50 results on '"Eimear Byrne"'
Search Results
2. Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes
- Author
-
Eimear Byrne, Oliver W. Gnilke, and Jörg Kliewer
- Subjects
distributed computation ,matrix multiplication ,distributed learning ,information theoretic security ,polynomial codes ,Science ,Astrophysics ,QB460-466 ,Physics ,QC1-999 - Abstract
Large matrix multiplications commonly take place in large-scale machine-learning applications. Often, the sheer size of these matrices prevent carrying out the multiplication at a single server. Therefore, these operations are typically offloaded to a distributed computing platform with a master server and a large amount of workers in the cloud, operating in parallel. For such distributed platforms, it has been recently shown that coding over the input data matrices can reduce the computational delay by introducing a tolerance against straggling workers, i.e., workers for which execution time significantly lags with respect to the average. In addition to exact recovery, we impose a security constraint on both matrices to be multiplied. Specifically, we assume that workers can collude and eavesdrop on the content of these matrices. For this problem, we introduce a new class of polynomial codes with fewer non-zero coefficients than the degree +1. We provide closed-form expressions for the recovery threshold and show that our construction improves the recovery threshold of existing schemes in the literature, in particular for larger matrix dimensions and a moderate to large number of colluding workers. In the absence of any security constraints, we show that our construction is optimal in terms of recovery threshold.
- Published
- 2023
- Full Text
- View/download PDF
3. Constructions of new matroids and designs over $${\mathbb {F}}_q$$
- Author
-
Eimear Byrne, Michela Ceria, Sorina Ionica, Relinde Jurrius, and Elif Saçıkara
- Subjects
Applied Mathematics ,Computer Science Applications - Abstract
A perfect matroid design (PMD) is a matroid whose flats of the same rank all have the same size. In this paper we introduce the q-analogue of a PMD and its properties. In order to do so, we first establish a new cryptomorphic definition for q-matroids. We show that q-Steiner systems are examples of q-PMD’s and we use this q-matroid structure to construct subspace designs from q-Steiner systems. We apply this construction to the only known q-Steiner system, which has parameters S(2, 3, 13; 2), and hence establish the existence of a new subspace design with parameters 2-(13, 4, 5115; 2).
- Published
- 2022
4. On coding schemes for wireless body area networks.
- Author
-
Eimear Byrne and Akiko Manada
- Published
- 2012
- Full Text
- View/download PDF
5. A graph theoretical approach for network coding in wireless body area networks.
- Author
-
Eimear Byrne, Akiko Manada, Stevan Jovica Marinkovic, and Emanuel M. Popovici
- Published
- 2011
- Full Text
- View/download PDF
6. Polytope representations for linear-programming decoding of non-binary linear codes.
- Author
-
Vitaly Skachek, Mark F. Flanagan, Eimear Byrne, and Marcus Greferath
- Published
- 2008
- Full Text
- View/download PDF
7. On the Walsh Spectrum of a New APN Function.
- Author
-
Carl Bracken, Eimear Byrne, Nadya Markin, and Gary McGuire
- Published
- 2007
- Full Text
- View/download PDF
8. Determining the Nonlinearity of a New Family of APN Functions.
- Author
-
Carl Bracken, Eimear Byrne, Nadya Markin, and Gary McGuire
- Published
- 2007
- Full Text
- View/download PDF
9. Bounds in the Lee metric and optimal codes
- Author
-
Eimear Byrne and Violetta Weger
- Subjects
FOS: Computer and information sciences ,Algebra and Number Theory ,Computer Science - Information Theory ,Information Theory (cs.IT) ,Applied Mathematics ,General Engineering ,94B05, 94B65 ,Theoretical Computer Science - Abstract
In this paper we investigate known Singleton-like bounds in the Lee metric and characterize optimal codes, which turn out to be very few. We then focus on Plotkin-like bounds in the Lee metric and present a new bound that extends and refines a previously known, and out-performs it in the case of non-free codes. We then compute the density of optimal codes with regard to the new bound. Finally we fill a gap in the characterization of Lee-equidistant codes.
- Published
- 2023
10. Lifting Decoding Schemes over a Galois Ring.
- Author
-
Eimear Byrne
- Published
- 2001
- Full Text
- View/download PDF
11. Rank-Metric Codes, Generalized Binomial Moments and their Zeta Functions
- Author
-
Giuseppe Cotardo, Alberto Ravagnani, Eimear Byrne, and Coding Theory and Cryptology
- Subjects
FOS: Computer and information sciences ,Class (set theory) ,Code (set theory) ,Rank (linear algebra) ,Binomial (polynomial) ,Relation (database) ,Computer Science - Information Theory ,0102 computer and information sciences ,Rank-metric code ,01 natural sciences ,Identity (mathematics) ,symbols.namesake ,Discrete Mathematics and Combinatorics ,0101 mathematics ,Mathematics ,Discrete mathematics ,Zeta function ,Numerical Analysis ,Algebra and Number Theory ,Information Theory (cs.IT) ,010102 general mathematics ,16. Peace & justice ,Riemann zeta function ,010201 computation theory & mathematics ,Generalized rank weights ,Metric (mathematics) ,symbols ,Geometry and Topology ,Binomial moments ,Generalized rank weight distribution - Abstract
In this paper we introduce a new class of extremal codes, namely the $i$-BMD codes. We show that for this family several of the invariants are determined by the parameters of the underlying code. We refine and extend the notion of an $i$-MRD code and show that the $i$-BMD codes form a proper subclass of the $i$-MRD codes. Using the class of $i$-BMD codes we then obtain a relation between the generalized rank weight enumerator and its corresponding generalized zeta function. We also establish a MacWilliams identity for generalized rank weight distributions., 27 pages
- Published
- 2020
12. Fundamental Properties of Sum-Rank-Metric Codes
- Author
-
Eimear Byrne, Alberto Ravagnani, Heide Gluesing-Luerssen, and Coding Theory and Cryptology
- Subjects
Rank (linear algebra) ,code construction ,Duality (mathematics) ,MSRD code ,Library and Information Sciences ,Upper and lower bounds ,Matrix (mathematics) ,Cardinality ,bound ,Network coding ,Block (programming) ,Variable (mathematics) ,Mathematics ,Discrete mathematics ,Manganese ,Measurement ,Reed-Solomon codes ,asymptotic bound ,Sum-rank-metric code ,Lattices ,Computer Science Applications ,Metric (mathematics) ,Encoding ,duality ,MacWilliams identity ,Upper bound ,Information Systems - Abstract
This paper investigates the theory of sum-rank-metric codes for which the individual matrix blocks may have different sizes. Various bounds on the cardinality of a code are derived, along with their asymptotic extensions. The duality theory of sum-rank-metric codes is also explored, showing that MSRD codes (the sum-rank analogue of MDS codes) dualize to MSRD codes only if all matrix blocks have the same number of columns. In the latter case, duality considerations lead to an upper bound on the number of blocks for MSRD codes. The paper also contains various constructions of sum-rank-metric codes for variable block sizes, illustrating the possible behaviours of these objects with respect to bounds, existence, and duality properties.
