Search Results - "ØSTERGARD, P"
-
1
The Perfect Binary One-Error-Correcting Codes of Length 15: Part I-Classification
Published in IEEE transactions on information theory (01-10-2009)“…A complete classification of the perfect binary one-error-correcting codes of length 15 as well as their extensions of length 16 is presented. There are 5983…”
Get full text
Journal Article -
2
On the Size of Optimal Three-Error-Correcting Binary Codes of Length 16
Published in IEEE transactions on information theory (01-10-2011)“…Let A ( n , d ) denote the maximum size of a binary code with length n and minimum distance d . It has been known for decades that A (16,7) = A (17,8) = 36 or…”
Get full text
Journal Article -
3
The nonexistence of a (K6-e)-decomposition of the complete graph K29
Published in Journal of combinatorial designs (01-03-2010)“…We show via an exhaustive computer search that there does not exist a (K6−e)‐decomposition of K29. This is the first example of a non‐complete graph G for…”
Get full text
Journal Article -
4
The nonexistence of a ( K 6 ‐ e )‐decomposition of the complete graph K 29
Published in Journal of combinatorial designs (01-03-2010)“…We show via an exhaustive computer search that there does not exist a ( K 6 − e )‐decomposition of K 29 . This is the first example of a non‐complete graph G…”
Get full text
Journal Article -
5
Packing up to 50 Equal Circles in a Square
Published in Discrete & computational geometry (01-07-1997)Get full text
Journal Article -
6
A New Algorithm for the Maximum-Weight Clique Problem
Published in Electronic notes in discrete mathematics (01-04-2000)Get full text
Journal Article -
7
Copenhagen Community Psychiatric Project (CCPP) : characteristics and treatment of homeless patients in the psychiatric services after introduction of community mental health centres
Published in Social Psychiatry and Psychiatric Epidemiology (01-10-1997)“…The main purpose of the study was to describe the characteristics of homeless psychiatric patients, and to compare the treatment they are offered to that…”
Get full text
Journal Article -
8
Classification of Binary Constant Weight Codes
Published in IEEE transactions on information theory (01-08-2010)“…A binary code C ⊆ F 2 n with minimum distance at least d and codewords of Hamming weight w is called an (n , d , w ) constant weight code. The maximum size of…”
Get full text
Journal Article -
9
On Optimal Binary One-Error-Correcting Codes of Lengths 2^sup m ^ -4 and 2^sup m^ -3
Published in IEEE transactions on information theory (01-10-2011)“…Best and Brouwer proved that triply-shortened and doubly-shortened binary Hamming codes (which have length $2^{m}-4$ and $2^{m}-3$, respectively) are optimal…”
Get full text
Journal Article -
10
The Perfect Binary One-Error-Correcting Codes of Length15: Part I - Classification
Published in IEEE transactions on information theory (01-10-2009)“…A complete classification of the perfect binary one-error-correcting codes of length 15 as well as their extensions of length $16 is presented. There are 5983…”
Get full text
Journal Article -
11
Further results on (k, t)-subnormal covering codes
Published in IEEE transactions on information theory (01-01-1992)“…The concept of (k, t)-subnormal covering codes, is discussed generalizing some of the earlier results. In a similar way, (k, t)-normal covering codes are…”
Get full text
Journal Article -
12
A new binary code of length 10 and covering radius 1
Published in IEEE transactions on information theory (01-01-1991)“…A mixed code of covering radius 1 that has 60 codewords is constructed. This code is then used to show that K(10,1)<or=120.< >…”
Get full text
Journal Article -
13
There exists no Hermitian self-dual quaternary 26, 13, 10(4) code
Published in IEEE transactions on information theory (01-12-2004)“…Hermitian self-dual quaternary codes exist for all even lengths. The smallest length for which the maximum possible minimum distance of such codes is…”
Get full text
Journal Article -
14
On Optimal Binary One-Error-Correcting Codes of Lengths 2^-4 and 2^-3
Published in IEEE transactions on information theory (01-10-2011)“…Best and Brouwer proved that triply-shortened and doubly-shortened binary Hamming codes (which have length 2 m -4 and 2 m -3, respectively) are optimal…”
Get full text
Journal Article -
15
Reconstructing Extended Perfect Binary One-Error-Correcting Codes From Their Minimum Distance Graphs
Published in IEEE transactions on information theory (01-06-2009)“…The minimum distance graph of a code has the codewords as vertices and edges exactly when the Hamming distance between two codewords equals the minimum…”
Get full text
Journal Article -
16
A new bound for the zero-error capacity region of the two-user binary adder channel
Published in IEEE transactions on information theory (01-09-2005)“…A new uniquely decodable (UD) code pair for the two-user binary adder channel (BAC) is presented. This code pair leads to an improved bound for the zero-error…”
Get full text
Journal Article -
17
New Uniquely Decodable Codes for the T-User Binary Adder Channel With 3 \le T \le 5
Published in IEEE transactions on information theory (01-03-2007)“…New uniquely decodable (UD) codes for 3-, 4-, and 5-user binary adder channels are obtained in a computer search. These codes improve the highest known rate of…”
Get full text
Journal Article -
18
Dense packings of congruent circles in a circle
Published in Discrete mathematics (15-02-1998)“…The problem of finding packings of congruent circles in a circle, or, equivalently, of spreading points in a circle, is considered. Two packing algorithms are…”
Get full text
Journal Article -
19
Optimal quaternary linear rate-1/2 codes of length /les/18
Published in IEEE transactions on information theory (01-06-2003)“…We classify all optimal linear [n,n/2,d] codes over F(4) up to length 18. In particular, we show that there is a unique optimal [12,6,6] code and three optimal…”
Get full text
Journal Article -
20
Bounds and constructions for ternary constant-composition codes
Published in IEEE transactions on information theory (01-01-2002)“…The problem of determining the maximum size of a ternary code is considered, under the restriction that each symbol should appear a given number of times in…”
Get full text
Journal Article