On lattices, binary codes, and network codes

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

On identifying codes in lattices

Let G(V,E) be a simple, undirected graph. An identifying code on G is a vertex-subset C ⊆ V such that B(v) ∩ C is non-empty and distinct for each vertex v ∈ V , where B(v) is a ball about v. Motivated by applications to fault diagnosis in multiprocessor arrays, a number of researchers have considered the problem of constructing identifying codes of minimum density on various two-dimensional lat...

متن کامل

Network codes as codes on graphs

This paper points out connections between linear network coding and linear system theory. In particular, a network code is interpreted as a state space realization of a network behavior that implements a desired set of network connections. A reversibility theorem is derived for network coding that is a direct consequence of a fundamental duality theorem derived by Forney in the context of state...

متن کامل

On Z2k-Dual Binary Codes

A new generalization of the Gray map is introduced. The new generalization Φ : Z 2 → Z k−1 n 2 is connected with the known generalized Gray map φ in the following way: if we take two dual linear Z2k -codes and construct binary codes from them using the generalizations φ and Φ of the Gray map, then the weight enumerators of the binary codes obtained will satisfy the MacWilliams identity. The cla...

متن کامل

Binary Codes and Caps

The connection between maximal caps (sometimes called complete caps) and certain binary codes called quasi-perfect codes is described. We provide a geometric approach to the foundational work of Davydov and Tombak who have obtained the exact possible sizes of large maximal caps. A new self-contained proof of the existence and the structure of the largest maximal nonaffine cap in PG(n, 2) is giv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Mathematics of Communications

سال: 2011

ISSN: 1930-5346

DOI: 10.3934/amc.2011.5.225