- Published
- 2021
13. Density of Free Modules over Finite Chain Rings
- Author
-
Eimear Byrne, Anna-Lena Horlemann, Karan Khathuria, and Violetta Weger
- Subjects
FOS: Computer and information sciences ,13C10, 11T71, 11P84 ,Numerical Analysis ,Algebra and Number Theory ,Information Theory (cs.IT) ,Computer Science - Information Theory ,FOS: Mathematics ,Discrete Mathematics and Combinatorics ,Mathematics - Combinatorics ,Geometry and Topology ,Combinatorics (math.CO) - Abstract
In this paper we focus on modules over a finite chain ring $\mathcal{R}$ of size $q^s$. We compute the density of free modules of $\mathcal{R}^n$, where we separately treat the asymptotics in $n,q$ and $s$. In particular, we focus on two cases: one where we fix the length of the module and one where we fix the rank of the module. In both cases, the density results can be bounded by the Andrews-Gordon identities. We also study the asymptotic behaviour of modules generated by random matrices over $\mathcal{R}$. Since linear codes over $\mathcal{R}$ are submodules of $\mathcal{R}^n$ we get direct implications for coding theory. For example, we show that random codes achieve the Gilbert-Varshamov bound with high probability.
- Published
- 2021
14. Constructions of New q-Cryptomorphisms
- Author
-
Eimear Byrne, Michela Ceria, and Relinde Jurrius
- Subjects
Computer Science::Computer Science and Game Theory ,Mathematics::Combinatorics ,Cryptomorphism ,q-Matroid ,q-Analogue ,Theoretical Computer Science ,Computational Theory and Mathematics ,Computer Science::Discrete Mathematics ,FOS: Mathematics ,Discrete Mathematics and Combinatorics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,05B35, 05A30 ,Computer Science::Data Structures and Algorithms - Abstract
In the theory of classical matroids, there are several known equivalent axiomatic systems that define a matroid, which are described as matroid cryptomorphisms. A q-matroid is a q-analogue of a matroid where subspaces play the role of the subsets in the classical theory. In this article we establish cryptomorphisms of q-matroids. In doing so we highlight the difference between classical theory and its q-analogue. We introduce a comprehensive set of q-matroid axiom systems and show cryptomorphisms between them and existing axiom systems of a q-matroid. These axioms are described as the rank, closure, basis, independence, dependence, circuit, hyperplane, flat, open space, spanning space, non-spanning space, and bi-colouring axioms.
- Published
- 2021
15. Bounding the Optimal Rate of the ICSI and ICCSI problem
- Author
-
Marco Calderini and Eimear Byrne
- Subjects
FOS: Computer and information sciences ,Discrete mathematics ,Hypergraph ,Linear programming ,Information Theory (cs.IT) ,Computer Science - Information Theory ,General Mathematics ,020206 networking & telecommunications ,Incidence matrix ,02 engineering and technology ,Upper and lower bounds ,Min-rank ,Combinatorics ,Coded side-information ,Network coding ,Bounding overwatch ,Linear network coding ,0202 electrical engineering, electronic engineering, information engineering ,Broadcast with side-information ,Projective plane ,Index coding ,Mathematics ,Coding (social sciences) - Abstract
In this work we study both the index coding with side information (ICSI) problem introduced by Birk and Kol in 1998 and the more general problem of index coding with coded side information (ICCSI), described by Shum et al. in 2012. We estimate the optimal rate of an instance of the index coding problem. In the ICSI problem case, we characterize those digraphs having min-rank one less than their order and we give an upper bound on the min-rank of a hypergraph whose incidence matrix can be associated with that of a 2-design. Security aspects are discussed in the particular case when the design is a projective plane. For the coded side information case, we extend the graph theoretic upper bounds given by Shanmugam et al. in 2014 on the optimal rate of index code. European Commission Horizon 2020 ESF-COST
- Published
- 2017
16. Tensor Representation of Rank-Metric Codes
- Author
-
Alberto Ravagnani, Alessandro Neri, Eimear Byrne, and John Sheekey
- Subjects
FOS: Computer and information sciences ,Code (set theory) ,Rank (linear algebra) ,Computer Science - Information Theory ,MathematicsofComputing_NUMERICALANALYSIS ,0102 computer and information sciences ,Commutative Algebra (math.AC) ,01 natural sciences ,Matrix (mathematics) ,Tensor (intrinsic definition) ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,0101 mathematics ,ComputingMethodologies_COMPUTERGRAPHICS ,Mathematics ,Parity bit ,Algebra and Number Theory ,Information Theory (cs.IT) ,Applied Mathematics ,010102 general mathematics ,Mathematics - Commutative Algebra ,16. Peace & justice ,Algebra ,010201 computation theory & mathematics ,Metric (mathematics) ,Tensor representation ,Geometry and Topology ,Generator (mathematics) - Abstract
We present the theory of rank-metric codes with respect to the 3-tensors that generate them. We define the generator tensor and the parity check tensor of a matrix code, and describe the properties of a code through these objects. We define the tensor rank of a code to be the tensor rank of its generating tensors, and propose that this quantity is a significant coding theoretic parameter. By a result on the tensor rank of Kruskal from the 1970s, the tensor rank of a rank-metric code of dimension $k$ and minimum rank distance $d$ is at least $k+d-1$. We call codes that meet this bound minimal tensor rank (MTR) codes. It is known from results in algebraic complexity theory that an MTR code implies the existence of an MDS code. In this paper, we also address the converse problem, that of the existence of an MTR code, given an MDS code. We identify several parameters for which the converse holds and give explicit constructions of MTR codes using MDS codes. We furthermore define generalized tensor ranks, which give a refinement of the tensor rank as a code invariant. Moreover, we use these to distinguish inequivalent rank-metric codes.
