On designs and Steiner systems over finite fields
|
|
- Fay Knight
- 6 years ago
- Views:
Transcription
1 On designs and Steiner systems over finite fields Alfred Wassermann Department of Mathematics, Universität Bayreuth, Germany Special Days on Combinatorial Construction Using Finite Fields, Linz 2013
2 Outline Network coding Design theory Symmetry Computer construction Projective geometry New results (joint work with M. Braun, T. Etzion, A. Kohnert, P. Östergård, A. Vardy) Summary
3 Network coding
4 Flow network source directed graph, with sources and sinks each edge e has a capacity c e each edge receives a non-negative flow ƒ e c e the net flow into any non-source non-sink vertex is zero sink sink In the following: c e = 1 ƒ e {0, 1}
5 Flow networks Theorem (Ford, Fulkerson 1956, Elias, Feinstein, Shannon 1956) In a flow network, the maximum amount of flow passing from a source s to a sink t is equal to the minimum capacity, which when removed, separates s from t. Theorem (Menger 1927) Maximum number of edge-disjoint paths from s to t in a directed graph is equal to the minimum s-t cut.
6 Example: 1 source, 1 sink source cut-capacity = 2 min-cut = 2 = max-flow Menger s theorem: two edge-disjoint paths route packets and b along these paths sink
7 Example: 1 source, 1 sink source b b b cut-capacity = 2 min-cut = 2 = max-flow Menger s theorem: two edge-disjoint paths route packets and b along these paths sink b
8 Example: 1 source, 2 sinks source cut-capacity = 2 can route 2 packets to one sink, 1 packet to the other and vice-versa Time-sharing between these two strategies can achieve a multicast rate of 1.5 packets per use of the network. sink sink
9 Example: 1 source, 2 sinks source b b b cut-capacity = 2 can route 2 packets to one sink, 1 packet to the other and vice-versa Time-sharing between these two strategies can achieve a multicast rate of 1.5 packets per use of the network. sink b b sink
10 Example: 1 source, 2 sinks source b b cut-capacity = 2 can route 2 packets to one sink, 1 packet to the other and vice-versa Time-sharing between these two strategies can achieve a multicast rate of 1.5 packets per use of the network. sink sink
11 Example: 1 source, 2 sinks source b b b b b b sink sink perform coding at the bottle-neck and b are packets of bits b = + b over F 2 ( b) = b b ( b) = both sinks can recover both messages Network coding achieves a multicast rate of 2 packets per use of the network best possible
12 Network coding essence R. Ahlswede, N. Cai, S.-Y. R. Li, R. W. Yeung 2000 packets can be mixed with each other rather than just routed or replicated a higher throughput can be achieved
13 Error correction in noncoherent network coding R. Kötter F. Kschischang Kötter, Kschischang (2008) Silva, Kötter, Kschischang (2008)
14 Error correction in noncoherent network coding Possible error sources: Random errors that could not be detected at the physical layer Corrupt packets injected at the application level by a malicious user
15 Error correction in noncoherent network coding Possible error sources: Random errors that could not be detected at the physical layer Corrupt packets injected at the application level by a malicious user Local view at routing node: Randomly combine incoming packets linearly A corrupt packet is modeled as the addition of an error packet to a genuine packet P (o t) = m j=1 j P (in) j + E
16 Error propagation Packet mixing makes network coding highly prone to error propagation. This essentially rules out classical error correction.
17 Error correction in noncoherent network coding Global view: The overall network can be viewed as a point-to-point channel X 1 X 2 Source: X = X, Y j F q Transmission:. X k sink: Y = Y 1 Y 2. Y k X Y = A X + B E, where A, B, E are unknown
18 Key observation X Y = A X + B E In case E = 0: X Y = A X rows of A X X 1, X 2,..., X k (= row space of X)
19 Random linear network coding Randomly combine information vectors at intermediate nodes Codewords are subspaces of a finite vector space Convenient: all codewords have same dimension k
20 Network codes ambient space V = F q constant dimension (network) code: C {U F : dim U = k} q Grassmannian: G q (, k) := {U F : dim U = k} q H. Graßmann
21 Subspace lattice of F G 2 (4, 4) G 2 (4, 3) G 2 (4, 2) 0001 G 2 (4, 1) 0000 G 2 (4, 0)
22 Subspace lattice G q (, k) = k Gaussian coefficient: k lim q 1 k q q = (q 1)(q 1 1) (q k+1 1) (q k 1)(q k 1 1) (q 1) q = k
23 Subspace distance subspace distance for U, V G q (, k) d(u, V) = dim U + dim V 2 dim U V = 2k 2 dim U V =: 2δ minimum distance d(c) := min{d(u, V) : U, V C, U = V}
24 Subspace distance in F 4 2 G 2 (4, 4) G 2 (4, 3) G 2 (4, 2) G 2 (4, 1) G 2 (4, 0)
25 Problems maximize C for given, k, d determine upper and lower bounds for A q (, k, d) := m x{ C : C G q (, k), d(c) d}
26 Upper bounds Sphere packing bound: A q (, k, 2δ) G q(, k) B k (δ 1) Singleton bound: A q (, k, 2δ) δ+1 k δ+1 q Anticode bound: Anticode of diameter e: set of subspaces U G q (, k) such that all pairwise distances are e k Aq (, k, 2δ) Johnson type bounds: A q (, k, 2δ) q k+δ 1 δ 1 q q 1 = k δ+1 q k k δ+1 q q k 1 A q( 1, k 1, 2δ)
