{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:26:23Z","timestamp":1772205983066,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2318970"],"award-info":[{"award-number":["2318970"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,18]]},"DOI":"10.1145\/3696348.3696886","type":"proceedings-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:20:52Z","timestamp":1731284452000},"page":"229-236","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Synthesis of Application-Specific Forward Error Correction (FEC) Codes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0598-8199","authenticated-orcid":false,"given":"Jedidiah","family":"McClurg","sequence":"first","affiliation":[{"name":"Colorado State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6970-2113","authenticated-orcid":false,"given":"Lauren Zoe","family":"Baker","sequence":"additional","affiliation":[{"name":"Colorado School of Mines, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6065-9120","authenticated-orcid":false,"given":"Ronaldo","family":"Canizales","sequence":"additional","affiliation":[{"name":"Colorado State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1033-7284","authenticated-orcid":false,"given":"Dilochan","family":"Karki","sequence":"additional","affiliation":[{"name":"Colorado State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Anup Agarwal Venkat Arun Devdeep Ray Ruben Martins and Srinivasan Seshan. 2022. Automating network heuristic design and analysis. HotNets. ACM 8--16.","DOI":"10.1145\/3563766.3564085"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Carolyn Jane Anderson Nate Foster Arjun Guha Jean-Baptiste Jeannin Dexter Kozen Cole Schlesinger and David Walker. 2014. Netkat: semantic foundations for networks. POPL. ACM 113--126.","DOI":"10.1145\/2535838.2535862"},{"key":"e_1_3_2_1_3_1","unstructured":"Richard Barrie Ming Yang and Anthony Chan Carusone. 2023. Statistical BER Analysis of Concatenated FEC in Multi-Part Links."},{"key":"e_1_3_2_1_4_1","unstructured":"Will Bliss Maged F. Barsoum and German Feyh. 2022. Proposal for a Specific (128 120) Extended Inner Hamming Code with Lower Power and Lower Latency Soft Chase Decoding than Textbook Codes. https:\/\/www.ieee802.org\/3\/df\/public\/22_10\/22_1005\/bliss_3df_01_220929.pdf."},{"key":"e_1_3_2_1_5_1","volume-title":"Avenir: managing data plane diversity with control plane synthesis","author":"Campbell Eric Hayden","unstructured":"Eric Hayden Campbell, William T. Hallahan, Priya Srikumar, Carmelo Cascone, Jed Liu, Vignesh Ramamurthy, Hossein Hojjat, Ruzica Piskac, Robert Soul\u00e9, and Nate Foster. 2021. Avenir: managing data plane diversity with control plane synthesis. NSDI. USENIX Association, 133--153."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5434378"},{"key":"e_1_3_2_1_7_1","volume-title":"Bj\u00f8rner","author":"de Moura Leonardo Mendon\u00e7a","year":"2008","unstructured":"Leonardo Mendon\u00e7a de Moura and Nikolaj S. Bj\u00f8rner. 2008. Z3: An Efficient SMT Solver. TACAS (Lecture Notes in Computer Science). Vol. 4963. Springer, 337--340."},{"key":"e_1_3_2_1_8_1","volume-title":"Design and Verification Conference and Exhibition.","author":"Devarajegowda Keerthikumara","year":"2020","unstructured":"Keerthikumara Devarajegowda, Valentin Hiltl, Thomas Rabenalt, Dominik Stoffel, Wolfgang Kunz, and Wolfgang Ecker. 2020. Formal Verification by the Book: Error Detection and Correction Codes. Design and Verification Conference and Exhibition."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.1985.1063964"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057683"},{"key":"e_1_3_2_1_11_1","volume-title":"Fast Decision Procedures. CAV (Lecture Notes in Computer Science)","author":"Ganzinger Harald","unstructured":"Harald Ganzinger, George Hagen, Robert Nieuwenhuis, Albert Oliveras, and Cesare Tinelli. 