, and FWOM may be contained in the frozen set of the polar code corresponding to the channel described by the transition 2.sup.nd probabilistic model, where the channel has vi as the channel input and (si, vi) as the channel output.
(79) In some embodiments, FWOM may be determined as follows:
(80) For i=1, 2, , N, let z denote ((y1, y2, , yN), (u1, u2, , ui1)), and compute a value
(81)
Where W.sub.N.sup.i(z|0) and W.sub.N.sup.i(z|1) computed as discussed below. In addition, let R be a real number parameter greater than zero. Furthermore, let F.sub.WOM={j.sub.1, j.sub.2, . . . , j.sub.N(H()R)} be a subset of {1, 2, . . . , N} with cardinality N((H()R), such that all values in {FER(W.sub.N.sup.i)|iF.sub.WOM} are greater than or equal to each value in {FER(W.sub.N.sup.i)|i{1, . . . , N}F.sub.WOM}.
(82) In some embodiments, the matrix A.sub.NN may be the generating matrix of a polar code.
(83) After the rewrite described above, which changes cell levels to (s1, s2, . . . , sN) to store the data (b1, b2, . . . , bM), noise may appear in the cells and change the cell levels to (c1, c2, . . . , CM), where ci is a bit that is not necessarily equal to si. The error-correction method takes the noisy cell levels (c1, c2, . . . , CM) as input, and outputs the stored data (b1, b2, . . . , bM).
(84)
(85) The method of
(86) The method shown in
(87) In the first operation, represented by the flow diagram block 2002, a set of cell level values to be decoded is retrieved from the WOM.
(88) In the next decoding operation, indicated by block 2004, the set of values is decoded to generate the corresponding data value. Examples of techniques for decoding are discussed in further detail below. At block 2006, the data value is provided to a data destination, such as a host computer. For example, the data value may be transmitted by a transmitter to the data destination.
(89) In particular, to generate the data value, the decoding or error correction function may use a binary vector (u1, . . . , 1N) and has the following properties:
(90) Property 1: For any iF.sub.C, u.sub.i is given the fixed bit value that has been assigned to u.sub.i (which is know in the system).
(91) Property 2: Among all the values that satisfy Property 1, the value assigned to (u.sub.1, . . . , u.sub.N) maximizes the probability that the noise changed the codeword from (s.sub.1, . . . , s.sub.N)=(u.sub.1, . . . , u.sub.N)A.sub.NN(g.sub.1, . . . , g.sub.N) to (c.sub.1, . . . , c.sub.N).
(92) The probability may be determined by the errors' probabilistic characteristic. Accordingly, for every iFWOMFC a data bit bj is recovered as ui, where bj was assigned to ui for the most recent rewrite.
(93) In some embodiments, to generate the data value, the method may use a binary matrix A.sub.NN=(a.sub.i,j).sub.NN of N rows and N columns, whose value is fixed and known to the system. For example, for i=1, . . . , N and j=1, , N a.sub.i,j{0,1} is the bit in the i-th row and j-th column of the matrix A.sub.NN. Furthermore, the method may use a subset of {1, 2, . . . , N} denoted by FWOM, and another subset of {1, 2, , N} denoted by FC, such that:
(94) FC contains at least one element. That is, |FC| is greater than or equal to 1,
(95) There are M elements in FWOM but not in FC, that is, |FWOMFC|=M,
(96) At least one element of {1, 2, . . . , N} is neither in FWOM nor in FC. That is, |{1, 2, . . . , N}FWOMFC| is greater than or equal to 1.
(97) FC is a subset of FWOM. That is, FCFWOM.
(98) Furthermore, in some embodiments, the errors in the cells may have the following distribution:
(99) Let p.sub.0 and p.sub.1 be two real-number parameters between 0 and 1. For i=1, . . . , N, we have Pr{c.sub.i=0|s.sub.i=0}Pr{0|0}=1p.sub.0, Pr{c.sub.i=1|s.sub.i=0}Pr{1|0}=p.sub.0, Pr{c.sub.i=0|s.sub.i=1}Pr{0|1}=p.sub.1 and Pr{c.sub.i=1|s.sub.i=1}Pr{1|1}=1p.sub.1.
(100) In such embodiments, binary vector ((u1, . . . , 1N) may have the following properties:
(101) Property 1: For any iF.sub.C, u.sub.i is given the fixed bit value that has been assigned to u.sub.i (which is know to the system).
(102) Property 2: Among all the values that satisfy Property 1, the value assigned to (u.sub.1, . . . u.sub.N) maximizes the value of .sub.i=1.sup.N Pr{c.sub.i|.sub.i}, where .sub.t denotes the ith bit in the vector (u.sub.1, . . . u.sub.N) A.sub.NN(g.sub.1, . . . g.sub.N).
(103) In some embodiments, the matrix A.sub.NN may be the generating matrix of a polar code, and p is a real number parameter between zero and one. The method may correct errors and may recover the data values (b1, b2, . . . , bM) as follows:
(104) 1: Recovering the value of (.sub.1, . . . , .sub.N) using a decoding algorithm of an error-correcting polar code based on the following setting: The polar code's generating matrix is A.sub.NN. The polar code encodes the user data (u.sub.1, . . . , u.sub.N) into the codeword (.sub.1, . . . , .sub.N) via the formula (.sub.1, . . . , .sub.N)=(u.sub.1, . . . , u.sub.N)A.sub.NN. For i=1, . . . , N, the codeword bit .sub.1 is transmitted through a binary-symmetric channel with transition probability p; and the output of that binary-symmetric channel is the noisy codeword bit c.sub.i. The frozen set of the polar code corresponding to the binary-symmetric channel is contained in F.sub.C; and when encoding user data into the codeword, the user-data bits in F.sub.C are fixed at known values (such as all 0's). The decoding algorithm considers (c.sub.1, . . . , c.sub.N) as the noisy codeword, and recovers the correct value of the original codeword (.sub.1, . . . , .sub.N).
(105) 2: Let (u.sub.1, . . . , u.sub.N)=(.sub.1, . . . , .sub.N)A.sub.NN.sup.1. For every iF.sub.WOMF.sub.Csay b.sub.j was assigned to u.sub.i for the most recent rewritewe recover the data bit b.sub.j as u.sub.i.
(106) In some embodiments, to generate the data value, the decoding algorithm also may include computing the value of ui for i=1, . . . , N as follows: If iF.sub.C, let u.sub.i be the constant value that was assigned to it by the previous rewrite. If i.Math.F.sub.C, let u.sub.i take the value that maximizes the value of Pr{u.sub.i|c.sub.1, . . . , c.sub.N, u.sub.1, . . . , u.sub.i1} assuming that each of u.sub.i+1, . . . , u.sub.N is equally likely to be 0 and 1.