27 Previous bounds for A 2 (, 3, 4) Ref [K] [B] [B] [E] [K] [B] [B] [B] [K] Kohnert, Kurz (2008) [E] Etzion, Vardy (2008) [B] Braun, Reichelt (2013) U V dim 3 = k {0} dim 1
28 Constant dimension codes U, V G q (, k): d(u, V) = 2k 2 dim U V = 2δ Let t 1 := k δ U V dim k δ W U V dim t dim t 1 d(c) = 2δ: dim U V t 1 for all U, V C, U = V For all W G q (, t): {U C : W U} 1
29 Extremal case C G q (, k) For all W G q (, t): {U C : W U} 1
30 Extremal case C G q (, k) For all W G q (, t): {U C : W U} 1 Extremal case: for all W G q (, t) {U C : W U} = 1
31 Extremal case C G q (, k) For all W G q (, t): {U C : W U} 1 Extremal case: for all W G q (, t) {U C : W U} = 1 In this case, C meets anticode bound and Johnson bound: t C = q k t C: perfect diameter code q = k δ+1 q k k δ+1 q
32 Design theory
33 Design theory Cameron (1974), Delsarte (1976) B G q (, k): set of k-subspaces (blocks) (F q, B): q-steiner system S q[t, k, ] P. Cameron each t-subspace of F is contained in q exactly one block of B
34 Design theory Cameron (1974), Delsarte (1976) B G q (, k): set of k-subspaces (blocks) (F q, B): q-steiner system S q[t, k, ] More general: P. Cameron each t-subspace of F is contained in q exactly one block of B B G q (, k): set of k-subspaces (blocks) (F q, B): t-(, k, λ; q) design over F q each t-subspace of F q exactly λ blocks of B is contained in
35 Design theory B set: simple design B multiset: non-simple design
36 Design theory B set: simple design B multiset: non-simple design B = G q (, k) is a t-(, k, t ; q) design: trivial k t q design trivial 1-(4, 2, 7; 2) design
37 Design theory B set: simple design B multiset: non-simple design B = G q (, k) is a t-(, k, t ; q) design: trivial k t q design trivial 1-(4, 2, 7; 2) design 1-(4, 2, 1; 2) design
38 t-(, k, λ; q) designs B = λ [ t] q [ k t] q Necessary conditions: λ = λ t q k t q Z for = 0,..., t Example: t = 2, k = 3, λ = 1 1, 3 (mod 6)
39 Related design parameters t-(, k, λ; q) design supplemented design: t-(, k, t k t q λ; q) complementary design: t-(, k, λ t reduced design: (t 1)-(, k, λ t+1 1 derived design: (t 1)-( 1, k 1, λ; q) k q / t k t q / k t+1 1 residual design: (t 1)-( 1, k, λ q k 1 q t+1 1 ; q) Kiermaier, Laue (2013) Open problem: t (t + 1)? q ; q) q ; q)
40 t-designs (over sets) V: set of points, V =. B: set of k-subsets K (blocks) (V, B): t-(, k, λ) design K V and K = k Every t-subset T V is contained in exactly λ blocks of B. t-(, k, 1) design: Steiner system S(t, k, ) J. Plücker 1835 T. Kirkman 1844 J. Steiner 1853 R. Fisher 1926
41 Example 4 d a c b 2 Task: Cover every vertex (1- subset) by exactly one edge (2-subset): 1-(4, 2, 1) design
42 Example 4 d a c b 2 Task: Cover every vertex (1- subset) by exactly one edge (2-subset): 1-(4, 2, 1) design 3 d a 1 design 1 c b d 4 a design 2 c b 2 d 5 c a 6 b design 3
43 t-designs (over sets) designs over finite fields are also called q-analogs related design parameters t (t + 1) Ajoodani-Namini (1996)
44 Large sets of designs (over sets) the set of all k-subsets is a t-(, k, t k t ) design: trivial design a partition of the trivial design into N disjoint t-(, k, λ) designs is called large set N λ = t k t LS[N](t, k, ) Sylvester (1860): packing large set of disjoint designs, Lindner, Rosa (1975)
45 Large sets of designs over finite fields G q (, k) is a t-(, k, n t ; q) design k t q Large set LS q [N](t, k, ): partition of G q (, k) into N disjoint t-(, k, λ; q) designs LS 2 [7](1, 2, 4) Necessary: N λ = t k t q
46 Symmetry
47 Automorphisms Designs over sets: S : symmetric group σ S is automorphism: B σ = B d c Example: 4 2 σ = ( d)(bc) a b Set of automorphisms: automorphism group
48 Automorphisms Designs over sets: S : symmetric group σ S is automorphism: B σ = B d c Example: 4 2 σ = ( d)(bc) a b Set of automorphisms: automorphism group Designs over finite fields: P L(, q) projective semilinear group GL(, q) = {M F : M invertible} q σ P L(, q) automorphism: B σ = B
49 Automorphisms of designs over finite fields Singer cycle: take F q as an element of F q (Fq \ {0}, ) is a cyclic group G of order q 1, i.e. G = σ G GL(, q) is called Singer cycle Frobenius automorphism: ϕ : Fq F q, U U q ϕ = σ, ϕ = (q 1) odd prime: σ, ϕ maximal subgroup in GL(, q) (Kantor 1980, Dye 1989)
50 Computer construction
51 Brute force approach for construction incidence matrix between t-subset and k-subsets: 1 if T K j M t,k = (m,j ), where m,j = 0 else solve M t,k = λ λ. λ for 0/1-vector
52 Example d 3 c d 4 c 2 d 5 c a 1 design 1 b a design 2 b 6 a design 3 b 4 d a c b 2 M 1, a b c d design design design 3 1 1
53 Designs with prescribed automorphism group Construction of designs with prescribed automorphism group choose group G acting on V, i.e. G S search for t-designs D = (V, B) having G as a group of automorphisms, i.e. for all construct D = (V, B) as g G and K B = K g B. union of orbits of G on k-subsets.
