Codes And Xor Graph Products

نویسندگان

  • Noga Alon
  • Eyal Lubetzky
چکیده

What is the maximum possible number, f3(n), of vectors of length n over {0, 1, 2} such that the Hamming distance between every two is even? What is the maximum possible number, g3(n), of vectors in {0, 1, 2}n such that the Hamming distance between every two is odd? We investigate these questions, and more general ones, by studying Xor powers of graphs, focusing on their independence number and clique number, and by introducing two new parameters of a graph G. Both parameters denote limits of series of either clique numbers or independence numbers of the Xor powers of G (normalized appropriately), and while both limits exist, one of the series grows exponentially as the power tends to infinity, while the other grows linearly. As a special case, it follows that f3(n) = Θ(2) whereas g3(n) = Θ(n).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LT Codes For Efficient and Reliable Distributed Storage Systems Revisited

LT codes and digital fountain techniques have received significant attention from both academics and industry in the past few years. There have also been extensive interests in applying LT code techniques to distributed storage systems such as cloud data storage in recent years. However, Plank and Thomason’s experimental results show that LDPC code performs well only asymptotically when the num...

متن کامل

Belief Propagation Decodable XOR based Erasure Codes For Distributed Storage Systems

LDPC codes and digital fountain techniques have received significant attention from both academics and industry in the past few years. There have also been extensive interests in applying LDPC code techniques to distributed storage systems such as cloud data storage in recent years. This paper carries out the theoretical analysis on the feasibility and performance issues for applying LT codes t...

متن کامل

Asymptotically MDS Array BP-XOR Codes

Belief propagation or message passing on binary erasure channels (BEC) is a low complexity decoding algorithm that allows the recovery of message symbols based on bipartite graph prunning process. Recently, array XOR codes have attracted attention for storage systems due to their burst error recovery performance and easy arithmetic based on Exclusive OR (XOR)-only logic operations. Array BP-XOR...

متن کامل

Efficient LDPC Code Based Secret Sharing Schemes and Private Data Storage in Cloud without Encryption

LDPC codes, LT codes, and digital fountain techniques have received significant attention from both academics and industry in the past few years. By employing the underlying ideas of efficient Belief Propagation (BP) decoding process in LDPC and LT codes, this paper introduces three classes of secret sharing schemes called BP-XOR secret sharing schemes, pseudo-BP-XOR secret sharing schemes, and...

متن کامل

Network-Coded Cooperation Protocol for Multiple Source – Multiple Relay Topologies in CellularNetworks

This paper proposes a network coded cooperation protocol for the uplink transmission of relay enhanced cellular networks, which is intended to multiple source-multiple relay cooperative clusters. Two variants of the network coded protocol are proposed, one employing XOR-based erasure codes, which operates on the cluster cooperation graph, and one employing Reed Solomon codes. The two protocol v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Combinatorica

دوره 27  شماره 

صفحات  -

تاریخ انتشار 2007