(107) In some embodiments, the decoding algorithm may be a list-decoding algorithm that is further specified as follows: Let L be a positive integer parameter that indicates the size of a list, where each element in the list is an assignment of value to (u1, u2, . . . , ui1) before the value of ui is computed. For i=1, . . . , N, the decoding algorithm computes the value of ui with the following:
(108) If iF.sub.C, let u.sub.i be constant value that was assigned to it by the previous rewrite.
(109) If i.Math.F.sub.C, for each element in the list (which is an assignment of value to (u.sub.1, u.sub.2, . . . , u.sub.i1)), append to it the value assignment u.sub.i=0, and also append to it the value assignment u.sub.i=0, and also append to it the value assignment u.sub.i=1, thus converting that element into two new elements in the list. If the list now contains more than L elements, keep only the L elements that are most likely in the list. The likelihood of an element in the list may be computed as Pr{c.sub.1, . . . c.sub.N|u.sub.1, . . . , u.sub.i} assuming that each of u.sub.i+1, . . . , u.sub.N is equally likely to be 0 and 1.
(110) The most likely element in the list may then be chosen as the recovered value for (u1, . . . , uN).
(111) In some embodiments, the stored data (b1, . . . , bM) may itself be an error-correcting code C and therefore may contain redundancy. The decoding algorithm, in 1 may be further specified as follows: Let L be a positive integer parameter that indicates the size of a list, where each element in the list is an assignment of value to (u1, u2, . . . , ui1) before the value of ui is computed. For i=1, . . . , N, the decoding algorithm computes the value of ui with the following:
(112) If iF.sub.C, let u.sub.i be the constant value that was assigned to it by the previous write.
(113) If i.Math.F.sub.C, for each element in the list (which is an assignment of value to (u.sub.1, u.sub.2, . . . , u.sub.i1)), append to it the value assignment u.sub.i=0, and also append to it the value assignment u.sub.i=1, thus converting that element into two new elements in the list. If the list now contains more than L elements, keep only the L elements that are most likely in the list. The likelihood of an element in the list may be computed as Pr{c.sub.1, . . . , c.sub.N|u.sub.1, . . . , u.sub.i} assuming that each of u.sub.i+1, . . . , u.sub.N is equally likely to be 0 and 1.
(114) Then, for each element in the list, the method checks if its value assignment to (u.sub.i|iF.sub.WOMF.sub.C), which should equal (b1, . . . , bM), is a valid codeword in the error-correcting code C; and if not, remove it from the list. Then, the method may choose the most likely element in the remaining list as the recovered value for (u1, . . . , uN).
(115) In some embodiments, the decoding algorithm may be based on a belief-propagation decoding algorithm for polar error-correcting codes.
(116) In some embodiments, the matrix A.sub.NN may be specified as follows. Let m be a positive integer, and let N=2.sup.m. Let
(117)
and let A.sub.NN=G.sub.2.sup.m be the m-th Kronecker product of G.sub.2.
(118) In some embodiments, recovering the value action discussed above may further include the following:
(119) 1: Let y=(y.sub.1, y.sub.2, . . . , y.sub.N)=((c.sub.1g.sub.1), (c.sub.2g.sub.2) . . . , (c.sub.Ng.sub.N)) be a vector of N elements, where every element y.sub.i=c.sub.ig.sub.i is a bit.
(120) 2: For every iF.sub.C, let u.sub.i=0.
(121) 3: Compute the values of W.sub.N.sup.i(y, (u.sub.1, u.sub.2, . . . , u.sub.11)|u.sub.i=0) and W.sub.N.sup.i(y, (u.sub.1, u.sub.2, . . . , u.sub.i1)|u.sub.i=1) for i=1, 2, . . . , N as follows: Depending on the parity of i, the value of W.sub.N.sup.i is recursively evaluated through one of the formulae below (beginning with n=N/2):
(122)
W.sub.1.sup.1((0),(.)|0)=1p
W.sub.1.sup.1((1),(.)|0)=p
W.sub.1.sup.1((0),(.)|1)=p
W.sub.1.sup.1((1),(.)|1)=1p(7)
where (.) denotes an empty vector. The operator between two binary vectors denotes the element-wise exclusive-OR computation. The operator between two bits denotes the binary exclusive-OR computation.
(123) 4: For each iF.sub.WOMF.sub.C, if W.sub.N.sup.i(y.sub.1, y.sub.2, . . . , y.sub.N), (u.sub.1, u.sub.2, . . . u.sub.i1)|u.sub.i=0)W.sub.N.sup.i(y.sub.1, y.sub.2, . . . y.sub.N), (u.sub.1, u.sub.2, . . . , u.sub.i1)|u.sub.i=1), let u.sub.i=0; otherwise, let u.sub.i=1
(124) 5: Let {u.sub.i|iF.sub.WOMF.sub.C} be the recovered value for the data (b.sub.1, . . . , b.sub.M), where the mapping from the bits in {u.sub.i|iF.sub.WOMF.sub.C} to the bits in (b.sub.1, . . . , b.sub.M) is as specified in the previous rewrite operation.
(125) In some embodiments, the method may be a list-decoding algorithm further specified as follows:
(126) Let L be a positive integer parameter that indicates the size of a list, where each element in the list is an assignment of value to (u1, u2, . . . ,ui1) before the value of ui is computed. In addition, the method may include the following:
(127) 1: Let y=(y.sub.1, y.sub.2, . . . , y.sub.n)=((c.sub.1g.sub.1), (c.sub.2g.sub.2), . . . , (c.sub.Ng.sub.N)) be a vector on N elements, where every element y.sub.i=c.sub.ig.sub.i is a bit.
(128) 2: For every iF.sub.C, let u.sub.i=0.
(129) 3: Compute the values of W.sub.N.sup.i(y, (u.sub.1, u.sub.2, . . . , u.sub.i1)|u.sub.i=0) and W.sub.N.sup.i(y, (u.sub.1, u.sub.2, . . . , u.sub.i1)|u.sub.i=1) for i=1, 2, . . . , N as follows: Depending on the parity of i, the value of W.sub.N.sup.i is recursively evaluated through one of the formulae below (beginning with n=N/2):
(130)
with the base cases
W.sub.1.sup.1((0),(.)|0)=1p
W.sub.1.sup.1((1),(.)|0)=p
W.sub.1.sup.1((0),(.)|1)=p
W.sub.1.sup.1((1),(.)|1)=1p(10)
where (.) denotes an empty vector. The operator between two binary vectors denotes the element-wise exclusive-OR computation. The operator between two bits denotes the binary exclusive-OR computation.