54 Example: cyclic symmetry d 4 a d c 2 b c a b c d {1, 2, 3, 4} {5, 6} a 2 1 b 2 1 c 2 1 d 2 1 a 6 b {1, 2, 3, 4} {5, 6} {a, b, c, d} 2 1 design 3
55 The method of Kramer and Mesner Definition K V and K = k: K G := {K g g G} T V and T = t: T G := {T g g G} Let V K G 1 KG 2... KG n k and T G 1 TG 2... TG m = V t M G t,k = (m,j) where m,j := {K K G j T K}
56 The method of Kramer and Mesner Theorem (Kramer and Mesner, 1976) The union of orbits corresponding to the 1s in a {0, 1} vector which solves M G t,k = is a t-(, k, λ) design having G as an automorphism group. λ λ. λ
57 Expected gain Brute force approach: M t,k = t k Kramer-Mesner: M G t,k ( t) ( k) G G
58 Solving algorithms t-designs with λ > 1: integer programming (CPLEX, Gurobi) lattice basis reduction + exhaustive enumeration (W. 1998, 2002) heuristic algorithms t-designs with λ = 1: maximum clique algorithms (Östergård: cliquer) exact cover (Knuth: dancing links)
59 Applications of Kramer-Mesner in Bayreuth (Betten, Braun, Kerber, Kiermaier, Kohnert, Kurz, Laue, W., Vogel, Zwanzger) designs over sets designs over finite fields large sets of designs linear codes self-orthogonal codes ring-linear codes two-weight codes arcs, blocking sets in projective geometry
60 Known designs over finite fields
61 Families of designs Thomas (1987): 2-(, 3, 7; 2) for 7 and ±1 (mod 6) Suzuki (1989): 2-(, 3, q 2 + q + 1; q) for 7 and ±1 (mod 6) Miyakawa, Munemasa, Yoshiara (1995): transitive designs 2-(7, 3, λ; q) for q = 2, 3 Itoh (1998): From 2-(, 3, q 3 (q 5 1)/(q 1); q) to 2-(m, 3, q 3 (q 5 1)/(q 1); q)
62 Designs over F 2 by computer construction Braun, Kerber, Laue (2005), S. Braun (2010) t-(, k, λ; q) G M G t,k λm x λ 3-(8, 4, λ; 2) σ, ϕ , 15 2-(10, 3, λ; 2) σ, ϕ , 30, 45, 60, 75, 90, 105, (9, 4, λ; 2) σ, ϕ , 63, 84, 126, 147, 189, 210, 252, 273, 315, 336, 378, 399, 441, 462, 504, 525, 567, 576, 588, 630, 651, 693, 714, 756, 777, 819, 840, 882, 903, 945, 966, 1008, 1029, 1071, 1092, 1134, 1155, 1197, 1218, 1260, 1281, (9, 3, λ; 2) σ, ϕ , 22, 42, 43, 63 2-(8, 4, λ; 2) σ, ϕ , 35, 56, 70, 91, 105, 126, 140, 161, 175, 196, 210, 231, 245, 266, 280, 301, (8, 3, λ; 2) σ (7, 3, λ; 2) σ , 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 2-(6, 3, λ; 2) σ , 6 σ: Singer cycle, ϕ: Frobenius automorphism
63 Projective geometry
64 Projective geometry projective space PG( 1, q) spread in PG( 1, q): set of lines that partitions the points, i.e. S q [1, 2, ]
65 Projective geometry projective space PG( 1, q) spread in PG( 1, q): set of lines that partitions the points, i.e. S q [1, 2, ] (k 1)-spread in PG( 1, q): S q [1, k, ] (k 1)-spreads exist iff k divides
66 Projective geometry projective space PG( 1, q) spread in PG( 1, q): set of lines that partitions the points, i.e. S q [1, 2, ] (k 1)-spread in PG( 1, q): S q [1, k, ] (k 1)-spreads exist iff k divides (t 1, k 1)-spreads in PG( 1, q): S q [t, k, ] also called (t, k 1)-systems in PG(, q), Ceccherini (1967), Tallini (1975)
67 Projective geometry spreads
68 Projective geometry spreads Motivation: André, Bose, Bruck construction (1954): spreads translation planes Spread codes and spread decoding in network codes (Manganiello, Gorla, Rosenthal 2008) Large set of spreads: parallelism, packing
69 Projective geometry (s, r)-spreads Beutelspacher 1978: Es scheint unbekannt zu sein, ob in einem endlichen projektiven Raum der Dimension d eine (s, r)-faserung existieren kann, wenn 0 < s < r < d gilt. Conjecture (Metsch 1999): (s, r)-spreads in finite projective spaces do not exist for s > 0.
70 Projective geometry (s, r)-spreads (s, r)-spreads in finite projective spaces do not exist for s > 0. translates to S q [t, k, ] Steiner systems over finite fields do not exist for t > 1.