- Published
- 2019
- Full Text
- View/download PDF
17. An Assmus--Mattson Theorem for Rank Metric Codes
- Author
-
Eimear Byrne and Alberto Ravagnani
- Subjects
FOS: Computer and information sciences ,Discrete mathematics ,Property (philosophy) ,Computer Science - Information Theory ,Information Theory (cs.IT) ,General Mathematics ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Lambda ,01 natural sciences ,Linear subspace ,Combinatorics ,010201 computation theory & mathematics ,Metric (mathematics) ,Weight distribution ,FOS: Mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics - Combinatorics ,Rank (graph theory) ,Combinatorics (math.CO) ,Subspace topology ,Mathematics - Abstract
A $t$-$(n,d,\lambda)$ design over ${\mathbb F}_q$, or a subspace design, is a collection of $d$-dimensional subspaces of ${\mathbb F}_q^n$, called blocks, with the property that every $t$-dimensional subspace of ${\mathbb F}_q^n$ is contained in the same number $\lambda$ of blocks. A collection of matrices in over ${\mathbb F}_q$ is said to hold a subspace design if the set of column spaces of its elements forms the blocks of a subspace design. We use notions of puncturing and shortening of rank metric codes and the rank-metric MacWilliams identities to establish conditions under which the words of a given rank in a linear rank metric code hold a subspace design.
- Published
- 2019
- Full Text
- View/download PDF
18. Algebraic Coding Theory for Networks, Storage, and Security (Dagstuhl Seminar 18511)
- Author
-
Eimear Byrne and Martin Bossert and Antonia Wachter-Zeh, Byrne, Eimear, Bossert, Martin, Wachter-Zeh, Antonia, Eimear Byrne and Martin Bossert and Antonia Wachter-Zeh, Byrne, Eimear, Bossert, Martin, and Wachter-Zeh, Antonia
- Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 18511 "Algebraic Coding Theory for Networks, Storage, and Security". The ever increasing traffic in networks and the growth of distributed storage systems require advanced techniques based on algebraic coding to meet user demand. Private access to such services is a major concern for consumers and is still a new field in the context of distributed storage. The topics of this workshop are very relevant for a number of emerging industrial research fields concerned with efficient and reliable storage and transmitting large files through large networks.
- Published
- 2019
- Full Text
- View/download PDF
19. Partition-balanced families of codes and asymptotic enumeration in coding theory
- Author
-
Eimear Byrne and Alberto Ravagnani
- Subjects
FOS: Computer and information sciences ,Discrete mathematics ,Information Theory (cs.IT) ,Computer Science - Information Theory ,020206 networking & telecommunications ,Hamming distance ,0102 computer and information sciences ,02 engineering and technology ,Coding theory ,01 natural sciences ,Linear code ,Upper and lower bounds ,Theoretical Computer Science ,05A16, 11T71 ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Discrete Mathematics and Combinatorics ,Partition (number theory) ,Error detection and correction ,Hamming code ,Random matrix ,Mathematics - Abstract
We introduce the class of partition-balanced families of codes, and show how to exploit their combinatorial invariants to obtain upper and lower bounds on the number of codes that have a prescribed property. In particular, we derive precise asymptotic estimates on the density functions of several classes of codes that are extremal with respect to minimum distance, covering radius, and maximality. The techniques developed in this paper apply to various distance functions, including the Hamming and the rank metric distances. Applications of our results show that, unlike the F q m -linear MRD codes, the F q -linear MRD codes are not dense in the family of codes of the same dimension. More precisely, we show that the density of F q -linear MRD codes in F q n × m in the set of all matrix codes of the same dimension is asymptotically at most 1/2, both as q → + ∞ and as m → + ∞ . We also prove that MDS and F q m -linear MRD codes are dense in the family of maximal codes. Although there does not exist a direct analogue of the redundancy bound for the covering radius of F q -linear rank metric codes, we show that a similar bound is satisfied by a uniformly random matrix code with high probability. In particular, we prove that codes meeting this bound are dense. Finally, we compute the average weight distribution of linear codes in the rank metric, and other parameters that generalize the total weight of a linear code.
- Published
- 2020
20. Index Coding, Network Coding and Broadcast with Side-Information
- Author
-
Marco Calderini and Eimear Byrne
- Subjects
Hypergraph ,Theoretical computer science ,Linear programming ,Computer science ,010102 general mathematics ,020206 networking & telecommunications ,02 engineering and technology ,01 natural sciences ,Bounding overwatch ,Linear network coding ,0202 electrical engineering, electronic engineering, information engineering ,Communications satellite ,Side information ,0101 mathematics ,Decoding methods ,Coding (social sciences) - Abstract
Index coding, the problem of efficient broadcast to many receivers with side-infomation, is a rich and active research area. It has applications to a range of multi-user broadcast scenarios such as video-on-demand and satellite communications. It has attracted significant theoretical interest both as a hard problem in its own right and due to its connections to other network capacity problems. The central problem of index coding, that of determining the optimal rate of an index code, is still open. We describe recent advances on the index coding problem and its generalizations in the context of broadcast with side-information. The two main approaches to bounding the optimal rate of an index code, namely rank-minimization methods and linear programming models, are discussed in detail. The latter of these, based on graph-theoretical ideas in the classical case, can be extended even to generalizations of the index coding problem for which there is no associated side-information hypergraph. We discuss error-correction in the index coding problem, the corresponding bounds on the optimal transmission rate and decoding algorithms. We also illustrate the connections to network coding, interference alignment and coded caching.