(131) 4: For i=1, 2, . . . , N, do: If iF.sub.C, for each element in the list (which is an assignment of value to (u.sub.1, u.sub.2, . . . , u.sub.i1), append it to the value assignment u.sub.i=0, and also append it to the value assignment u.sub.i=1, thus converting that element into two new elements in the list. If the list now contains more than L elements, keep only the L elements that are most likely in the list. The likelihood of an element in the list may be computed as W.sub.N.sup.i((y.sub.1, . . . . , y.sub.N), (u.sub.1, . . . , u.sub.i1)|u.sub.i).
(132) 5: Choose the most likely element in the list as the recovered value for (u.sub.1, . . . u.sub.N). The likelihood of an element in the list here may be computed as W.sub.N.sup.N((y.sub.t, . . . , y.sub.N), (u.sub.1, . . . ,u.sub.N1)|u.sub.N). Then let {u.sub.1|iF.sub.WOMF.sub.C} be the recovered value for the data (b.sub.1, . . . , b.sub.M) where the mapping from the bits in {u.sub.1|F.sub.WOMF.sub.C} to the bits in (b.sub.1, . . . , b.sub.M) is as specified in the previous rewrite operation.
(133) In some embodiments, the stored data (b1, . . . , bM) may itself be an error-correcting code C and therefore may contain redundancy and the method may include:
(134) Let L be a positive integer parameter that indicates the size of a list, where each, element in the list is an assignment of value to (u1, u2, . . . , ui1) before the value of ui is computed. The method further includes the following:
(135) 1: Let y=(y.sub.1, y.sub.2, . . . , y.sub.n)=((c.sub.1g.sub.1), (c.sub.2g.sub.2), . . . , (c.sub.Ng.sub.N)) be a vector of N elements, where every element y.sub.i=c.sub.tg.sub.t is a bit.
(136) 2: For every iF.sub.C, let u.sub.i=0.
(137) 3: Compute the values of W.sub.N.sup.i(y, (u.sub.1, u.sub.2, . . . , u.sub.i1)|u.sub.i=0) and W.sub.N.sup.i(y, (u.sub.1, u.sub.2, . . . , u.sub.i1)|u.sub.i=1) for i=1, 2, . . . , N as follows: Depending on the parity of i, the value of W.sub.N.sup.i is recursively evaluated through one of the formulae below (beginning with n=N/2):
(138)
with the base cases
W.sub.1.sup.1((0),(.)|0)=1p
W.sub.1.sup.1((1),(.)|0)=p
W.sub.1.sup.1((0),(.)|1)=p
W.sub.1.sup.1((1),(.)|1)=1p(13)
where (.) denotes an empty vector. The operator between two binary vectors denotes the element-wise exclusive-OR computation. The operator between two bits denotes the binary exclusive-OR computation.
(139) 4: For i=1, 2, . . . , N, do: If iF.sub.C, let u.sub.i=0. If i.Math.F.sub.C, for each element in the list (which is an assignment of value to (u.sub.1, u.sub.2, . . . , u.sub.i1), append it to the value assignment u.sub.i=0, and also append it to the value assignment u.sub.i=1, thus converting that element into two new elements in the list. If the list now contains more than L elements, keep only the L elements that are most likely in the list. The likelihood of an element in the list may be computed as W.sub.N.sup.i((y.sub.1, . . . , y.sub.N), (u.sub.1, . . . , u.sub.i1)|u.sub.i).
(140) 5: Then, for each element in the list, check if its value assignment to (u.sub.i|iF.sub.WOMF.sub.C), which should equal (b.sub.1, . . . , b.sub.M), is a valid codeword in the error-correcting code C; and if not, remove it from the list. Then, choose the most likely element in the remaining list as the recovered value for (u.sub.1, . . . u.sub.N). The likelihood of an element in the list here may be computed as W.sub.N.sup.N ((y.sub.1 . . . , u.sub.N), (u.sub.1, . . . , u.sub.N1). Then let {u.sub.i|iF.sub.WOMF.sub.C} be the recovered value for the data (b.sub.i, . . . , b.sub.M), where the mapping from the bit in {u.sub.i|iF.sub.WOMF.sub.C} to the bits in (b.sub.1, . . . , b.sub.M) is as specified in the previously rewrite operation.
(141) In some embodiments, FC may be determined as follows:
(142) Let the target block error rate be B, a non-negative real-number parameter between 0 and 1. Let (j1, j2, . . . , jN) be a permutation of {1, 2, . . . , N} such that the decoding error probability of the bit uj1 is the greatest, the decoding error probability of the bit uj2 is the second greatest, and so on, and the decoding error probability of the bit ujN is the smallest. Let the size of FC, |FC|, be chosen as the smallest integer such that the summation of the decoding error probabilities of the bits u.sub.j|F.sub.
(143) In some embodiments, FC.Math.FWOM. In alternative embodiments, FC is not a subset of FWOM. That is, FCFWOM is not empty.
(144) In some embodiments, the rewriting or encoding methods described above are modified to include storing the value of the bits {u.sub.i|iF.sub.CF.sub.WOM} in N.sub.additional additional cells, using an error-correcting code of length N.sub.additional that encodes |FCFWOM| bits. (Those additional cells are disjoint for the rewrites.)
(145) In some embodiments, the error correction of decoding methods described above are modified to include recovering the value of the bits in {u.sub.i|iF.sub.CF.sub.WOM} by decoding the error-correcting code stored in the N.sub.additional additional cells. In addition, the error correction or decoding method described above may be such that the value of the bits in {u.sub.i|iF.sub.CF.sub.WOM} is fixed as the above recovered value.
(146) In some embodiments, for j=1, 2, . . . , t, FCj denotes the set FC for the j-th rewrite. FWOMj denotes the set FWOM for the j-th rewrite, and N.sub.additional additional cells are used for a code that supports t rewrites and error-correction processes. In such, embodiments, for j=1, . . . , t, M=|FCjFWOMj| bits are stored in the j-th rewrite. The code can be any code described herein.
(147) In some embodiments, methods of encoding discussed above may be modified such that for j=1, 2, . . . . , t, and for the j-th rewrite, the value of the bits {u.sub.i|iF.sub.C,jF.sub.WOM,j} in the N.sub.additional additional cells, are stored using the code specified above for the N.sub.additional additional cells.