71 New results
72 S 2 [2, 3, 13] does exist Braun, Etzion, Östergård, Vardy, W. (2013) submitted
73 S 2 [2, 3, 13] 13 = # blocks: 13 2 / 3 = Kramer-Mesner with group G = ϕ, σ ϕ = , σ = G = 13 (2 13 1) = all orbits are of full length G
74 S 2 [2, 3, 13] Kramer-Mesner matrix M G 2,3 = M G = ,3 # columns containing 0, 1 only = use dancing links by Knuth to solve the system up to now: 1030 non-isomorphic solutions 630 disjoint solutions i.e. 2-(13, 3, λ; 2) exist for λ = 1, 2,..., 630
75 Why Singer cycle + Frobenius? Transitive designs: A group G acts t-transitively on a vector space V if the set of t-subspaces is a single orbit. Theorem (Cameron, Kantor 1979) If G GL(, q) is t-transitive with t 2 then G is also k-transitive for t < k.
76 Miyakawa, Munemasa, Yoshiara 1995 Theorem (Hering 1974, Liebeck 1987) If G GL(, q) acts transitively on the 1-subspaces of F with 6, then one of the following holds: q G σ, ϕ SL (q n/ ) G, where, 2 Sp 2 (q /2 ) G, where 2 G 2 (q /6 ) G < Sp 6 (q /6 ), few sporadic cases for = 6 where q = 2 m and 6
77 The first large sets for t 2 LS 2 [3](2, 3, 8) does exist 2 Consists of three disjoint 2-(8, 3, 21; 2) designs Group: Singer cycle in GL(8, 2) of order 255 LS2 [3](2, 5, 8) does exist (complementary design) LS 3 [2](2, 3, 6) does exist Consists of two disjoint 2-(6, 3, 20; 3) designs LS 5 [2](2, 3, 6) does exist Consists of two disjoint 2-(6, 3, 20; 5) designs 2 Braun, Kohnert, Östergård, W. (2013) submitted
78 Summary
79 Bounds for A 2 (, 3, 4) Ref [K], [H] [B] [B] [E] [K] [B] [B] [B] [K] Kohnert, Kurz (2008) [E] Etzion, Vardy (2008) [B] Braun, Reichelt (2013) [H] Honold, Kiermaier, Kurz (2013) U V dim 3 = k dim 2 = t dim 1 {0}
80 Designs over sets vs. finite fields designs over sets designs over finite fields constructions for t 9 constructions for t = 2, 3 designs exist for all t (Teirlinck 1986) designs exist for all t (Fazely, Lovett, Vardy 2013) t-design (t + 1)-designs? Steiner systems are known for t 5 t > 5? Steiner systems are known for t = 1 (k-spreads) and S 2 [2, 3, 13] S(2, 3, ) direct constructions? recursive constructions: S(2, 3, ) S(2, 3, 2 + 1) S(2, 3, ) S(2, 3, 3 ) S(2, 3, ), S(2, 3, ) S(2, 3, )?
81 Open problems Computer free description for S 2 [2, 3, 13] known: n = 13 is the smallest possible case having a Singer cycle as automorphism group (computer search) open: Are there S 2 [2, 3, ] for other groups? S 2 [2, 3, 7]? Infinite series? Problems on q-analogs in Coding Theory, T. Etzion (2013)
82 Thank you for listening!
Fundamentals of Coding For Network Coding
Fundamentals of Coding For Network Coding Marcus Greferath and Angeles Vazquez-Castro Aalto University School of Sciences, Finland Autonomous University of Barcelona, Spain marcus.greferath@aalto.fi and
More informationDesigns over the binary field from the complete monomial group
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 67(3) (2017), Pages 470 475 Designs over the binary field from the complete monomial group Michael Braun Faculty of Computer Science University of Applied Sciences
More informationThe Impact of Network Coding on Mathematics
The Impact of Network Coding on Mathematics Eimear Byrne University College Dublin DIMACS Workshop on Network Coding: the Next 15 Years Dec 15-17, 2015 Random Network Coding and Designs Over GF (q) COST
More informationCodes and Designs in the Grassmann Scheme
Codes and Designs in the Grassmann Scheme Tuvi Etzion Computer Science Department Technion -Israel Institute of Technology etzion@cs.technion.ac.il ALGEBRAIC COMBINATORICS AND APPLICATIONS ALCOMA10, Thurnau,
More informationSome New Large Sets of Geometric Designs
Spyros S. Magliveras Department of Mathematical Sciences Florida Atlantic University Boca Raton, Florida, U.S.A. First annual Kliakhandler Conference Algebraic Combinatorics and Applications Houghton,
More informationTHE ORDER OF THE AUTOMORPHISM GROUP OF A BINARY q-analog OF THE FANO PLANE IS AT MOST TWO
THE ORDER OF THE AUTOMORPHISM GROUP OF A BINARY -ANALOG OF THE FANO PLANE IS AT MOST TWO MICHAEL KIERMAIER, SASCHA KURZ, AND ALFRED WASSERMANN Abstract. It is shown that the automorphism group of a binary
More informationDerived and Residual Subspace Designs
Derived and Residual Subspace Designs Michael Kiermaier, Reinhard Laue Universität Bayreuth, michael.kiermaier@uni-bayreuth.de, laue@uni-bayreuth.de Abstract A generalization of forming derived and residual
More informationConstructing network codes using Möbius transformations
Constructing network codes using Möbius transformations Andreas-Stephan Elsenhans and Axel Kohnert November 26, 2010 Abstract We study error correcting constant dimension subspace codes for network coding.
More informationNew arcs in projective Hjelmslev planes over Galois rings
New arcs in projective Hjelmslev planes over Galois rings Michael Kiermaier and Axel Kohnert ABSTRACT. It is known that some good linear codes over a finite ring (R-linear codes) arise from interesting
More informationOn Linear Subspace Codes Closed under Intersection
On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F
More informationarxiv: v2 [math.co] 2 May 2018
A SUBSPACE CODE OF SIZE 333 IN THE SETTING OF A BINARY q-analog OF THE FANO PLANE DANIEL HEINLEIN, MICHAEL KIERMAIER, SASCHA KURZ, AND ALFRED WASSERMANN arxiv:1708.06224v2 [math.co] 2 May 2018 Abstract.