- Published
- 2018
21. Two-weight codes, graphs and orthogonal arrays
- Author
-
Eimear Byrne and Alison Sneyd
- Subjects
Modular codes ,0102 computer and information sciences ,02 engineering and technology ,Finite Frobenius ring ,01 natural sciences ,Ring-linear code ,Combinatorics ,Homogeneous weight ,0202 electrical engineering, electronic engineering, information engineering ,Strongly regular graph ,Additive group ,Mathematics ,Discrete mathematics ,Cayley graph ,Applied Mathematics ,020206 networking & telecommunications ,Codes over rings ,Linear code ,Computer Science Applications ,Finite field ,010201 computation theory & mathematics ,Group code ,Orthogonal array ,Generator matrix ,Two-weight code - Abstract
We investigate properties of two-weight codes over finite Frobenius rings, giving constructions for the modular case. A $$\delta $$?-modular code (in: Honold T, Honold in Proceedings of the fifth international workshop on optimal codes and related topics, White Lagoon, Bulgaria, 2007) is characterized as having a generator matrix where each column $$g$$g appears with multiplicity $$\delta |gR^\times |$$?|gR×| for some $$\delta \in \mathbb {Q}$$??Q. Generalizing (Delsarte in Discret Math 3:47---64, 1972) and (Byrne et al in Finite Fields Appl 18(4):711---727, 2012), we show that the additive group of a two-weight code satisfying certain constraint equations (and in particular a modular code) has a strongly regular Cayley graph and derive existence conditions on its parameters. We provide a construction for an infinite family of modular two-weight codes arising from unions of submodules with pairwise trivial intersection. The corresponding strongly regular graphs are isomorphic to graphs from orthogonal arrays.
- Published
- 2015
22. Error Correction for Index Coding With Coded Side Information
- Author
-
Marco Calderini and Eimear Byrne
- Subjects
FOS: Computer and information sciences ,Source code ,Computer science ,Computer Science - Information Theory ,media_common.quotation_subject ,0102 computer and information sciences ,02 engineering and technology ,Library and Information Sciences ,01 natural sciences ,Min-rank ,law.invention ,Network coding ,Relay ,law ,0202 electrical engineering, electronic engineering, information engineering ,Error correction ,Minimum distance ,media_common ,Index coding ,Discrete mathematics ,Information Theory (cs.IT) ,020206 networking & telecommunications ,Hamming distance ,Computer Science Applications ,Finite field ,Coded side-information ,010201 computation theory & mathematics ,Linear network coding ,Error detection and correction ,Decoding methods ,Information Systems ,Communication channel ,Coding (social sciences) - Abstract
Index coding is a source coding problem in which a broadcaster seeks to meet the different demands of several users, each of whom is assumed to have some prior information on the data held by the sender. A well-known application is satellite communications, as described in one of the earliest papers on the subject (Birk and Kol, 1998). It is readily seen that if the sender has knowledge of its clients’ requests and their side-information sets, then the number of packet transmissions required to satisfy all users’ demands can be greatly reduced if the data are encoded before sending. The collection of side-information indices as well as the indices of the requested data is described as an instance ${ \mathcal I}$ of the index coding with side-information (ICSI) problem. The encoding function is called the index code of $ \mathcal I$ , and the number of transmissions, resulting from the encoding is referred to as its length . The main ICSI problem is to determine the optimal length of an index code and instance $ \mathcal I$ . As this number is hard to compute, bounds approximating it are sought, as are algorithms to compute efficient index codes. These questions have been addressed by several authors (e.g., see Alon et al. 2008, Bar-Yossef et al. 2011, Blasiak et al. 2013), often taking a graph-theoretic approach. Two interesting generalizations of the problem that have appeared in the literature are the subject of this paper. The first of these is the case of index coding with coded side information (Dai et al. 2014), in which linear combinations of the source data are both requested by and held as users’ side-information. This generalization has applications, for example, to relay channels and necessitates algebraic rather than combinatorial methods. The second is the introduction of error-correction in the problem, in which the broadcast channel is subject to noise (Dau et al. 2013). In this paper, we characterize the optimal length of a scalar or vector linear index code with coded side information (ICCSI) over a finite field in terms of a generalized min-rank and give bounds on this number based on constructions of random codes for an arbitrary instance. We furthermore consider the length of an optimal $\delta $ -error correcting code for an instance of the ICCSI problem and obtain bounds analogous to those described in (Dau et al. 2013), both for the Hamming metric and for rank-metric errors. We describe decoding algorithms for both categories of errors.
- Published
- 2017
23. Covering Radius of Matrix Codes Endowed with the Rank Metric
- Author
-
Eimear Byrne and Alberto Ravagnani
- Subjects
Discrete mathematics ,Rank (linear algebra) ,Dual distance bound ,General Mathematics ,Initial set bound ,010102 general mathematics ,0102 computer and information sciences ,Radius ,01 natural sciences ,Covering radius ,Combinatorics ,Puncturing ,Matrix (mathematics) ,Rank coset weights ,010201 computation theory & mathematics ,Weight distribution ,Metric (mathematics) ,FOS: Mathematics ,Mathematics - Combinatorics ,External distance bound ,Rank distance distribution ,Combinatorics (math.CO) ,Rank metric code ,0101 mathematics ,Mathematics - Abstract
In this paper we study properties and invariants of matrix codes endowed with the rank metric and relate them to the covering radius. We introduce new tools for the analysis of rank-metric codes, such as puncturing and shortening constructions. We give upper bounds on the covering radius of a code by applying different combinatorial methods. The various bounds are then applied to the classes of maximal-rank-distance and quasi-maximal-rank-distance codes. Swiss National Science Foundation
- Published
- 2016
24. Algebraic decoding of negacyclic codes over $${\mathbb Z_4}$$
- Author
-
Eimear Byrne, Jaume Pernas, Jens Zumbrägel, and Marcus Greferath
- Subjects
Discrete mathematics ,Class (set theory) ,Polynomial code ,Applied Mathematics ,Modulo ,Lee distance ,Computer Science Applications ,Combinatorics ,Quadratic equation ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Code (cryptography) ,Galois extension ,Decoding methods ,Computer Science::Information Theory ,Mathematics - Abstract
In this article we investigate Berlekamp's negacyclic codes and discover that these codes, when considered over the integers modulo 4, do not suffer any of the restrictions on the minimum distance observed in Berlekamp's original papers: our codes have minimum Lee distance at least 2t + 1, where the generator polynomial of the code has roots ?, ? 3, . . . , ? 2t-1 for a primitive 2nth root ? of unity in a Galois extension of $${\mathbb {Z}_4}$$ ; no restriction on t is imposed. We present an algebraic decoding algorithm for this class of codes that corrects any error pattern of Lee weight ? t. Our treatment uses Grobner bases, the decoding complexity is quadratic in t.
