منابع مشابه
Separating Codes: Constructions and Bounds
Separating codes, initially introduced to test automaton, have revived lately in the study of fingerprinting codes, which are used for copyright protection. Separating codes play their role in making the fingerprinting scheme secure agains coalitions of pirates. We provide here better bounds, constructions and generalizations for these codes.
متن کاملOn separating codes
Let Γ be a code of length n, and (T,U ) a pair of disjoint subsets of Γ. We say that (T,U ) is separated if there exists a coordinate i, such that for any codeword (c1, . . . , cn) ∈ T and any codeword (c ′ 1, . . . , c ′ n) ∈ U , ci 6= c ′ i. The code Γ is (t,u)-separating if all pairs (T,U ) with #T = t and #U = u are separated. Separating codes (or systems) are known from combinatorics, and ...
متن کاملAsymptotic Overview on Separating Codes
Separating codes (or systems) are known from combinatorics, and they enjoy increasing attention due to applications in digital fingerprinting. Previous applications are found in automata theory and the construction of fault-tolerant systems. Let Γ be a code of length n, and (T,U ) a pair of disjoint subsets of Γ. We say that (T,U ) is separated if there exists a coordinate i, such that for any ...
متن کاملSeparating and Intersecting Properties of BCH and Kasami Codes
Separating codes have recently been applied in the construction of collusion secure fingerprinting schemes. They are related to other combinatorial concepts like intersecting codes, superimposed codes, hashing families, and group testing. In this paper we study some good, binary asymptotic constructions of such codes.
متن کاملVisual Traffic Monitoring and Evaluation
As computer networks and associated infrastructures become ever more important to the nation’s commerce and communication, it is becoming exceedingly critical that these networks be managed effectively. Current techniques, which rely on manual or log based analysis, are too slow and ineffective to handle the explosive growth of network infrastructures. We have developed visualization techniques...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical Computer Science
سال: 2018
ISSN: 0304-3975
DOI: 10.1016/j.tcs.2017.03.044