More informationCombinatorial Designs Man versus Machine
Combinatorial Designs Man versus Machine Anamari Nakić Department of Energy and Power Systems Faculty of Electrical Engineering and Computing University of Zagreb Zagreb 2015 1 / 47 The theory of combinatrial
More informationAsymptotic bounds for the sizes of constant dimension codes and an improved lower bound
Asymptotic bounds for the sizes of constant dimension codes and an improved lower bound 5th ICMCTA Vihula Manor, 28-31 August 2017 Daniel Heinlein University of Bayreuth, Germany Daniel.Heinlein@uni-bayreuth.de
More informationmake some group constructions. The resulting group is then prescribed as an automorphism group of the desired designs. Any such design is a collection
New t-designs and large sets of t-designs Anton Betten 1, Reinhard Laue, Alfred Wassermann Mathematical Department, University of Bayreuth, D-95440 Bayreuth, Germany Abstract Recent results in the search
More informationk-subsets of V: Finding a collection which forms a t-design is equivalent to the problem of solving a system of diophantine equations, as mentioned ab
Simple 6- and 7-designs on 19 to 33 points Anton Betten 1, Reinhard Laue, Alfred Wassermann Universitat Bayreuth, Lehrstuhl II fur Mathematik, Lehrstuhl fur Mathematik und ihre Didaktik, D-95440 Bayreuth
More informationMathematical Department, University of Bayreuth, D Bayreuth
,, {6 () c Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. A Steiner 5-Design on 36 Points ANTON BETTEN anton.betten@uni-bayreuth.de REINHARD LAUE reinhard.laue@uni-bayreuth.de ALFRED
More informationAbstract. the aid of a computer. The smallest parameter set found is 7-(24; 8; 4): for determining the isomorphism types. Further designs are derived
Some simple 7-designs A. Betten R. Laue A. Wassermann Abstract Some simple 7-designs with small parameters are constructed with the aid of a computer. The smallest parameter set found is 7-(24; 8; 4):
More informationThe Simple 7-(33,8,10)-Designs with Automorphism Group PΓL(2,32)
The Simple 7-(33,8,10)-Designs with Automorphism Group PΓL(2,32) Alfred Wassermann Abstract Lattice basis reduction in combination with an efficient backtracking algorithm is used to find all (4 996 426)
More informationPROJECTIVE DIVISIBLE BINARY CODES
PROJECTIVE DIVISIBLE BINARY CODES DANIEL HEINLEIN, THOMAS HONOLD, MICHAEL KIERMAIER, SASCHA KURZ, AND ALFRED WASSERMANN Abstract. For which positive integers n, k, r does there exist a linear [n, k] code
More informationLarge sets of t designs from groups
Large sets of t designs from groups Spyros S. Magliveras Department of Mathematical Sciences Florida Atlantic University Boca Raton, Florida 33431-0991 Dedicated to Alex Rosa on the occasion of his 70th
More informationCONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES
CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES MICHAEL BRAUN, AXEL KOHNERT AND ALFRED WASSERMANN 1. INTRODUCTION For the purpose of error correcting linear codes over a finite field GF (q) and fixed
More informationNetwork Coding and Schubert Varieties over Finite Fields
Network Coding and Schubert Varieties over Finite Fields Anna-Lena Horlemann-Trautmann Algorithmics Laboratory, EPFL, Schweiz October 12th, 2016 University of Kentucky What is this talk about? 1 / 31 Overview
More informationProbabilistic construction of t-designs over finite fields
Probabilistic construction of t-designs over finite fields Shachar Lovett (UCSD) Based on joint works with Arman Fazeli (UCSD), Greg Kuperberg (UC Davis), Ron Peled (Tel Aviv) and Alex Vardy (UCSD) Gent
More informationThe Hamming Codes and Delsarte s Linear Programming Bound
The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the
More informationAn Introduction to (Network) Coding Theory
An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network
More informationTABLES OF SUBSPACE CODES
TABLES OF SUBSPACE CODES DANIEL HEINLEIN, MICHAEL KIERMAIER, SASCHA KURZ, AND ALFRED WASSERMANN ABSTRACT. The main problem of subspace coding asks for the maximum possible cardinality of a subspace code
More informationA Course in Combinatorics
A Course in Combinatorics J. H. van Lint Technical Universüy of Eindhoven and R. M. Wilson California Institute of Technology H CAMBRIDGE UNIVERSITY PRESS CONTENTS Preface xi 1. Graphs 1 Terminology of
More information1 Fields and vector spaces
1 Fields and vector spaces In this section we revise some algebraic preliminaries and establish notation. 1.1 Division rings and fields A division ring, or skew field, is a structure F with two binary
More informationThe Witt designs, Golay codes and Mathieu groups
The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector
More information11 Block Designs. Linear Spaces. Designs. By convention, we shall
11 Block Designs Linear Spaces In this section we consider incidence structures I = (V, B, ). always let v = V and b = B. By convention, we shall Linear Space: We say that an incidence structure (V, B,
More informationEnumerative Encoding in the Grassmannian Space
Enumerative Encoding in the Grassmannian Space Natalia Silberstein Department of omputer Science Technion-Israel Institute of Technology Haifa 3 Israel Email: natalys@cstechnionacil Tuvi Etzion Department
More informationCommunication over Finite-Ring Matrix Channels
Communication over Finite-Ring Matrix Channels Chen Feng 1 Roberto W. Nóbrega 2 Frank R. Kschischang 1 Danilo Silva 2 1 Department of Electrical and Computer Engineering University of Toronto, Canada 2
More informationarxiv: v1 [cs.it] 7 Apr 2015
New Lower Bounds for the Shannon Capacity of Odd Cycles arxiv:1504.01472v1 [cs.it] 7 Apr 2015 K. Ashik Mathew and Patric R. J. Östergård April 8, 2015 Abstract The Shannon capacity of a graph G is defined
More informationConstructing t-designs with prescribed automorphism groups
Constructing t-designs with prescribed automorphism groups 2 Mario Osvin Pavčević University of Zagreb Croatia e-mail: mario.pavcevic@fer.hr /37 Dear organizers, thank you very much for the invitation!