- Published
- 2012
25. New bounds for codes over finite Frobenius rings
- Author
-
Eimear Byrne, Vitaly Skachek, Axel Kohnert, and Marcus Greferath
- Subjects
Discrete mathematics ,Block code ,Code (set theory) ,business.industry ,Applied Mathematics ,Singleton bound ,Cryptography ,Linear code ,Computer Science Applications ,Combinatorics ,symbols.namesake ,Homogeneous ,Frobenius algebra ,symbols ,business ,Plotkin bound ,Mathematics - Abstract
We give further results on the question of code optimality for linear codes over finite Frobenius rings for the homogeneous weight. This article improves on the existing Plotkin bound derived in an earlier paper (Greferath and O’Sullivan, Discr Math 289:11–24, 2004) and suggests a version of a Singleton bound. We also present some families of codes meeting these new bounds.
- Published
- 2010
26. New families of quadratic almost perfect nonlinear trinomials and multinomials
- Author
-
Nadya Markin, Eimear Byrne, Gary McGuire, and Carl Bracken
- Subjects
Bent function ,0102 computer and information sciences ,02 engineering and technology ,Fourier spectrum ,Trinomial ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Quadratic equation ,0202 electrical engineering, electronic engineering, information engineering ,Order (group theory) ,Engineering(all) ,Mathematics ,Discrete mathematics ,CCZ equivalence ,Algebra and Number Theory ,Applied Mathematics ,Differential uniformity ,General Engineering ,020206 networking & telecommunications ,Nonlinear system ,APN ,010201 computation theory & mathematics ,Almost perfect nonlinear - Abstract
We introduce two new infinite families of APN functions, one on fields of order 22k for k not divisible by 2, and the other on fields of order 23k for k not divisible by 3. The polynomials in the first family have between three and k+2 terms, the second family's polynomials have three terms.
- Published
- 2008
27. Coding Theory in the Time of Big Data (Dagstuhl Seminar 16321)
- Author
-
Martin Bossert and Eimear Byrne and Emina Soljanin, Bossert, Martin, Byrne, Eimear, Soljanin, Emina, Martin Bossert and Eimear Byrne and Emina Soljanin, Bossert, Martin, Byrne, Eimear, and Soljanin, Emina
- Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 16321 "Coding Theory in the Time of Big Data". The overarching technical theme was on how fundamentals of coding theory could be applied to data storage and transmission in the context of big data and conversely, on new problems in coding theory arising from such applications.
- Published
- 2016
- Full Text
- View/download PDF
28. Decoding a class of Lee metric codes over a Galois ring
- Author
-
Eimear Byrne
- Subjects
Discrete mathematics ,List decoding ,Lee distance ,Sequential decoding ,Library and Information Sciences ,Galois module ,Computer Science Applications ,Combinatorics ,Normal basis ,Embedding problem ,Finite field ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Metric (mathematics) ,Information Systems ,Mathematics - Abstract
We investigate a class of Lee (1958) metric alternant codes with symbols in Z/sub pn/, establishing a lower bound on the minimum Lee distance where certain restrictions are placed on the code parameters. Corresponding to this bound, we have devised a decoding algorithm which is implemented over a finite field. The algorithm proceeds by finding a Grobner basis of the module M of solutions to a key equation. We obtain a necessary characterization of the solution module by solving iteratively a linear sequence over a Galois ring and show that the particular solution sought by the decoder is minimal in M. The required solution can then be found in an appropriate Grobner basis of M.
- Published
- 2002
29. Hamming metric decoding of alternant codes over Galois rings
- Author
-
Eimear Byrne and Patrick Fitzpatrick
- Subjects
Discrete mathematics ,Polynomial ,Modulo ,List decoding ,Hamming distance ,Sequential decoding ,Library and Information Sciences ,Linear code ,Computer Science Applications ,Combinatorics ,Gröbner basis ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Decoding methods ,Information Systems ,Mathematics - Abstract
The standard decoding procedure for alternant codes over fields centers on solving a key equation which relates an error locator polynomial and an error evaluator polynomial by a syndrome sequence. We extend this technique to decode alternant codes over Galois rings. We consider the module M={(a, b): as/spl equiv/b mod x/sup r/} of all solutions to the key equation where s is the syndrome polynomial and r, is the number of rows in a parity-check matrix for the code. In decoding we seek a particular solution (/spl Sigma/, /spl Omega/)/spl isin/M which we prove can be found in a Grobner basis for M. We present an iterative algorithm which generates a Grobner basis modulo x/sup k+1/ from a given basis modulo x/sup k/. At the rth step, a Grobner basis for M is found, and the required solution recovered.
- Published
- 2002
30. Gröbner Bases over Galois Rings with an Application to Decoding Alternant Codes
- Author
-
Eimear Byrne and Patrick Fitzpatrick
- Subjects
Discrete mathematics ,Polynomial ,Algebra and Number Theory ,Mathematics::Commutative Algebra ,Division algorithm ,Extension (predicate logic) ,Characterization (mathematics) ,Method of undetermined coefficients ,Combinatorics ,Computational Mathematics ,Gröbner basis ,Finite field ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Computer Science::Symbolic Computation ,Decoding methods ,Mathematics - Abstract
We develop a theory of Gröbner bases over Galois rings, following the usual formulation for Gröbner bases over finite fields. Our treatment includes a division algorithm, a characterization of Gröbner bases, and an extension of Buchberger’s algorithm. One application is towards the problem of decoding alternant codes over Galois rings. To this end we consider the module M= {(a, b) :aS≡b modxr} of all solutions to the so-called key equation for alternant codes, where S is a syndrome polynomial. In decoding, a particular solution (Σ, Ω) ∈M is sought satisfying certain conditions, and such a solution can be found in a Gröbner basis of M. Applying techniques introduced in the first part of this paper, we give an algorithm which returns the required solution.
- Published
- 2001
31. Decoding a Class of Alternant Codes for the Lee Metric
- Author
-
Eimear Byrne
- Subjects
Discrete mathematics ,Applied Mathematics ,Lee distance ,Upper and lower bounds ,Combinatorics ,Method of undetermined coefficients ,Gröbner basis ,Residue field ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Metric (mathematics) ,Code (cryptography) ,Discrete Mathematics and Combinatorics ,Decoding methods ,Mathematics - Abstract
We investigate a class of Lee-metric alternant codes with symbols in Z p n , establishing a lower bound on the minimum Lee distance where certain restrictions are placed on the code parameters. Corresponding to this bound we have devised two decoding algorithms. The first operates entirely over a Galois ring, while the second must be implemented over the associated residue field. The algorithms proceed by finding a Grobner basis of the module M of solutions to a key equation. We obtain a necessary characterisation of the solution module by solving iteratively a linear sequence over a Galois ring and show that the particular solution sought by the decoder is minimal in M . Hence the required solution can be found in an appropriate Grobner basis of M .