(148) In some embodiments, for j=1, . . . , t, M=|FC,jFWOMj| bits are stored in the j-th rewrite, and methods of decoding discussed above may be modified such that the value of the bits in {u.sub.i|iF.sub.C,jF.sub.WOM,j} are recovered by decoding the rewrite- and error-correction code stored in the N.sub.additional additional cells. In addition, methods of decoding discussed above may be modified such that the value of the bits in {u.sub.i|iF.sub.C,jF.sub.WOM, j} is fixed as the above value.
(149) In some embodiments, the WOM cells are binary. In alternative or additional embodiments, every cell has q-levels: level 0, level 1, . . . , and level q-1,
(150) and the exclusive-OR operation is generalized to the modular-q summation.
(151) In such embodiments, methods for rewriting and error-correction or encoding may use the cells in the following level-by-level approach:
(152) The methods may first use level 0 and level 1 and apply the previously described features for binary cells;
(153) The methods may then use level 1 and level 2 (as if they were level 0 and level 1) and apply the previously described features for binary cells;
(154) The methods may then use level 2 and level 3 (as if they were level 0 and level 1) and apply the previously described features for binary cells;
(155) The above process(es) may continue, until finally, the methods may use level q-2 and level q-1 (as if they were level 0 and level 1) and apply the previously described features for binary cells.
(156) In some embodiments, methods for rewriting and error correction or encoding may be modified such that each ui, si, gi, vi, si or vi takes its value from the set {0,1, . . . , q-1}, and the exclusive-OR operation may be generalized to the modular-q summation.
(157) An example, as discussed with reference to
(158)
(159)
(160) Consider a rewrite (encode) operation and the subsequent error-correction (decode) operation. For the rewrite, let the dither be (g1, . . . , gN)=(g1, . . . , g8)=(1,0,1,0,1,0,0,1). Let a=0:87. Let e=0:29. Let FWOM={1, 2, 4, 5, 6}. Let FC={2, 6}. Let M=|FWOMFC|=|{1, 4, 5}|=3. And let the data to be stored be (b1, b2, . . . , bM)=(b1, b2, b3)=(1, 0, 1). Assume the cell levels before this rewrite are (s1, . . . , sN)=(s1, . . . , sN)=(0, 0, 1, 0, 0, 0, 0, 0). As a result (v1, . . . , vn)=(v1, . . . , v8)=(s1 g1, . . . , s8g8)=(1, 0, 0, 0, 1, 0, 0, 1).
(161) Consider the rewrite where (v1, . . . , v8)=(u1, . . . , u8) A.sub.88 and the transition probabilities of the WOM channels 42 are shown in
(162) To write the data (b.sub.1, b.sub.2, . . . , b.sub.M), our method has the following inputs: (1) The current cell levels (s.sub.1, s.sub.2, . . . , s.sub.N), and (2) the new data to store (1, b.sub.2, . . . b.sub.M). It then computes the output (s.sub.1, s.sub.2, . . . , s.sub.N), and programs the cells to those new levels. Here are our constraints: 1) As mentioned before, for i=1, 2, . . . , N, we have the constraint that is s.sub.is.sub.i. 2) The new cell levels (s.sub.1, s.sub.2, . . . , s.sub.N) represents the new data (b.sub.1, b.sub.2, . . . , b.sub.M), via the mapping specified by our method.
(163) Next, consider the error correction (decode).
(164) The remainder of the description is organized as follows. Section II includes a basic model and notations. Section III includes an embodiment of code construction. Section IV includes embodiments of code. Section V includes embodiments of code extensions. Section VI includes an analysis of actual sum-rates achieved by a code embodiment. Section VII includes further example embodiments. Section VIII includes concluding remarks.
II. Basic Model
(165) A memory may have N(=2.sup.m) WOM cells that are used to store data, where each cell has two levels; 0 and 1. The cells can change only from level 0 to level 1, but not vice versa.
(166) A sequence of t messages M.sub.1, M.sub.2, . . . , M.sub.t may be written into the WOM cells, and when M.sub.i is written, the value of the previous messages need not be remembered. (Let M.sub.j denote the number of bits in the message M.sub.j, and let M.sub.j{0,1}.sup.M.sup.
(167) After cells are programmed, noise may appear in the cell levels. Noise may be considered to be a BSC with error probability p, denoted by BSC(p). These errors may be hard errors, namely, they physically change the cell levels from 0 to 1 or from 1 to 0. For flash memories, such errors can be caused by read/write disturbs, interference and charge leakage, for example, and may be quite common.
(168) A. The Model for Rewriting
(169) A code for rewriting and error correction may comprise of t encoding functions E.sub.1, E.sub.2, . . . , E.sub.t and t decoding functions D.sub.1, D.sub.2, . . . , D.sub.t. For i=1, 2, . . . , N and j=1, 2, . . . , t, let s.sub.i,j{0,1} and s.sub.i,j{0,1} denote the level of the i-th cell right before and after the j-th write, respectively. As discussed above, s.sub.i,js.sub.i,j. Let c.sub.i,j{0,1} denote the level of the i-th cell at any time after the j-th write and before the (j+1)-th write, when reading of the message M.sub.j can happen. The error c.sub.i,js.sub.i,j{0,1} is the error in the i-th cell caused by the noise channel BSC(p). (Here is an XOR function.) For j=1, 2, . . . , t, the encoding function
E.sub.j:{0,1}.sup.N{0,1}.sup.M.sup.
changes the cell levels from s.sub.j=(s.sub.1,j, s.sub.2,j, . . . , s.sub.N,j) to s.sub.j=(s.sub.1,j, s.sub.2,j, . . . , s.sub.N,j) given the initial cell state s.sub.j and the message to store M.sub.j. (Namely, E.sub.j(s.sub.j, M.sub.j)=s.sub.j.) When the reading of M.sub.j happens, the decoding function
D.sub.j:{0,1}.sup.N.fwdarw.{0,1}.sup.M.sup.
recovers the message M.sub.j given the noisy cell state c.sub.j=(c.sub.1,j, c.sub.2,j, . . . c.sub.N,j). Namely, D.sub.j(c.sub.1)=M.sub.j.)
(170) For j=1, . . . ,t,
(171)
is called the rate of the j-th write. R.sub.sum=.sub.j=1.sup.t R.sub.j is called the sum-rate of the code. When there is no noise, the maximum sum-rate of WOM code is known to be log.sub.2(t+1), however, for noisy WOM, the maximum sum-rate is still largely unknown.