More informationq-analogs of group divisible designs
-analogs of group divisible designs Marco Buratti, Michael Kiermaier, Sascha Kurz, Anamari Nakić, Alfred Wassermann September 7, 208 Abstract A well known class of objects in combinatorial design theory
More informationGalois geometries contributing to coding theory
Ghent University Dept. of Mathematics Krijgslaan 281 - S22 9000 Ghent Belgium Opatija, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 COVERING RADIUS AND SATURATING SETS 4 LINEAR MDS CODES
More informationTight Sets and m-ovoids of Quadrics 1
Tight Sets and m-ovoids of Quadrics 1 Qing Xiang Department of Mathematical Sciences University of Delaware Newark, DE 19716 USA xiang@mathudeledu Joint work with Tao Feng and Koji Momihara 1 T Feng, K
More informationGalois geometries contributing to coding theory
Ghent University Dept. of Pure Mathematics and Computer Algebra Krijgslaan 281 - S22 9000 Ghent Belgium Thurnau, April 15, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 EXTENDABILITY RESULTS
More informationAn Introduction to (Network) Coding Theory
An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history
More informationUnsolved Problems in Graph Theory Arising from the Study of Codes*
Unsolved Problems in Graph Theory Arising from the Study of Codes* N. J. A. Sloane Mathematical Sciences Research Center AT&T Bell Laboratories Murray Hill, NJ 07974 1. Two fundamental questions in coding
More informationNon-isomorphic Distribution Supports for Calculating Entropic Vectors
Non-isomorphic Distribution Supports for Calculating Entropic Vectors Yunshu Liu & John MacLaren Walsh Adaptive Signal Processing and Information Theory Research Group Department of Electrical and Computer
More informationMessage Encoding and Retrieval for Spread and Cyclic Orbit Codes
Message Encoding and Retrieval for Spread and Cyclic Orbit Codes Anna-Lena Trautmann, Member, IEEE Department of Electrical and Electronic Engineering University of Melbourne, Australia Department of Electrical
More informationTHE MAXIMUM SIZE OF A PARTIAL 3-SPREAD IN A FINITE VECTOR SPACE OVER GF (2)
THE MAXIMUM SIZE OF A PARTIAL 3-SPREAD IN A FINITE VECTOR SPACE OVER GF (2) S. EL-ZANATI, H. JORDON, G. SEELINGER, P. SISSOKHO, AND L. SPENCE 4520 MATHEMATICS DEPARTMENT ILLINOIS STATE UNIVERSITY NORMAL,
More informationIndex coding with side information
Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated
More informationCombinatorics of p-ary Bent Functions
Combinatorics of p-ary Bent Functions MIDN 1/C Steven Walsh United States Naval Academy 25 April 2014 Objectives Introduction/Motivation Definitions Important Theorems Main Results: Connecting Bent Functions
More informationRecent progress on Frobenius graphs and related topics
Recent progress on Frobenius graphs and related topics Sanming Zhou Department of Mathematics and Statistics The University of Melbourne Australia sanming@unimelb.edu.au IWONT 2011, Brussels Motivation
More information6.046 Recitation 11 Handout
6.046 Recitation 11 Handout May 2, 2008 1 Max Flow as a Linear Program As a reminder, a linear program is a problem that can be written as that of fulfilling an objective function and a set of constraints
More informationarxiv: v1 [cs.it] 18 Jan 2012
Noname manuscript No. (will be inserted by the editor) A Complete Characterization of Irreducible Cyclic Orbit Codes and their Plücker Embedding Joachim Rosenthal Anna-Lena Trautmann arxiv:1201.3825v1
More informationSquare 2-designs/1. 1 Definition
Square 2-designs Square 2-designs are variously known as symmetric designs, symmetric BIBDs, and projective designs. The definition does not imply any symmetry of the design, and the term projective designs,
More informationAlphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach
ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,
More informationTactical Decompositions of Steiner Systems and Orbits of Projective Groups
Journal of Algebraic Combinatorics 12 (2000), 123 130 c 2000 Kluwer Academic Publishers. Manufactured in The Netherlands. Tactical Decompositions of Steiner Systems and Orbits of Projective Groups KELDON
More informationThe Capacity of a Network
The Capacity of a Network April Rasala Lehman MIT Collaborators: Nick Harvey and Robert Kleinberg MIT What is the Capacity of a Network? Source a Source b c d e Sink f Sink What is the Capacity of a Network?
More informationCoding for Errors and Erasures in Random Network Coding
Coding for Errors and Erasures in Random Network Coding arxiv:cs/0703061v2 [cs.it] 25 Mar 2008 Ralf Kötter Institute for Communications Engineering TU Munich D-80333 Munich ralf.koetter@tum.de Frank R.