2004. DPLL(T): Fast Decision Procedures. CAV (Lecture Notes in Computer Science). Vol. 3114. Springer, 175--188."},{"key":"e_1_3_2_1_12_1","volume-title":"Mihir Parang Mehta, and Vaibhav Singh","author":"Gupta Aarti","year":"2022","unstructured":"Aarti Gupta, Roope Kaivola, Mihir Parang Mehta, and Vaibhav Singh. 2022. Error Correction Code Algorithm and Implementation Verification Using Symbolic Representations. FMCAD."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Richard W Hamming. 1950. Error Detecting and Error Correcting Codes. The Bell system technical journal 29 2 147--160.","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"e_1_3_2_1_14_1","volume-title":"CodeRepair: PHY-Layer Partial Packet Recovery without the Pain","author":"Huang Jun","unstructured":"Jun Huang, Guoliang Xing, Jianwei Niu, and Shan Lin. 2015. CodeRepair: PHY-Layer Partial Packet Recovery without the Pain. INFOCOM. IEEE, 1463--1471."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2710958"},{"key":"e_1_3_2_1_16_1","volume-title":"Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks","author":"Koopman Philip","unstructured":"Philip Koopman and Tridib Chakravarty. 2004. Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks. DSN. IEEE Computer Society, 145."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2023.102992"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"RTP Payload Format for Generic Forward Error Correction","volume":"5109","author":"Li Adam","year":"2007","unstructured":"Adam Li. 2007. RTP Payload Format for Generic Forward Error Correction. RFC, 5109, 1--44.","journal-title":"RFC"},{"key":"e_1_3_2_1_19_1","volume-title":"Classifying Soft Error Vulnerabilities in Extreme-Scale Scientific Applications using a Binary Instrumentation Tool","author":"Li Dong","unstructured":"Dong Li, Jeffrey S. Vetter, and Weikuan Yu. 2012. Classifying Soft Error Vulnerabilities in Extreme-Scale Scientific Applications using a Binary Instrumentation Tool. SC. IEEE\/ACM, 57."},{"key":"e_1_3_2_1_20_1","volume-title":"Viresh Paruthi, Robert Shadowen, and Ali El-Zein.","author":"Lvov Alexey","year":"2012","unstructured":"Alexey Lvov, Luis Alfonso Lastras-Monta\u00f1o, Viresh Paruthi, Robert Shadowen, and Ali El-Zein. 2012. Formal verification of error correcting circuits using computational algebraic geometry. FMCAD. IEEE, 141--148."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1055988"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Jedidiah McClurg. 2021. Correct-by-Construction Network Programming for Stateful Data-Planes. SOSR. ACM 66--79.","DOI":"10.1145\/3482898.3483362"},{"key":"e_1_3_2_1_23_1","unstructured":"Jedidiah McClurg. 2018. Program Synthesis for Software-Defined Networking. PhD thesis. University of Colorado Boulder (Jan. 2018)."},{"key":"e_1_3_2_1_24_1","volume-title":"Belviranli","author":"McClurg Jedidiah","year":"2022","unstructured":"Jedidiah McClurg, Miles Claver, Jackson Garner, Jake Vossen, Jordan Schmerge, and Mehmet E. Belviranli. 2022. Optimizing Regular Expressions via Rewrite-Guided Synthesis. PACT. ACM, 426--438."},{"key":"e_1_3_2_1_25_1","volume-title":"Pavol Cern\u00fd and Nate Foster","author":"McClurg Jedidiah","year":"2015","unstructured":"Jedidiah McClurg, Hossein Hojjat, Pavol Cern\u00fd and Nate Foster. 2015. Efficient Synthesis of Network Updates. PLDI. ACM, 196--207."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Jedidiah McClurg Hossein Hojjat Nate Foster and Pavol Cern\u00fd. 2016. Event-Driven Network Programming. PLDI. ACM 369--385.","DOI":"10.1145\/2908080.2908097"},{"key":"e_1_3_2_1_27_1","volume-title":"Exploiting the Forgiving Nature of Applications for Scalable Parallel Execution","author":"Meng Jiayuan","unstructured":"Jiayuan Meng, Anand Raghunathan, Srimat T. Chakradhar, and Surendra Byna. 2010. Exploiting the Forgiving Nature of Applications for Scalable Parallel Execution. IPDPS. IEEE, 1--12."