- Published
- 2001
32. A graph theoretical approach for network coding in wireless body area networks
- Author
-
Akiko Manada, Eimear Byrne, Stevan Marinkovic, and Emanuel Popovici
- Subjects
FOS: Computer and information sciences ,business.industry ,Computer science ,Wireless network ,Information Theory (cs.IT) ,Computer Science - Information Theory ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,010401 analytical chemistry ,020206 networking & telecommunications ,Wireless WAN ,02 engineering and technology ,Network topology ,01 natural sciences ,0104 chemical sciences ,Key distribution in wireless sensor networks ,Linear network coding ,0202 electrical engineering, electronic engineering, information engineering ,Graph (abstract data type) ,Wireless ,business ,Heterogeneous network ,Computer network - Abstract
Recent advances in the area of wireless body area networks (WBANs) open new horizons in areas ranging from mHealth to entertainment. Reliability of communications and power consumption are paramount to widespread adoption of this technology. In this paper, we use ambulatory electroen-cephalography (EEG) monitoring in the context of WBANs and describe some network topologies and coding performance using graph theoretic techniques.
- Published
- 2011
33. Properties of Codes with Two Homogeneous Weights
- Author
-
Eimear Byrne, Michael Kiermaier, and Alison Sneyd
- Subjects
Character module ,0102 computer and information sciences ,Divisor (algebraic geometry) ,01 natural sciences ,Cayley graph ,Ring-linear code ,Theoretical Computer Science ,Combinatorics ,Integer ,Homogeneous weight ,FOS: Mathematics ,Mathematics - Combinatorics ,0101 mathematics ,Weight distribution ,Engineering(all) ,Strongly regular graph ,Mathematics ,Additive group ,Algebra and Number Theory ,Applied Mathematics ,010102 general mathematics ,General Engineering ,Mathematics - Rings and Algebras ,Linear code ,Finite field ,Rings and Algebras (math.RA) ,010201 computation theory & mathematics ,Combinatorics (math.CO) ,Two-weight code ,Hamming code - Abstract
Delsarte showed that for any projective linear code over a finite field GF ( p r ) with two nonzero Hamming weights w 1 w 2 there exist positive integers u and s such that w 1 = p s u and w 2 = p s ( u + 1 ) . Moreover, he showed that the additive group of such a code has a strongly regular Cayley graph. Here we show that for any regular projective linear code C over a finite Frobenius ring with two integral nonzero homogeneous weights w 1 w 2 there is a positive integer d , a divisor of | C | , and positive integer u such that w 1 = d u and w 2 = d ( u + 1 ) . This gives a new proof of the known result that any such code yields a strongly regular graph. We apply these results to existence questions on two-weight codes.
- Published
- 2011
34. On the Equivalence of Quadratic APN Functions
- Author
-
Gabriele Nebe, Gary McGuire, Eimear Byrne, and Carl Bracken
- Subjects
Discrete mathematics ,11T06, 11T71, 12E20, 20B25, 20D45, 20F28 ,Automorphism group ,Applied Mathematics ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Quadratic function ,Mathematics & Statistics ,Trinomial ,16. Peace & justice ,01 natural sciences ,Computer Science Applications ,Combinatorics ,Quadratic equation ,Finite field ,010201 computation theory & mathematics ,FOS: Mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,Equivalence (formal languages) ,Mathematics ,Computer Science::Cryptography and Security - Abstract
Establishing the CCZ-equivalence of a pair of APN functions is generally quite difficult. In some cases, when seeking to show that a putative new infinite family of APN functions is CCZ inequivalent to an already known family, we rely on computer calculation for small values of n. In this paper we present a method to prove the inequivalence of quadratic APN functions with the Gold functions. Our main result is that a quadratic function is CCZ-equivalent to an APN Gold function if and only if it is EA-equivalent to that Gold function. As an application of this result, we prove that a trinomial family of APN functions that exist on finite fields of order 2^n where n = 2 mod 4 are CCZ inequivalent to the Gold functions. The proof relies on some knowledge of the automorphism group of a code associated with such a function., 13 pg
- Published
- 2011
35. Gröbner Bases over Commutative Rings and Applications to Coding Theory
- Author
-
Eimear Byrne and Teo Mora
- Subjects
Gröbner basis ,Pure mathematics ,Ring (mathematics) ,Theoretical computer science ,Mathematics::Commutative Algebra ,Chain (algebraic topology) ,Buchberger's algorithm ,List decoding ,Commutative ring ,Commutative algebra ,Commutative property ,Mathematics - Abstract
We give a survey of results and applications relating to the theory of Grobner bases of ideals and modules where the coefficient ring is a finite commutative ring. For applications, we specialize to the case of a finite chain ring. We discuss and compare the main algorithms that may be implemented to compute Grobner and (in the case of a chain ring) Szekeres-like bases. We give an account of a number of decoding algorithms for alternant codes over commutative finite chain rings.
- Published
- 2009
36. NMR with excitation modulated by Frank sequences
- Author
-
Qingxia Gong, Eimear Byrne, Bernhard Blümich, and Marcus Greferath
- Subjects
Nuclear and High Energy Physics ,Magnetic Resonance Spectroscopy ,business.industry ,Chemistry ,Amplifier ,Biophysics ,Signal Processing, Computer-Assisted ,Condensed Matter Physics ,Biochemistry ,Power (physics) ,Nuclear magnetic resonance ,Orders of magnitude (time) ,Models, Chemical ,Frequency domain ,Polyphase system ,Optoelectronics ,Computer Simulation ,Time domain ,business ,Phase modulation ,Excitation ,Algorithms - Abstract
Miniaturized NMR is of growing importance in bio-, chemical, and -material sciences. Other than the magnet, bulky components are the radio-frequency power amplifier and the power supply or battery pack. We show that constant flip-angle excitation with phase modulation following a particular type of polyphase perfect sequences results in low peak excitation power at high response peak power. It has ideal power distribution in both the time domain and the frequency domain. A savings in peak excitation power of six orders of magnitude has been realized compared to conventionally pulsed excitation. Among others, the excitation promises to be of use for button-cell operated miniature NMR devices as well as for complying with specific-absorption-rate regulations in high-field medical imaging.