More informationAn Ins t Ins an t t an Primer
An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,
More informationDifference sets and Hadamard matrices
Difference sets and Hadamard matrices Padraig Ó Catháin University of Queensland 5 November 2012 Outline 1 Hadamard matrices 2 Symmetric designs 3 Hadamard matrices and difference sets 4 Two-transitivity
More informationCombinatorial Group Testing for DNA Library Screening
0-0 Combinatorial Group Testing for DNA Library Screening Ying Miao University of Tsukuba 0-1 Contents 1. Introduction 2. An Example 3. General Case 4. Consecutive Positives Case 5. Bayesian Network Pool
More informationOrthogonal Arrays & Codes
Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible
More informationAn algebraic proof of the Erdős-Ko-Rado theorem for intersecting families of perfect matchings
Also available at http://amc-journal.eu ISSN 855-3966 (printed edn.), ISSN 855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 2 (207) 205 27 An algebraic proof of the Erdős-Ko-Rado theorem for intersecting
More informationMulti-coloring and Mycielski s construction
Multi-coloring and Mycielski s construction Tim Meagher Fall 2010 Abstract We consider a number of related results taken from two papers one by W. Lin [1], and the other D. C. Fisher[2]. These articles
More informationOn Perfect Codes and Related Concepts
Designs, Codes and Cryptography, 22, 221 237, 2001. c 2001 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. On Perfect Codes and Related Concepts R. AHLSWEDE H.K. AYDINIAN L.H. KHACHATRIAN
More informationSunflowers and Primitive SCIDs
(joint work with R.D. Barrolleta, L. Storme and E. Suárez-Canedo) July 15, 2016 (joint work with R.D. Barrolleta, L. Storme and E. Suárez-Canedo) Definitions Background 1 Definitions Background 2 Subspace
More informationBroadcasting With Side Information
Department of Electrical and Computer Engineering Texas A&M Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein, FOCS2008 Outline I shall avoid rigorous math and terminologies and be more
More informationOn certain Regular Maps with Automorphism group PSL(2, p) Martin Downs
BULLETIN OF THE GREEK MATHEMATICAL SOCIETY Volume 53, 2007 (59 67) On certain Regular Maps with Automorphism group PSL(2, p) Martin Downs Received 18/04/2007 Accepted 03/10/2007 Abstract Let p be any prime
More informationRoot systems and optimal block designs
Root systems and optimal block designs Peter J. Cameron School of Mathematical Sciences Queen Mary, University of London Mile End Road London E1 4NS, UK p.j.cameron@qmul.ac.uk Abstract Motivated by a question
More informationCS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018
CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Recap Network Flow Problems Max-Flow Min Cut Theorem Ford Fulkerson Augmenting Paths Residual Flow Graph Integral Solutions
More informationThe Intersection Problem for Steiner Triple Systems. Bradley Fain
The Intersection Problem for Steiner Triple Systems by Bradley Fain A thesis submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements for the Degree of Master of
More informationPreliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}
Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)
More informationCodes on graphs and iterative decoding
Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Prelude Information transmission 0 0 0 0 0 0 Channel Information transmission signal 0 0 threshold
More informationCombinatorial optimization problems
Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:
More informationA Singleton Bound for Lattice Schemes
1 A Singleton Bound for Lattice Schemes Srikanth B. Pai, B. Sundar Rajan, Fellow, IEEE Abstract arxiv:1301.6456v4 [cs.it] 16 Jun 2015 In this paper, we derive a Singleton bound for lattice schemes and
More informationTHE NUMBER OF INVARIANT SUBSPACES UNDER A LINEAR OPERATOR ON FINITE VECTOR SPACES
Advances in Mathematics of Communications Volume 5, No. 2, 2011, 407 416 Web site: http://www.aimsciences.org THE NUMBER OF INVARIANT SUBSPACES UNDER A LINEAR OPERATOR ON FINITE VECTOR SPACES This work
More informationExtending MDS Codes. T. L. Alderson
Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show
More informationSTRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES
The Pennsylvania State University The Graduate School Department of Mathematics STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES A Dissertation in Mathematics by John T. Ethier c 008 John T. Ethier
More informationThe cycle polynomial of a permutation group
The cycle polynomial of a permutation group Peter J. Cameron School of Mathematics and Statistics University of St Andrews North Haugh St Andrews, Fife, U.K. pjc0@st-andrews.ac.uk Jason Semeraro Department
More information: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane
2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and
More informationHadamard matrices, difference sets and doubly transitive permutation groups
Hadamard matrices, difference sets and doubly transitive permutation groups Padraig Ó Catháin University of Queensland 13 November 2012 Outline 1 Hadamard matrices 2 Symmetric designs 3 Hadamard matrices
More informationThe existence of designs - after Peter Keevash
The existence of designs - after Peter Keevash Bourbaki seminar, IHP, Paris, June 27, 2015 Introduction: Designs and Steiner systems A set S of q-subsets of an n-set X is a design with parameters (n, q,
More informationClassification of Directed and Hybrid Triple Systems
BAYREUTHER MATHEMATISCHE SCHRIFTEN 74 (2005), 276-291 Classification of Directed and Hybrid Triple Systems Patric R. J. Östergård and Olli Pottonen Abstract Pairwise nonisomorphic directed and hybrid triple
More informationStrongly Regular Decompositions of the Complete Graph
Journal of Algebraic Combinatorics, 17, 181 201, 2003 c 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Strongly Regular Decompositions of the Complete Graph EDWIN R. VAN DAM Edwin.vanDam@uvt.nl
More informationOn Extremal Codes With Automorphisms
On Extremal Codes With Automorphisms Anton Malevich Magdeburg, 20 April 2010 joint work with S. Bouyuklieva and W. Willems 1/ 33 1. Linear codes 2. Self-dual and extremal codes 3. Quadratic residue codes
More informationOn m ovoids of W 3 (q)
On m ovoids of W 3 (q) A. Cossidente, C. Culbert, G. L. Ebert, and G. Marino Abstract We show that the generalized quadrangle W 3 (q) for odd q has exponentially many 1 (q+1) ovoids, thus implying that
More informationAgenda. Soviet Rail Network, We ve done Greedy Method Divide and Conquer Dynamic Programming
Agenda We ve done Greedy Method Divide and Conquer Dynamic Programming Now Flow Networks, Max-flow Min-cut and Applications c Hung Q. Ngo (SUNY at Buffalo) CSE 531 Algorithm Analysis and Design 1 / 52
More informationA short course on matching theory, ECNU Shanghai, July 2011.