(172) B. Polar Codes
(173) A short introduction to polar codes follows due to its relevance to the code construction embodiments discussed herein. A polar code is a linear block error correcting code proposed by Arkan, See, e.g. E. Arkan, Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels, IEEE Trans. Inf. Theor., vol. 55, no. 7, pp. 3051-3073, July 2009. It is the first known code with an explicit construction that provably achieves the channel capacity of symmetric binary-input discrete memoryless channels (B-DMC). The encoder of a polar code transforms N input bits u=(u.sub.1, u.sub.2, . . . , u.sub.N) to N codeword bits x=(x.sub.1, x.sub.2, . . . , x.sub.N) through a linear transformation. (e.g. x=uG.sub.2.sup.m where
(174)
and G.sub.2.sup.m is the m-th Kronecker product of G.sub.2.) The N codeword bits (x.sub.1, x.sub.2, . . . , x.sub.N) are transmitted through N independent copies of a B-DMC. For decoding, N transformed binary input channels {W.sub.N.sup.(1), W.sub.N.sup.(2), . . . , W.sub.N.sup.(N)} can be synthesized for u.sub.1, u.sub.2, . . . , u.sub.N, respectively. The channels are polarized such that for large N, the fraction of indices i for which I(W.sub.N.sup.(t)) is nearly 1 approaches the capacity of the B-DMC, while the values of I(W.sub.N.sup.(i)) for the remaining indices i are nearly 0. The latter set of indices are called the frozen set. For error correction, the u.sub.is with i in the frozen set take fixed values, and the other u.sub.is are used as information bits. A successive cancellation (SC) decoding algorithm achieves diminishing block error probability as N increases.
(175) Polar code can also be used for optimal lossy source coding, which has various applications. See, e.g. S. Korada and R. Urbanke, Polar codes are optimal for lossy source coding, IEEE Trans. Inf. Theor., vol. 56, no. 4, pp. 1751-1768, April 2010. In particular the idea may be used to build capacity achieving WOM codes. See, e.g., D. Burshtein and A. Strugatski, Polar write once memory codes, in Proc. IEEE international Symposium on Information Theory, July 2012, pp., 1972-1976.
(176) The presented code analysis uses the concept of upgrading and degrading channels, defined based on frozen sets. As taught by Tal and Vardy, a channel W: X.fwdarw.Z is called degraded with respect to a channel W: X.fwdarw.Y if an equivalent channel of W can be constructed by concatenating W with an additional channel Q: Y.fwdarw.Z, where the inputs of Q are linked with the outputs of W. See, e.g. I. Tal and A. Vardy, How to construct polar codes, CoRR, vol. abs/1105.6164, 2011. That is,
W(z|x)=.sub.yyW(y|x)Q(z|y)
(177) It may be denoted as WW. Equivalently, the channel W is called an upgrade with respect to W, denoted by WW.
III. Code Construction
(178) In this section, embodiments of code construction are described that combine rewriting with error correction.
(179) A. Basic Code Construction with a Nested Structure
(180) 1) General: First, consider a single rewrite (namely, one of the t writes). Let s=(s.sub.1, s.sub.2, . . . , s.sub.N){0,1}.sup.N and s=(s.sub.1, s.sub.2, . . . , s.sub.N){0,1}.sup.N denote the cell levels right before and after this rewrite, respectively. Let g=(g.sub.1, g.sub.2, . . . , g.sub.n) be a pseudo-random, bit sequence with independent and identically distributed bits that are uniformly distributed. The value of g is known to both the encoder and the decoder, and g is called a dither.
(181) For i=1, 2, . . . , N, let .sub.i=s.sub.ig.sub.i{0,1} and .sub.i=s.sub.ig.sub.i{0,1} be the value of the i-th cell before and after the rewrite, respectively. The WOM channel is built, such as shown in
(182) Here [0,1] and
(183)
are given parameters, with
(184)
representing the fraction of cells, at level 0 before the rewrite, and
(185)
representing the fraction of cells that are changed from level 0 to level 1 by the rewrite. Let F.sub.WOM(,).Math.{1, 2, . . . , N} be the frozen set of the polar code corresponding to this channel WOM(,). It is known that
(186)
See, e.g. I. Tal and A. Vardy, How to construct polar codes, CoRR, vol. abs/1105.61.64,2011.
(187) For the noise channel BSC(p), let F.sub.BSC(p).Math.{1, 2, . . . , N} be the frozen set of the polar code corresponding to the channel BSC(p). It is known that
(188)
(189) In this subsection, F.sub.BSC(p).Math.F.sub.WOM(,). This case is as illustrated in
(190) 2) The encoder: Let E: {0,1}.sup.N{0,1}.sup.M.fwdarw.{0,1}.sup.N be the encoder for this rewrite. Namely, given the current cell state s and the message to write M{0,1}.sup.M, the encoder is configured to find a new cell state s=E(s, M) that represents M and is above s (that is, cell levels only increase).
(191) The encoding function in Algorithm 1 follows. Here y and u are two vectors of length
(192)
are all the bits u.sub.i in the frozen set F.sub.WOM(,) but not
(193)
are all the bits u.sub.i in F.sub.BSC(p), and G.sub.2.sup.m is the m-th Kronecker product of
(194)
(195) TABLE-US-00001 Algorithm 1 The encoding function s = E(s, M) y ((s.sub.1, v.sub.1), (s.sub.2, v.sub.2), . . . ,(s.sub.N, v.sub.N)). Let u.sub.F.sub.
(196) 3) The decoder: The decoder D: {0,1}.sup.N.fwdarw.{0,1}.sup.M M now follows. Let c=(c.sub.1, c.sub.2, . . . , c.sub.N){0,1}.sup.N be the noisy cell levels after the message is written. Given c, the decoder should recover the message as D(c)=M.
(197) The decoder may be configured to operate the same way as a polar error correcting code. The decoding operation of one embodiment is presented as Algorithm 2.
(198) TABLE-US-00002 Algorithm 2 The decoding function {circumflex over (M)} = D(c) View c g as a noisy codeword, which is the output of a binary symmetric channel BSC(p). Decode c g using the decoding algorithm of the polar error- correcting code, where the bits in the frozen set F.sub.BSC(p) are set to 0s. Let {circumflex over (v)} = ({circumflex over (v)}.sub.1, {circumflex over (v)}.sub.2, ..., {circumflex over (v)}.sub.N) be the recovered codeword. Let {circumflex over (M)} ({circumflex over (v)}(G.sub.2.sup..Math.m).sup.1).sub.F.sub.
As is clear from the polar error-correcting code, the encoding and the decoding algorithms may have time complexity O(NlogN).
(199) 4) Nested code for t writes: In the above, the operations of the encoder and the decoder for one rewrite have been described. The operations can be applied to a t-write error correcting WOM code as follows. For j=1, 2, . . . , t, for the j-th write, replace ,, s, s, v, v, M, M, E, D, c, {circumflex over (M)}, {circumflex over (v)}, by .sub.j1, .sub.j, s.sub.j, s.sub.j, v.sub.j, v.sub.j, M.sub.j, M.sub.j, E.sub.j, D.sub.j, c.sub.j, {circumflex over (M)}.sub.j, {circumflex over (v)}.sub.j, respectively, and apply the above encoder and decoder.