- Published
- 2008
37. A Few More Quadratic APN Functions
- Author
-
Carl Bracken, Gary McGuire, Eimear Byrne, and Nadya Markin
- Subjects
FOS: Computer and information sciences ,Discrete mathematics ,Computer Networks and Communications ,Information Theory (cs.IT) ,Applied Mathematics ,Computation ,Differential uniformity ,Computer Science - Information Theory ,Mathematical statistics ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Quadratic equation ,Finite field ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics - Abstract
We present two infinite families of APN functions where the degree of the field is divisible by 3 but not 9. Our families contain two already known families as special cases. We also discuss the inequivalence proof (by computation) which shows that these functions are new., 12 pages, submitted to Cryptography and Communications
- Published
- 2008
38. Linear-Programming Decoding of Nonbinary Linear Codes
- Author
-
Vitaly Skachek, Mark F. Flanagan, Marcus Greferath, and Eimear Byrne
- Subjects
FOS: Computer and information sciences ,Computer science ,Information Theory (cs.IT) ,Computer Science - Information Theory ,05 social sciences ,Code word ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,Data_CODINGANDINFORMATIONTHEORY ,Library and Information Sciences ,Linear programming decoding ,Computer Science Applications ,symbols.namesake ,0508 media and communications ,Ternary Golay code ,Additive white Gaussian noise ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Graph (abstract data type) ,Low-density parity-check code ,Algorithm ,Decoding methods ,Information Systems ,Computer Science::Information Theory - Abstract
A framework for linear-programming (LP) decoding of nonbinary linear codes over rings is developed. This framework facilitates linear-programming based reception for coded modulation systems which use direct modulation mapping of coded symbols. It is proved that the resulting LP decoder has the 'maximum-likelihood certificate' property. It is also shown that the decoder output is the lowest cost pseudocodeword. Equivalence between pseudocodewords of the linear program and pseudocodewords of graph covers is proved. It is also proved that if the modulator-channel combination satisfies a particular symmetry condition, the codeword error rate performance is independent of the transmitted codeword. Two alternative polytopes for use with linear-programming decoding are studied, and it is shown that for many classes of codes these polytopes yield a complexity advantage for decoding. These polytope representations lead to polynomial-time decoders for a wide variety of classical nonbinary linear codes. LP decoding performance is illustrated for the [11,6] ternary Golay code with ternary PSK modulation over AWGN, and in this case it is shown that the performance of the LP decoder is comparable to codeword-error-rate-optimum hard-decision based decoding. LP decoding is also simulated for medium-length ternary and quaternary LDPC codes with corresponding PSK modulations over AWGN., To appear in the IEEE Transactions on Information Theory. 54 pages, 5 figures
- Published
- 2008
39. Fourier Spectra of Binomial APN Functions
- Author
-
Carl Bracken, Eimear Byrne, Nadya Markin, and Gary McGuire
- Subjects
FOS: Computer and information sciences ,Discrete Mathematics (cs.DM) ,Binomial (polynomial) ,General Mathematics ,Computer Science - Information Theory ,0102 computer and information sciences ,02 engineering and technology ,Mathematics & Statistics ,01 natural sciences ,Combinatorics ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics ,Computer Science::Cryptography and Security ,Discrete mathematics ,Degree (graph theory) ,Information Theory (cs.IT) ,Mathematical statistics ,020206 networking & telecommunications ,16. Peace & justice ,Nonlinear system ,010201 computation theory & mathematics ,Field extension ,Linear cryptanalysis ,Weight distribution ,BCH code ,Computer Science - Discrete Mathematics - Abstract
In this paper we compute the Fourier spectra of some recently discovered binomial APN functions. One consequence of this is the determination of the nonlinearity of the functions, which measures their resistance to linear cryptanalysis. Another consequence is that certain error-correcting codes related to these functions have the same weight distribution as the 2-error-correcting BCH code. Furthermore, for fields of odd degree, our results provide an alternative proof of the APN property of the functions., 20 pages. Submitted to the SIAM Journal on Discrete Mathematics
- Published
- 2008
40. Determining the Nonlinearity of a New Family of APN Functions
- Author
-
Nadya Markin, Carl Bracken, Eimear Byrne, and Gary McGuire
- Subjects
Computer Science::Performance ,Discrete mathematics ,Nonlinear system ,Quadratic equation ,Distribution (mathematics) ,Hadamard transform ,Walsh function ,Mathematics::Classical Analysis and ODEs ,Applied mathematics ,Function (mathematics) ,Walsh spectrum ,Mathematics - Abstract
We compute the Walsh spectrum and hence the nonlinearity of a new family of quadratic multi-term APN functions. We show that the distribution of values in the Walsh spectrum of these functions is the same as the Gold function.
- Published
- 2007
41. Ring geometries, Two-Weight Codes and Strongly Regular Graphs
- Author
-
Marcus Greferath, Eimear Byrne, and Thomas Honold
- Subjects
Discrete mathematics ,Strongly regular graph ,Ring (mathematics) ,Mathematics::Number Theory ,Applied Mathematics ,Projective line over a ring ,Mathematics - Rings and Algebras ,Computer Science Applications ,Set (abstract data type) ,Combinatorics ,Finite field ,Hyperplane ,General Mathematics (math.GM) ,Rings and Algebras (math.RA) ,FOS: Mathematics ,Projective space ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,Mathematics::Representation Theory ,Quaternionic projective space ,Mathematics - General Mathematics ,Mathematics - Abstract
It is known that a linear two-weight code $C$ over a finite field $\F_q$ corresponds both to a multiset in a projective space over $\F_q$ that meets every hyperplane in either $a$ or $b$ points for some integers $a, Comment: to appear in Designs Codes and Cryptography
- Published
- 2007
42. The linear programming bound for codes over finite Frobenius rings
- Author
-
Marcus Greferath, Eimear Byrne, and Michael E. O'Sullivan
- Subjects
Discrete mathematics ,Block code ,Linear programming ,business.industry ,Applied Mathematics ,Singleton bound ,Cryptography ,Coding theory ,Linear code ,Computer Science Applications ,Algebra ,Group code ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,business ,Mathematics - Abstract
In traditional algebraic coding theory the linear-programming bound is one of the most powerful and restrictive bounds for the existence of both linear and non-linear codes. This article develops a linear-programming bound for block codes on finite Frobenius rings.
