On lattices, binary codes, and network codes
نویسندگان
چکیده
منابع مشابه
Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملOn identifying codes in lattices
Let G(V,E) be a simple, undirected graph. An identifying code on G is a vertex-subset C ⊆ V such that B(v) ∩ C is non-empty and distinct for each vertex v ∈ V , where B(v) is a ball about v. Motivated by applications to fault diagnosis in multiprocessor arrays, a number of researchers have considered the problem of constructing identifying codes of minimum density on various two-dimensional lat...
متن کاملNetwork codes as codes on graphs
This paper points out connections between linear network coding and linear system theory. In particular, a network code is interpreted as a state space realization of a network behavior that implements a desired set of network connections. A reversibility theorem is derived for network coding that is a direct consequence of a fundamental duality theorem derived by Forney in the context of state...
متن کاملOn Z2k-Dual Binary Codes
A new generalization of the Gray map is introduced. The new generalization Φ : Z 2 → Z k−1 n 2 is connected with the known generalized Gray map φ in the following way: if we take two dual linear Z2k -codes and construct binary codes from them using the generalizations φ and Φ of the Gray map, then the weight enumerators of the binary codes obtained will satisfy the MacWilliams identity. The cla...
متن کاملBinary Codes and Caps
The connection between maximal caps (sometimes called complete caps) and certain binary codes called quasi-perfect codes is described. We provide a geometric approach to the foundational work of Davydov and Tombak who have obtained the exact possible sizes of large maximal caps. A new self-contained proof of the existence and the structure of the largest maximal nonaffine cap in PG(n, 2) is giv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Mathematics of Communications
سال: 2011
ISSN: 1930-5346
DOI: 10.3934/amc.2011.5.225