Forbidden intersections for codes
نویسندگان
چکیده
Abstract Determining the maximum size of a ‐intersecting code in was longstanding open problem Frankl and Füredi, solved independently by Ahlswede Khachatrian Tokushige. We extend their result to setting forbidden intersections, showing that for any large compared with (but not necessarily ) same bound holds codes weaker property being ‐avoiding, is, having no two vectors agree on exactly coordinates. Our proof proceeds via junta approximation independent interest, which we prove development our recent theory global hypercontractivity: show ‐avoiding is approximately contained (a where membership determined constant number coordinates). In particular, when , this gives an alternative Eberhard, Kahn, Narayanan Spirkl symmetric intersecting have .
منابع مشابه
Pairwise intersections and forbidden configurations
By symmetry we can assume a ≥ d and b ≥ c. We show that fm(a, b, c, d) isΘ(ma+b−1) if either b > c or a, b ≥ 1. We also show that fm(0, b, b, 0) is Θ(m) and fm(a, 0, 0, d) is Θ(m). This can be viewed as a result concerning forbidden configurations and is further evidence for a conjecture of Anstee and Sali. Our key tool is a strong stability version of the Complete Intersection Theorem of Ahlsw...
متن کاملIntersections of Golay codes with higher order Kerdock codes
Golay codewords are useful for transmission schemes such as OFDM, and [MacWilliams/Sloane] demonstrated that these codewords are bent functions contained in second order Reed-Muller codes. This paper investigates the intersection between these codes and Kerdock-like codes.
متن کاملMultilevel Diversity Coding Systems: Rate Regions, Codes, Computation, & Forbidden Minors
The rate regions of multilevel diversity coding systems (MDCS), a sub-class of the broader family of multi-source multi-sink networks with special structure, are investigated. After showing how to enumerate all non-isomorphic MDCS instances of a given size, the Shannon outer bound and several achievable inner bounds based on linear codes are given for the rate region of each non-isomorphic inst...
متن کاملMap Decoding of Arithmetic Codes with a Forbidden Symbol
In this paper, a novel maximum a posteriori (MAP) technique for the decoding of arithmetic codes in the presence of transmission errors is presented. Arithmetic codes with a forbidden symbol and trellis search techniques are employed in order to estimate the best transmitted codeword. The viability of the proposed approach is demonstrated in the binary symmetric channel case in terms of both pe...
متن کاملFunctional codes arising from quadric intersections with Hermitian varieties
We investigate the functional code Ch(X) introduced by G. Lachaud [10] in the special case where X is a non-singular Hermitian variety in PG(N, q2) and h = 2. In [4], F. Edoukou solved the conjecture of Sørensen [11] on the minimum distance of this code for a Hermitian variety X in PG(3, q2). In this paper, we will answer the question about the minimum distance in general dimension N , with N <...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the London Mathematical Society
سال: 2023
ISSN: ['1469-7750', '0024-6107']
DOI: https://doi.org/10.1112/jlms.12801