- Published
- 2007
43. Polytope Representations for Linear-Programming Decoding of Non-Binary Linear Codes
- Author
-
Vitaly Skachek, Mark F. Flanagan, Eimear Byrne, and Marcus Greferath
- Subjects
Discrete mathematics ,FOS: Computer and information sciences ,Computer science ,Computer Science - Information Theory ,Information Theory (cs.IT) ,020206 networking & telecommunications ,Polytope ,02 engineering and technology ,Data_CODINGANDINFORMATIONTHEORY ,Linear code ,Linear programming decoding ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics::Metric Geometry ,020201 artificial intelligence & image processing ,Variety (universal algebra) ,Binary linear codes ,Decoding methods ,Computer Science::Information Theory - Abstract
In previous work, we demonstrated how decoding of a non-binary linear code could be formulated as a linear-programming problem. In this paper, we study different polytopes for use with linear-programming decoding, and show that for many classes of codes these polytopes yield a complexity advantage for decoding. These representations lead to polynomial-time decoders for a wide variety of classical non-binary linear codes., Comment: 5 pages, to appear in 2008 IEEE International Symposium on Information Theory
- Published
- 2007
- Full Text
- View/download PDF
44. Nonlinear codes for belief propagation
- Author
-
Chris Monico, Joachim Rosenthal, Christine A. Kelley, and Eimear Byrne
- Subjects
Block code ,Combinatorics ,Discrete mathematics ,Concatenated error correction code ,Turbo code ,Reed–Muller code ,Data_CODINGANDINFORMATIONTHEORY ,Serial concatenated convolutional codes ,Low-density parity-check code ,Linear code ,Raptor code ,Computer Science::Information Theory ,Mathematics - Abstract
We consider codes defined by a system of sparse polynomial parity check equations in F /sub 2/[x/sub 1/,...,x/sub n/]. We suggest that, defined in the right way, such codes admit an encoding comparable in efficiency with their linear counterparts (LDPC codes), and are suitable for iterative decoding.
- Published
- 2003
45. Grobner bases and alternant codes over Galois rings
- Author
-
Patrick Fitzpatrick and Eimear Byrne
- Subjects
Embedding problem ,Normal basis ,Discrete mathematics ,Combinatorics ,Differential Galois theory ,Gröbner basis ,Finite field ,Mathematics::Commutative Algebra ,Galois group ,Hamming distance ,Maximal element ,Mathematics - Abstract
We give a new algorithm for the solution of the Hamming metric decoding problem for alternant codes over a Galois ring R. First we develop a comprehensive theory of Grobner bases over R|x/sub 1/,...,x/sub n/|, which is of independent interest. By specialising to the case of one variable, we show that the solution of the key equation can be determined as a certain minimal element in a Grobner basis of the solution module.
- Published
- 2002
46. Re: Printed quit-pack sent to surgical patients at time of waiting list placement improved perioperative quitting
- Author
-
Eimear, Byrne, Robert, Drummond, Christopher, Ray, Andrew, Robertson, Sarah, Lewis, Andrew, Renwick, and Raymond, Oliphant
- Subjects
Male ,Elective Surgical Procedures ,Preoperative Care ,Humans ,Female ,Smoking Cessation ,Surgery ,General Medicine - Published
- 2014
47. Errata for 'The linear programming bound for codes over finite Frobenius rings'
- Author
-
Eimear Byrne, Michael E. O'Sullivan, and Marcus Greferath
- Subjects
Discrete mathematics ,Combinatorics ,Linear programming ,business.industry ,Applied Mathematics ,Computation ,Cryptography ,business ,Computer Science Applications ,Dual (category theory) ,Mathematics - Abstract
The authors discovered some mistakes in the article that appeared on pp. 289---301 of the March volume of DCC 42 (2007). The validity of its results is not affected, nor is that of the examples since their computation did not involve the dual version of the LP bound. In any case, we feel the errors need to be rectified here.
- Published
- 2007
48. Ring geometries, two-weight codes, and strongly regular graphs.
- Author
-
Eimear Byrne, Marcus Greferath, and Thomas Honold
- Subjects
CIPHERS ,FINITE fields ,GRAPHIC methods ,GEOMETRY - Abstract
Abstract It is known that a projective linear two-weight code C over a finite field $${\mathbb{F}}_q$$ corresponds both to a set of points in a projective space over $${\mathbb{F}}_q$$ that meets every hyperplane in either a or b points for some integers a b, and to a strongly regular graph whose vertices may be identified with the codewords of C. Here we extend this classical result to the case of a ring-linear code with exactly two nonzero homogeneous weights and sets of points in an associated projective ring geometry. We will introduce regular projective two-weight codes over finite Frobenius rings, we will show that such a code gives rise to a strongly regular graph, and we will give some constructions of two-weight codes using ring geometries. All these examples yield infinite families of strongly regular graphs with non-trivial parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
49. The linear programming bound for codes over finite Frobenius rings.
- Author
-
Eimear Byrne, Marcus Greferath, and Michael O’Sullivan
- Subjects
ALGEBRA ,MATHEMATICS ,COMPUTERS ,CODING theory ,CIPHERS ,COMPUTER programming ,FROBENIUS algebras - Abstract
In traditional algebraic coding theory the linear-programming bound is one of the most powerful and restrictive bounds for the existence of both linear and non-linear codes. This article develops a linear-programming bound for block codes on finite Frobenius rings. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
50. Saturating systems and the rank covering radius
- Author
-
Matteo Bonini, Martino Borello, and Eimear Byrne
- Subjects
05B40, 11T71, 51E20, 52C17, 94B75 ,cs.IT ,math.IT ,math.CO - Abstract
We introduce the concept of a rank saturating system and outline its correspondence to a rank-metric code with a given covering radius. We consider the problem of finding the value of $s_{q^m/q}(k,\rho)$, which is the minimum $\mathbb{F}_q$-dimension of a $q$-system in $\mathbb{F}_{q^m}^k$ which is rank $\rho$-saturating. This is equivalent to the covering problem in the rank metric. We obtain upper and lower bounds on $s_{q^m/q}(k,\rho)$ and evaluate it for certain values of $k$ and $\rho$. We give constructions of rank $\rho$-saturating systems suggested from geometry.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.