منابع مشابه
Codes of constant Lee or Euclidean weight
Carlet [2] has determined the linear codes over Z=(4) of constant Lee weight. This extended abstract describes a di erent approach to this problem, along the lines of [4], which has the potential to apply to a wide class of examples. In particular, we show that linear codes of constant Lee or Euclidean weight seldom exist over Z=(p) when p is an odd prime. Over nite elds, any linear code with c...
متن کاملCodes of constant Lee or Euclidean weightJay
Carlet 2] has determined the linear codes over Z=(4) of constant Lee weight. This extended abstract describes a diierent approach to this problem, along the lines of 4], which has the potential to apply to a wide class of examples. In particular, we show that linear codes of constant Lee or Euclidean weight seldom exist over Z=(p 2) when p is an odd prime. Over nite elds, any linear code with c...
متن کاملFree Finite Group Actions on S by Ronnie Lee and Charles Thomas
In this paper we describe the first stages of a theory of 3-manifolds with finite fundamental group. The strong conjecture that any free finite group action on S is conjugate to a linear action is known for some cyclic groups, see [3], [4], and is supported by recent work of one of us on fundamental groups [2]. Here we concern ourselves with the weaker conjecture that any compact 3-manifold wit...
متن کاملRandomised Dynamic Traitor Tracing
Dynamic traitor tracing schemes are used to trace the source of piracy in broadcast environments such as cable TV. Dynamic schemes divide content into a series of watermarked segments that are then broadcast. The broadcast provider can adapt the watermarks according to the pirate’s response and eventually trace him/her. As dynamic algorithms are deterministic, for a given set of inputs, the tra...
متن کاملThreshold Traitor Tracing
This work presents threshold tracing schemes. Tracing schemes trace the source of keys which are used in pirate decoders for sensitive or proprietary data (such as pay-TV programs). Previous tracing schemes were designed to operate against any decoder which decrypts with a nonnegligible success probability. We introduce threshold tracing schemes which are only designed to trace the source of ke...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The William and Mary Quarterly
سال: 1951
ISSN: 0043-5597
DOI: 10.2307/1916133