(200) Note that when N.fwdarw., the values of .sub.1, .sub.2, . . . , .sub.t1 can be computed using .sub.1, .sub.2, . . . , .sub.t1; for BSC(p), .sub.j=.sub.j1(1.sub.j)(1p)+(1.sub.j1(1.sub.j))p. Improving the code may include choosing other values for .sub.1,.sub.2, . . . , .sub.t that maximize or otherwise increases the sum-rate.
(201) B. Extended Code Construction
(202) Code for the case F.sub.BSC(p).Math.F.sub.WOM(,) has so far been discussed. For relatively small p and typical values of (.sub.0, .sub.1), (.sub.1, .sub.2, . . . , (.sub.t1, .sub.t), the above condition holds. Now consider the general case where F.sub.BSC(p) is not necessarily a subset of F.sub.WOM(,).
(203) The encoder in Algorithm 1 may be revised as follows. The bits are then stored in u.sub.F.sub.
(204)
And the sum-rate becomes
(205)
(206) The decoder in Algorithm 2 may be revised as follows. First recover the bits in u.sub.F.sub.
IV. Code Analysis
(207) In this section, the correctness of the above code construction is shown, and its performance is analyzed.
(208) A. Correctness of the Code
(209) The correctness of the code is addressed first. The encoder in Algorithm 1 works similarly to the WOM code encoder in D. Burshtein and A. Strugatski, Polar write once memory codes. In Proc. IEEE International Symposium on Information Theory, July 2012, pp. 1972-1976, with an exception that the bits in F.sub.WOM(,) are not all occupied by the message M, instead, the bits in its subset F.sub.WOM(,)F.sub.BSC(p) are set to be constant values: all 0s. Therefore, the encoder successfully rewrites data in the same way as the code in D. Burshtein and A. Strugatski, Polar write once memory codes, in Proc. IEEE International Symposium on Information Theory, July 2012, pp. 1972-1976. Next, the decoder in Algorithm 2 recovers the cell values from noise in the same way as the standard polar ECC. Then, the stored message M is extracted from it.
(210) One item to note is that although the physical noise may act on the cell levels s=(s.sub.1, s.sub.8, . . . , s.sub.N), the error correcting code used in the construction is actually for the cell values v=(.sub.1, .sub.2, . . . , .sub.n)=(s.sub.1g.sub.1, s.sub.2g.sub.2, . . . , s.sub.Ng.sub.N). However, the pseudo-random dither g has independent and uniformly distributed elements, and so when the noise channel for s is BSC(p), the corresponding noise channel for v is also BSC(p).
(211) B. The Size of F.sub.WOM(,)F.sub.BSC(p)
(212) It may be seen that if F.sub.BSC(p).Math.F.sub.WOM(,), the code has a nested structure. In general, it is observed how large the intersection F.sub.WOM(,)F.sub.BSC(p) can be. For convenience of presentation, consider one rewrite as in Section III-A, where the parameters are and (instead of .sub.j1, .sub.j).
(213)
(214) Proof: (1) In
(215)
note that
(216)
Therefore
(217)
(218) (2) In
(219)
Therefore,
(220)
(221) (3) In
(222) (4) Since p, clearly BSC()BSC(p). Therefore F.sub.BSC(p).Math.F.sub.BSC().
(223) The meaning of Lemma 2 is illustrated in
(224)
(225) Proof: |F.sub.WOM(,c)F.sub.BSC(p)|=F.sub.WOM(,)|+|F.sub.BSC(p)||F.sub.WOM(,)F.sub.BSC(p)||F.sub.WOM(,)|+F.sub.BSC(p)|F.sub.BSC(,)| (by Lemma 2).
(226) C. Lower Bound to Sum-Rate
(227) The sum-rate of the general code construction is analyzed as N.fwdarw.. Let
(228)
For j=1, 2, . . . , t, the number of bits written in the j-th rewrite is
(229)
and the number of additional cells used to store the bits in F.sub.BSC(p)F.sub.WOM (j18j) is
(230)
(231) Therefore, the sum-rate is
(232)
(233)
(234) Lemma 5. Let 0<p.sub.j1.sub.j. Then x.sub.j.sub.j.
(235) Proof: By Lemma 3,
(236)
(237) Theorem 6 Let 0<p.sub.j1.sub.j for j=1, 2, . . . , t. If .sub.j1.sup.t .sub.j1H(.sub.j)1H(p)+H (p)t, then the sum-rate R.sub.sum is lower bounded by
(238)
(239) If .sub.j=1.sup.t .sub.j1H(.sub.j)<1H(p)+H(p)t, and H(p).sub.j1H(.sub.j) for j=1, 2, . . . , t, then R.sub.sum is lower bounded by
(.sub.j=1.sup.t.sub.j1H(.sub.j))H(p)t.
(240) Proof: If .sub.j=1.sup.t .sub.j1H(.sub.j)1H(p)+H(p)t, the sum-rate is minimized when x.sub.j (j=1, 2, . . . , t) takes the minimum value, and x.sub.j.sub.j. Otherwise, the sum-rate is minimized when x.sub.j takes the maximum value 1.
(241) Some numerical results of the lower bound are shown to sum-rate R.sub.sum in
(242)
The curve for p=0 is the optimal sum-rate for noiseless WOM code. The other four curves are the lower bounds for noisy WOM with p=0.001, p=0.005, p=0.010 and p=0.016, respectively, given by Theorem 6. Note that it is possible to further increase the lower bound values by optimizing .sub.t.
V. Extensions
(243) More general noise models are now described. For simplicity, an erasure channel is described. But the principles or other features can be extended to other noise models. Let the noise be a binary erasure channel (BEC) with erasure probability p, denoted by BEC(p). After a rewrite, noise may appear in some cell levels (both level 0 and level 1) and may change the cell levels to erasures. An erasure represents a noisy cell level between 0 and 1. Erasures may be handled as follows: before a rewrite, all the erased cell levels are increased to 1, and then rewriting is performed as before.
(244) Note that although the noise for cell levels is BEC(p), when rewriting happens, the equivalent noise channel for the cell value v=sg is a
(245)
because all the erased cell levels have been pushed to level 1, and dither has a uniform distribution. Therefore, the code construction and its performance analysis can be carried out the same way as before, except that p is replaced by
(246)
(247) The code can also be extended to multi-level cells (MLC), by using q-ary polar codes.