A short course on matching theory, ECNU Shanghai, July 2011. Sergey Norin LECTURE 3 Tight cuts, bricks and braces. 3.1. Outline of Lecture Ear decomposition of bipartite graphs. Tight cut decomposition.
More informationRegular and synchronizing transformation monoids
Regular and synchronizing transformation monoids Peter J. Cameron NBSAN, York 23 November 2011 Mathematics may be defined as the subject in which we never know what we are talking about, nor whether what
More informationFinite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal
Finite Mathematics Nik Ruškuc and Colva M. Roney-Dougal September 19, 2011 Contents 1 Introduction 3 1 About the course............................. 3 2 A review of some algebraic structures.................
More informationIncidence Structures Related to Difference Sets and Their Applications
aòµ 05B30 ü èµ Æ Òµ 113350 Æ Æ Ø Ø K8: 'u8'é(9ùa^ = Ø K8: Incidence Structures Related to Difference Sets and Their Applications úôœææ Æ Ø ž
More informationLET F q be the finite field of size q. For two k l matrices
1 Codes and Designs Related to Lifted MRD Codes Tuvi Etzion, Fellow, IEEE and Natalia Silberstein arxiv:1102.2593v5 [cs.it 17 ug 2012 bstract Lifted maximum ran distance (MRD) codes, which are constant
More informationTriply even codes binary codes, lattices and framed vertex operator algebras
Triply even codes binary codes, lattices and framed vertex operator algebras Akihiro Munemasa 1 1 Graduate School of Information Sciences Tohoku University (joint work with Koichi Betsumiya, Masaaki Harada
More informationStrongly regular graphs and substructures of finite classical polar spaces
Strongly regular graphs and substructures of finite classical polar spaces Jan De Beule Department of Mathematics Ghent University June 25th, 2015 8th Slovenian International Conference on Graph Theory
More informationA METHOD FOR CLASSIFICATION OF DOUBLY RESOLVABLE DESIGNS AND ITS APPLICATION. Stela Zhelezova
Serdica J. Computing 5 (2011), 273 308 A METHOD FOR CLASSIFICATION OF DOUBLY RESOLVABLE DESIGNS AND ITS APPLICATION Stela Zhelezova Abstract. The resolvability of combinatorial designs is intensively investigated
More informationq xk y n k. , provided k < n. (This does not hold for k n.) Give a combinatorial proof of this recurrence by means of a bijective transformation.
Math 880 Alternative Challenge Problems Fall 2016 A1. Given, n 1, show that: m1 m 2 m = ( ) n+ 1 2 1, where the sum ranges over all positive integer solutions (m 1,..., m ) of m 1 + + m = n. Give both
More informationA Short Overview of Orthogonal Arrays
A Short Overview of Orthogonal Arrays John Stufken Department of Statistics University of Georgia Isaac Newton Institute September 5, 2011 John Stufken (University of Georgia) Orthogonal Arrays September
More informationOn non-antipodal binary completely regular codes
On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute
More informationSOME QUESTIONS ARISING FROM THE STUDY OF THE GENERATING GRAPH
SOME QUESTIONS ARISING FROM THE STUDY OF Andrea Lucchini Università di Padova, Italy ISCHIA GROUP THEORY 2012 March, 26th - 29th The generating graph Γ(G) of a group G is the graph defined on the non-identity
More informationOrbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin
Orbitopes Marc Pfetsch joint work with Volker Kaibel Zuse Institute Berlin What this talk is about We introduce orbitopes. A polyhedral way to break symmetries in integer programs. Introduction 2 Orbitopes
More informationMATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.
MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet
More informationCombinatorial properties of transformation monoids
Combinatorial properties of transformation monoids Peter J. Cameron 35ACCMCC Melbourne, December 2011 A few combinatorial problems... Is there an analogue of Baranyai s Theorem over fields with more than
More informationHamming Codes 11/17/04
Hamming Codes 11/17/04 History In the late 1940 s Richard Hamming recognized that the further evolution of computers required greater reliability, in particular the ability to not only detect errors, but
More informationDifference sets and Hadamard matrices
Difference sets and Hadamard matrices Padraig Ó Catháin National University of Ireland, Galway 14 March 2012 Outline 1 (Finite) Projective planes 2 Symmetric Designs 3 Difference sets 4 Doubly transitive
More informationOn small minimal blocking sets in classical generalized quadrangles
On small minimal blocking sets in classical generalized quadrangles Miroslava Cimráková a Jan De Beule b Veerle Fack a, a Research Group on Combinatorial Algorithms and Algorithmic Graph Theory, Department
More information