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-020-05904-2"},{"key":"e_1_3_2_1_29_1","volume-title":"2022 European Conference on Optical Communication (ECOC). IEEE, 1--4.","author":"Nedelcu Andrei","year":"2022","unstructured":"Andrei Nedelcu, Stefano Calabr\u00f2, Youxi Lin, and Neboj\u0161a Stojanovi\u0107. 2022. Concatenated SD-Hamming and KP4 Codes in DCN PAM4 4x200 Gbps\/lane. 2022 European Conference on Optical Communication (ECOC). IEEE, 1--4."},{"key":"e_1_3_2_1_30_1","volume-title":"Bit-Exact ECC Recovery (BEER): Determining DRAM On-Die ECC Functions by Exploiting DRAM Data Retention Characteristics","author":"Patel Minesh","unstructured":"Minesh Patel, Jeremie S. Kim, Taha Shahroodi, Hasan Hassan, and Onur Mutlu. 2020. Bit-Exact ECC Recovery (BEER): Determining DRAM On-Die ECC Functions by Exploiting DRAM Data Retention Characteristics. MICRO. IEEE, 282--297."},{"key":"e_1_3_2_1_31_1","unstructured":"Lenin Patra Arash Farhood Rajesh Radhamohan Will Bliss Sridhar Ramesh and Dave Cassan. 2023. FEC Baseline Proposal for 200Gb\/s per Lane IM-DD Optical PMDs. https:\/\/www.ieee802.org\/3\/dj\/public\/23_03\/patra_3dj_01b_2303.pdf."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Jonathan Protzenko Sebastian Burckhardt Michal Moskal and Jedidiah McClurg. 2015. Implementing Real-Time Collaboration in TouchDevelop using AST merges. MobileDeLi. ACM 25--27.","DOI":"10.1145\/2846661.2846672"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2226585"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Armando Solar-Lezama Christopher Jones and Rastislav Bod\u00edk. 2008. Sketching Concurrent Data Structures. PLDI. ACM 136--148.","DOI":"10.1145\/1375581.1375599"},{"key":"e_1_3_2_1_36_1","volume-title":"Saraswat","author":"Solar-Lezama Armando","year":"2006","unstructured":"Armando Solar-Lezama, Liviu Tancau, Rastislav Bod\u00edk, Sanjit A. Seshia, and Vijay A. Saraswat. 2006. Combinatorial Sketching for Finite Programs. ASPLOS. ACM, 404--415."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2361754"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"S\u00e9bastien Vaucher Niloofar Yazdani Pascal Felber Daniel E. Lucani and Valerio Schiavoni. 2020. ZipLine: In-Network Compression at Line Speed. CoNEXT. ACM 399--405.","DOI":"10.1145\/3386367.3431302"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Xinyuan Wang and Xiang He. 2022. FEC Code and Scheme Observation in 800G\/1.6TbE. https:\/\/www.ieee802.org\/3\/df\/public\/22_02\/wang_3df_01_220215.pdf.","DOI":"10.1364\/OFC.2022.W3H.1"},{"key":"e_1_3_2_1_40_1","volume-title":"Tayyab Mehmood, Metodi P. Yankov, and Knud J. Larsen.","author":"Zhang Can","year":"2020","unstructured":"Can Zhang, S\u00f8ren Forchhammer, Jakob Dahl Andersen, Tayyab Mehmood, Metodi P. Yankov, and Knud J. Larsen. 2020. Fast SD-Hamming Decoding in FPGA for High-Speed Concatenated FEC for Optical Communication. GLOBECOM. IEEE, 1--6."}],"event":{"name":"HotNets '24: The 23rd ACM Workshop on Hot Topics in Networks","location":"Irvine CA USA","acronym":"HotNets '24","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 23rd ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696886","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696348.3696886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:06:09Z","timestamp":1755878769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"references-count":40,"alternative-id":["10.1145\/3696348.3696886","10.1145\/3696348"],"URL":"https:\/\/doi.org\/10.1145\/3696348.3696886","relation":{},"subject":[],"published":{"date-parts":[[2024,11,18]]},"assertion":[{"value":"2024-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}