VI. Additional Information
(248) In this section, example achievable rates of the error correcting WOM code are discussed, using polar codes of finite lengths. In the following, assume the noise channel is BSC(p), and search is performed for parameters .sub.1,.sub.2, . . . , .sub.t that achieve high sum-rate for rewriting. When the code can have a nested structure is also discussed. This simplifies the code construction.
(249) A. Finding BSCs Satisfying F.sub.BSC(p).Math.F.sub.WOM()
(250) The first consideration is when BSC(p) satisfies the condition F.sub.BSC(p).Math.F.sub.WOM(,), which leads to a particular nested code structure. Let N=8192. Let the polar codes be constructed using the method(s) described herein. To obtain the frozen sets, let |F.sub.WOM()|=N(H()R), where R=0.025 is a rate loss considered for the polar code of the WOM channel, and let F.sub.BSC(p) be chosen with the target block error rate 10.sup.5.
(251) Example results are shown in
(252) B. Achievable Sum-Rates for Nested Code
(253) Achievable sum-rates of codes with a nested structure may be found. Accordingly, the condition F.sub.BSC(p).Math.F.sub.WOM(.sub.
(254) Results for t-write error-correcting WOM codesfor t=2,3,4,5are shown in
(255) C. Achievable Sum-Rate for General Code
(256) The achievable sum-rates of the general code, when F.sub.BSC(p) is not necessarily a subset of F.sub.WOM (.sub.
(257) The lower bound to sum-rate R.sub.sum is discussed with reference to
VII. Additional Example Embodiments
(258)
(259) The memory controller 1604 operates under control of a microcontroller 1610, which manages communications with the memory 1602 via a write device, such as memory interface 1612 and manages communications with the host device via a host interface 1614. Thus, the memory controller supervises data transfers from the host 1606 to the memory 1602 and from the memory 1602 to the host 1606. The memory controller 1604 also includes a data buffer 1616 in which data values may be temporarily stored for transmission over the data channel controller 1617 between the memory 1602 and the host 1606. They memory controller also includes an Error Correcting code (ECC) block 1618 in which data for the ECC is maintained. For example, the ECC block 1618 may comprise data and program code to perform error correction operations for a an embodiment of a encoding and decoding scheme as discussed herein. Some embodiments of such error correction operations are described, for example, in U.S. Patent Application entitled Error Correcting Codes for Rank Modulation by Anxiao Jiang et al. filed Nov. 20, 2008, and incorporated herein by reference. The ECC block 1618 may contain parameters for the error correction code to be used for the memory 1602, such as programmed operations for translating between received symbols and error-corrected symbols, or the ECC block may contain lookup tables for codewords or other data, or the like. The memory controller 1604 of one embodiment may perform the operations described above for decoding data and for encoding data.
(260) The operations described above for operating a data storage device, for reading data from a device, for programming a data storage device, and encoding and decoding, can be carried out by the operations discussed above which can be performed by the microcontroller 1610 and associated components of the data storage device 1608.
(261) The processing components such as the controller 1604 and microcontroller 1610 to perform the various operations described herein may be implemented in some embodiments in the form of control logic in software (or other computer-readable instruction stored on a non-transitory computer-readable storage medium and executable by one or more processors) or hardware or a combination of both, and may comprise the processor(s) that execute software program instructions from program memory, or as firmware, or the like. The host device 1606 may comprise a computer apparatus. A computer apparatus also may carry out the operations depicted in the various figures herein or otherwise described above.
(262)
(263) Depending on the desired configuration, processor 910 can be of any type including but not limited to a microprocessor (P), a microcontroller (C), a digital signal processor (DSP), or any combination thereof. Processor 910 can include one more levels of caching, such as a level one cache 911 and a level two cache 912, a processor core 913, and registers 914. The processor core 913 can include an arithmetic logic unit (ALU), a floating point unit (FPU), a digital signal processing core (DSP Core), or any combination thereof. A memory controller 915 can also be used with the processor 910, or in some implementations the memory controller 915 can be an internal part of the processor 910.
(264) Depending on the desired configuration, the system memory 920 can be of any type including but not limited to volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.) or any combination thereof. System memory 920 typically includes an operating system 921, one or more applications 922, and program data 924. Applications 922 include encoding and decoding algorithms 923 that is arranged to encode and decode, for example, program data 924 as discussed below. In some embodiments, applications 922 can be arranged to operate with program data 924 on an operating system 921. This described basic configuration is illustrated in
(265) Computing device 900 can have additional features or functionality, and additional interfaces to facilitate communications between the basic configuration 901 and any required devices and interfaces. For example, a bus/interface controller 940 can be used to facilitate communications in accordance with the present disclosure between the basic configuration 901 and one or more data storage devices 950 via a storage interface bus 941. The data storage devices 950 can be removable storage devices 951, non-removable storage devices 952, or a combination thereof. Examples of removable storage and non-removable storage devices include magnetic disk devices such as flexible disk drives and hard-disk drives (HHDs), optical disk drives such as compact disk (CD) drives or digital versatile disk (DVD) drives, solid state drives (SSDs), and tape drives to name a few. Example computer storage media can include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.
(266) System memory 920, removable storage 951 and non-removable storage 952 are all examples of computer storage media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVDs) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computing device 900. Any such computer storage media can be part of device 900.
(267) Computing device 900 can also include an interface bus 942 for facilitating communication from various interface devices (e.g., output interfaces, peripheral interfaces, and communication interfaces) to the basic configuration 901 via the bus/interface controller 940. Example output devices 960 include a graphics processing unit 961 and an audio processing unit 962, which can be configured to communicate to various external devices such as a display or speakers via one or more A/V ports 963. Example peripheral interfaces 970 include a serial Interface controller 971 or a parallel interlace controller 972, which can be configured to communicate with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device, etc.) or other peripheral devices (e.g. printer, scanner, etc.) via one or more I/O ports 973. An example communication device 980 includes a network controller 981, which can be arranged to facilitate communications with one or more other computing devices 990 over a network communication via one or more communication ports 982. The communication connection is one example of a communication media. Communication media may typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. A modulated data signal can be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media can include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), infrared (IR) and other wireless media. The term computer readable media as used herein can include both storage media and communication media.
(268) Computing device 900 can be implemented as a portion of a small-form factor portable (or mobile) electronic device such as a cell phone, a personal data assistant (PDA), a personal media player device, a wireless web-watch device, a personal headset device, an application specific device, or a hybrid device that include any of the above functions. Computing device 900 can also be implemented as a personal computer including both laptop computer and non-laptop computer configurations.
