期刊文献+

利用有限向量空间的子空间构作二元(s,l)叠加码 被引量:3

A Construction of Binary Superimposed(s,l)-codes from the Subspaces in the Finite Vector Space
原文传递
导出
摘要 一个二元叠加码(s,l)-码在许多领域有着极为广泛的应用.利用有限域F_q上的向量空间的子空间构作了矩阵M_q(m,d,k),并证明了它是一个(s,l)一码,计算了(s,l)-码的参数. A binary superimposed (s,l)-code is widely used in many areas. A matrix Mq(m, d, k) is constructed by the subspaces of the vector space in the finite field Fq and it proved that the matrix Mq(m, d, k) is a binary superimposed (s,l)-code and counted its parameters.
出处 《数学的实践与认识》 CSCD 北大核心 2014年第5期293-296,共4页 Mathematics in Practice and Theory
基金 张家口市新能源与信息化产业专项课题(12110019B)
关键词 向量空间 子空间 (s l)-码 vector space the subspaces (s,l)-codes
  • 相关文献

参考文献16

  • 1Kautz W H, Singleton R C. Nonrandom binary superimposed codes[J]. IEEE Trans Inform Theory 1964, 10: 363-377. 被引量:1
  • 2Ateniese G, Blundo C, Santis D A, Stinson D R. Visual cryptography for general access structures[J] Inform and Comput 1996, 129(2): 86-106. 被引量:1
  • 3Stinson D R, Tran V T, Wei R. Secure flameproof codes, key distribution patterns, group testing algorithms and related structures[J]. J Statist Plann Inference, 2000, 86: 595-617. 被引量:1
  • 4Mitchel C J, Piper F C. Key storage in secure networks[J]. Discrete Appl Math, 1988, 21: 1994, 215-228. 被引量:1
  • 5Stinson D R, Tran van Trung, Wei R. Secure frame proof codes, key distribution patterns, group testing algorithms and related structures(31. J Statist Plann Inference 2000, 86: 595-617. 被引量:1
  • 6Bonis A D, Vaccaro U. Improved algorithms for group testing with inhibitors[J]. Inform Process Lett, 1998, 67(3): 57-64. 被引量:1
  • 7Bonis A D, Vaccaro U. Constructions of generalized superimpoesd codes with applications to group testing and conflict resolution in multiple access channels[J]. Theoretical Computer science, 2003, 306: 223-243. 被引量:1
  • 8DU Ding-zhu, HWANG F K. Combinatorial Group Testing and its Applications[M]. 2nd Edition, World Scientific, Singepore, 2000. 被引量:1
  • 9Ciementi A E F, Monti A, Silves~ri R. Selective families, superimposed codes, aild broadcasting on unknown radio networks[C]//Proc of Symp on Discrete Algorithms (SODA'01), Washington, DC, 709-718. 被引量:1
  • 10Macula A J, A simple construction of d-disjunct matrices with certain constant weights[J]. Discrete Mathematics, 1996, 162: 311-312. 被引量:1

二级参考文献6

  • 1DU Dingzhu, HWANG F K. Pooling Designs and Nonadaptive Group Testing [ M]. Singepore:Word Scientific ,2006:40-44. 被引量:1
  • 2ANTHONY J M. A Simple Construction of d-disjunct Matrices with Certain Constant Weights [ J ]. Discrete Math, 1996,162 : 311-312. 被引量:1
  • 3HUANG Tayuan,WENG Chihwen. Pooling Spaces and Non-adaptive Pooling Designs [J]. Discrete Math,2004,282.163-169. 被引量:1
  • 4WAN Zhexian. Geometry of Classical Groups Over Finite Fields [M]. Sweden: Student Litteratur Lund, 1993. 被引量:1
  • 5ZHANG Xinlu, GUO J un, GAO Suogang. Two New Error-correcting Pooling Designs from d-bounded Distance-regular Graphs [J]. Journal of Combinatorial Optimization,2009,17:339-345. 被引量:1
  • 6郭军,祝学理.有限仿射几何中关于面的计数公式及应用[J].河北大学学报(自然科学版),2003,23(1):1-3. 被引量:3

共引文献1

同被引文献15

  • 1Kautz W H,Singleton R C.Nonrandom binary superimposed codes[J].IEEE Trans Inform Theory,1964,10:363-377. 被引量:1
  • 2Ateniese G,Blundo C,Santis D A,Stinson D R.Visual cryptography for general access structures[J].Inform and Comput,1996,129(2):86-106. 被引量:1
  • 3Stinson D R,Tran V T,Wei R.Secure frameproof codes,key distribution patterns,group testing algorithms and related structures[J].J Statist Plann Inference,2000,86:595-617. 被引量:1
  • 4Mitchel C J,Piper F C.Key storage in secure networks[J].Discrete Appl Math,1988,21:1994,215-228. 被引量:1
  • 5Stinson D R,Tran van Trung,Wei R.Secure frame proof codes,key distribution patterns,group testing algorithms and related structures[J].J Statist Plann Inference,2000,86:595-617. 被引量:1
  • 6Bonis A D,Vaccaro U.Improved algorithms for group testing with inhibitors[J].Inform Process Lett,1998,67(3):57-64. 被引量:1
  • 7Bonis A D,Vaccaro U.Constructions of generalized superimpoesd codes with applications to group testing and conflict resolution in multiple access channels[J].Theoretical Computer science,2003,306:223-243. 被引量:1
  • 8DU Ding-zhu,HWANG F K.Pooling Designs and Nonadaptive Group Testing[M].2nd Edition World Scientific Singepore,2006. 被引量:1
  • 9Clementi A E F,Monti A,Silvestri R.Selective families,superimposed codes,and broadcasting on unknown radio networks[C]//Proc.of Symp.on Discrete Algorithms(SODA'01),Washington,DC,709-718. 被引量:1
  • 10D'yachkov A G,Macula A J,Torney D,Vilenkin P,Yekhanin S.New result in the theory of superimposed codes:PartⅠ[J].the ZBMath Journal,2000:126-130. 被引量:1

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部