A Singleton Bound for Lattice Schemes
نویسندگان
چکیده
The binary coding theory and subspace codes for random network coding exhibit similar structures. The method used to obtain a Singleton bound for subspace codes mimic the technique used in obtaining the Singleton bound for binary codes. This motivates the question of whether there is an abstract framework that captures these similarities. As a first step towards answering this question, we use the lattice framework proposed in [1]. A lattice is a partially ordered set in which any two elements have a least upper bound and a greatest lower bound. A ‘lattice scheme’ is defined as a subset of a lattice. In this paper, we derive a Singleton bound for lattice schemes and obtain Singleton bounds known for binary codes and subspace codes as special cases. The lattice framework gives additional insights into the behaviour of Singleton bound for subspace codes. We also obtain a new upper bound on the code size for non-constant dimension codes. The plots of this bound along with plots of the code sizes of known non-constant dimension codes in the literature reveal that our bound is tight for certain parameters of the code.
منابع مشابه
A degree bound for the Graver basis of non-saturated lattices
Let $L$ be a lattice in $ZZ^n$ of dimension $m$. We prove that there exist integer constants $D$ and $M$ which are basis-independent such that the total degree of any Graver element of $L$ is not greater than $m(n-m+1)MD$. The case $M=1$ occurs precisely when $L$ is saturated, and in this case the bound is a reformulation of a well-known bound given by several authors. As a corollary, we show t...
متن کاملNetwork coding with modular lattices
In [13], Kötter and Kschischang presented a new model for error correcting codes in network coding. The alphabet in this model is the subspace lattice of a given vector space, a code is a subset of this lattice and the used metric on this alphabet is the map d ∶ (U,V ) ↦ dim(U + V ) − dim(U ∩ V ). In this paper we generalize this model to arbitrary modular lattices, i.e. we consider codes, whic...
متن کاملA Practical Approach to Type Inference for EuLisp
Lisp applications need to show a reasonable cost-beneet relationship between the ooered expressiveness and their demand for storage and run-time. Drawbacks in eeciency, apparent in Lisp as a dynamically typed programming language, can be avoided by optimizations. Statically inferred type information can be decisive for the success of these optimizations. This paper describes a practical approac...
متن کاملBuoyancy Term Evolution in the Multi Relaxation Time Model of Lattice Boltzmann Method with Variable Thermal Conductivity Using a Modified Set of Boundary Conditions
During the last few years, a number of numerical boundary condition schemes have been used to study various aspects of the no-slip wall condition using the lattice Boltzmann method. In this paper, a modified boundary condition method is employed to simulate the no-slip wall condition in the presence of the body force term near the wall. These conditions are based on the idea of the bounce-back ...
متن کاملLinear Multisecret-Sharing Schemes and Error-Correcting Codes
In this paper a characterization of the general relation between linear multisecret-sharing schemes and error-correcting codes is presented. A bridge between linear multisecret-sharing threshold schemes and maximum distance separable codes is set up. The information hierarchy of linear multisecret-sharing schemes is also established. By making use of the bridge several linear multisecret-sharin...
متن کامل