(269) The operations of encoding and decoding data according to the error correction encoding schemes discussed above can be illustrated ad in
(270) The information values 1306 comprise a physical representation of the data values and codewords. For example, the information values 1306 may represent charge levels of memory cells, such that multiple cells are configured to operate as virtual cell in which charge levels of the cells determine a representation of the data values with error correction. Data values are received and encoded to represent the data values with error correction and charge levels of cells are adjusted accordingly, and codewords are determined according to cell charge levels, from which a corresponding data value is determined. Alternatively, the information values 1306 may represent features of a transmitted signal, such as signal frequency, magnitude, or duration, such that the cells or bins are defined by the signal features and represent a data value having error correction. For example, frequency changes over time can determine a data value having error correction. Other schemes for physical representation of the cells are possible in view of the description herein.
(271) For information values 1306 in the case of cell charge levels, the source/destination 1310 comprises memory cells in which n memory cells provide n cell values whose charge levels define data values having error correction. For storing a codeword, the memory cells receive an encoded codeword and comprise a destination, and for reading a code word, the memory cells provide a codeword for decoding and comprise a source. In the case of data transmission, the source/destination 1310 may comprise a write device, such as a transmitter/receiver that processes a signal with signal features such as frequency, magnitude, or duration that define cells or bins such that the signal features determine a data value having error correction. For example, signal components comprising signal frequency, magnitude, or duration may be controlled and modulated by the transmitter such that data values having error correction are represented. When the source/destination 1310 receives a codeword from the controller 1304, the source/destination comprises a transmitter of the device 1302 for sending an encoded signal. When the source/destination provides a codeword to the controller 1304 from a received signal, the source/destination comprises a receiver of the device for receiving an encoded signal. Signal components of the transmitted signal can be suitable modulated to define data values having error correction, in view of the description herein.
(272) The various aspects discussed herein can be implemented in the form of control logic in software or hardware or a combination of both. The control logic may be stored in an information storage medium as a plurality of instructions adapted to direct an information-processing device to perform the operations discussed herein. Based on the disclosure and teachings provided herein, other ways and/or methods to implement the discussed features are possible.
(273) The methods and operations described herein can be implemented in a variety of systems for encoding and decoding data for transmission and storage. For example, codewords may be received from a source over an information channel according to a memory writing scheme and are decoded into their corresponding data values and provided to a destination, such as a memory or a processor, and data values for storage or transmission are received from a source over an information channel and are encoded according to the memory writing scheme.
(274) The coding scheme can be further extended to multi-level cells (MLC). For example, using aspects of the coding scheme described above, multilevel cell memories can be written level by level. Alternatively or additionally, aspects of the coding scheme described above may be used for writing multilevel cell memories using a multilevel polar code.
VIII. Concluding Remarks
(275) This application presents a code construction for error-correcting WOM codes. The embodiment(s) described herein supports any number of rewrites and can correct a substantial number of errors. In some embodiments, construction may be based on polar coding to achieve improved performance for both rewriting and error correction.
(276) The present disclosure is not to be limited in terms of the particular embodiments described in this application, which are intended as illustrations of various aspects. Many modifications and variations can be made without departing from its spirit and scope, as will be apparent to those skilled in the art. Functionally equivalent methods and apparatuses within the scope of the disclosure, in addition to those enumerated herein, will be apparent to those skilled in the art from the foregoing descriptions. Such modifications and variations are intended to fall within the scope of the appended claims. The present disclosure is to be limited only by the terms of the appended claims, along with the full scope of equivalents to which such claims are entitled. It is to be understood that this disclosure is not limited to particular methods, systems, or devices which can, of course, vary. It is also to be understood that the terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting.
(277) With respect to the use of substantially any plural and/or singular terms herein, those having skill in the art can translate from the plural to the singular and/or from the singular to the plural as is appropriate to the context and/or application. The various singular/plural permutations may be expressly set forth herein for sake of clarity.
(278) It will be understood by those within the art that, in general, terms used herein, and especially in the appended claims (e.g., bodies of the appended claims) are generally intended as open terms (e.g., the term including should be interpreted as including but not limited to, the term having should be interpreted as having at least, the term includes should be interpreted as includes but is not limited to, etc.). It will be further understood by those within the art that if a specific number of an introduced claim recitation is intended, such an intent will be explicitly recited in the claim, and in the absence of such recitation no such intent is present. For example, as an aid to understanding, the following appended claims may contain usage of the introductory phrases, at least one and one or more to introduce claim recitations. However, the use of such phrases should not be construed to imply that the introduction of a claim recitation by the indefinite articles a or an limits any particular claim containing such introduced claim recitation to embodiments containing only one such recitation, even when the same claim includes the introductory phrases one or more or at least one and indefinite articles such as a or an (e.g., a and/or an should be interpreted to mean at least one or one or more); the same holds true for the use of definite articles used to introduce claim recitations. In addition, even if a specific number of an introduced claim recitation is explicitly recited, those skilled in the art will recognize that such recitation should be interpreted to mean at least the recited number (e.g., the bare recitation of two recitations, without other modifiers, means at least two recitations, or two or more recitations). Furthermore, in those instances where a convention analogous to at least one of A, B, and C, etc. is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., a system having at least one of A, B, and C would include but not be limited to systems that have A along, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). In those instances where a convention analogous to at least one of A, B, or C, etc. is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., a system having at least one of A, B, or C would include but not be limited to systems that have A along, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). It will be further understood by those within the art that virtually any disjunctive word and/or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms. For example, the phrase A and B will be understood to include the possibilities of A or B or A and B.
(279) In addition, where features or aspects of the disclosure are described in terms of Markush groups, those skilled in the art will recognize that the disclosure is also thereby described in terms of any individual member or subgroup of members of the Markush group.
(280) As will be understood by one skilled in the art, for any and all purposes, such as in terms of providing a written description, all ranges disclosed herein also encompass any and all possible subranges and combinations of subranges thereof. Any listed range can be easily recognized as sufficiently describing and enabling the same range being broken down into at least equal halves, thirds, quarters, fifths, tenths, etc. As a non-limiting example, each range discussed herein can be readily broken down into a lower third, middle third and upper third, etc. As will also be understood by one skilled in the art all language such as up to, at least, greater than, less than, and the like include the number recited and refer to oranges which can be subsequently broken down into subranges as discussed above. Finally, as will be understood by one skilled in the art, a range includes each individual member. Thus, for example, a group having 1-3 cells refers to groups having 1, 2, or 3 cells. Similarly, a group having 1-5 cells refers to groups having 1, 2, 3, 4, and 5 cells, and so forth.
(281) While various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.