Bounds on the rate of disjunctive codes
A binary code is said to be a disjunctive ( s, ℓ ) cover-free code if it is an incidence matrix of a family of sets where the intersection of any ℓ sets is not covered by the union of any other s sets of this family. A binary code is said to be a list-decoding disjunctive of strength s with list siz...
Saved in:
Published in: | Problems of information transmission Vol. 50; no. 1; pp. 27 - 56 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
Moscow
Pleiades Publishing
2014
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | A binary code is said to be a disjunctive (
s, ℓ
) cover-free code if it is an incidence matrix of a family of sets where the intersection of any
ℓ
sets is not covered by the union of any other
s
sets of this family. A binary code is said to be a list-decoding disjunctive of strength
s
with list size
L
if it is an incidence matrix of a family of sets where the union of any
s
sets can cover no more that
L
− 1 other sets of this family. For
L
=
ℓ
= 1, both definitions coincide, and the corresponding binary code is called a disjunctive
s
-code. This paper is aimed at improving previously known and obtaining new bounds on the rate of these codes. The most interesting of the new results is a lower bound on the rate of disjunctive (
s, ℓ
) cover-free codes obtained by random coding over the ensemble of binary constant-weight codes; its ratio to the best known upper bound converges as
s
→ ∞, with an arbitrary fixed
ℓ
≥ 1, to the limit 2
e
−2
= 0.271 ... In the classical case of
ℓ
= 1, this means that the upper bound on the rate of disjunctive
s
-codes constructed in 1982 by D’yachkov and Rykov is asymptotically attained up to a constant factor
a
, 2
e
−2
≤
a
≤ 1. |
---|---|
AbstractList | A binary code is said to be a disjunctive (
s, ℓ
) cover-free code if it is an incidence matrix of a family of sets where the intersection of any
ℓ
sets is not covered by the union of any other
s
sets of this family. A binary code is said to be a list-decoding disjunctive of strength
s
with list size
L
if it is an incidence matrix of a family of sets where the union of any
s
sets can cover no more that
L
− 1 other sets of this family. For
L
=
ℓ
= 1, both definitions coincide, and the corresponding binary code is called a disjunctive
s
-code. This paper is aimed at improving previously known and obtaining new bounds on the rate of these codes. The most interesting of the new results is a lower bound on the rate of disjunctive (
s, ℓ
) cover-free codes obtained by random coding over the ensemble of binary constant-weight codes; its ratio to the best known upper bound converges as
s
→ ∞, with an arbitrary fixed
ℓ
≥ 1, to the limit 2
e
−2
= 0.271 ... In the classical case of
ℓ
= 1, this means that the upper bound on the rate of disjunctive
s
-codes constructed in 1982 by D’yachkov and Rykov is asymptotically attained up to a constant factor
a
, 2
e
−2
≤
a
≤ 1. |
Author | Polyansky, N. A. Vorob’ev, I. V. Shchukin, V. Yu D’yachkov, A. G. |
Author_xml | – sequence: 1 givenname: A. G. surname: D’yachkov fullname: D’yachkov, A. G. email: agd-msu@yandex.ru organization: Probability Theory Chair, Faculty of Mechanics and Mathematics, Lomonosov Moscow State University – sequence: 2 givenname: I. V. surname: Vorob’ev fullname: Vorob’ev, I. V. organization: Probability Theory Chair, Faculty of Mechanics and Mathematics, Lomonosov Moscow State University – sequence: 3 givenname: N. A. surname: Polyansky fullname: Polyansky, N. A. organization: Probability Theory Chair, Faculty of Mechanics and Mathematics, Lomonosov Moscow State University – sequence: 4 givenname: V. Yu surname: Shchukin fullname: Shchukin, V. Yu organization: Probability Theory Chair, Faculty of Mechanics and Mathematics, Lomonosov Moscow State University |
BookMark | eNp9j81LxDAQxYOsYHf1D_CWm6fqJGnzcdTFL1jwoJ5LTCbaookkreB_b8t6EzzNY977DfPWZBVTREJOGZwzJpqLRwDBTSOBNcBmrQ5IxSToWvBWrEi12PXiH5F1KQMsoUZU5OwqTdEXmiId35BmOyJNgfq-DFN0Y_-F1CWP5ZgcBvte8OR3bsjzzfXT9q7ePdzeby93teNaj7VssVFBgpdBWQMWmG6l5ooh9xrwZV6inmWwJnjhjFfMcGWM0iCdbY3YELa_63IqJWPoPnP_YfN3x6BbmnZ_ms4M3zNlzsZXzN2QphznN_-BfgATdVTS |
CitedBy_id | crossref_primary_10_1007_s10878_015_9951_1 crossref_primary_10_1007_s10623_016_0265_9 crossref_primary_10_1016_j_jco_2019_101457 crossref_primary_10_1016_j_tcs_2019_10_032 crossref_primary_10_1109_TIT_2023_3301037 crossref_primary_10_1134_S003294602102006X crossref_primary_10_1109_TIT_2016_2614726 crossref_primary_10_1007_s10623_016_0278_4 crossref_primary_10_1007_s10623_016_0279_3 crossref_primary_10_1016_j_tcs_2019_03_034 crossref_primary_10_1109_TIT_2019_2893234 crossref_primary_10_1016_j_tcs_2018_04_034 |
Cites_doi | 10.1016/j.dam.2008.06.003 10.1006/jcta.2002.3257 10.1002/jcd.10056 10.1017/S0963548300002121 10.1006/jcta.1999.3036 10.1007/978-3-642-36899-8_25 10.1016/0166-218X(88)90068-6 10.1007/978-1-4757-6048-4_22 10.1089/cmb.2007.0195 10.1016/0026-2714(89)90022-X 10.1109/TIT.1964.1053689 10.1109/18.817530 |
ContentType | Journal Article |
Copyright | Pleiades Publishing, Inc. 2014 |
Copyright_xml | – notice: Pleiades Publishing, Inc. 2014 |
DBID | AAYXX CITATION |
DOI | 10.1134/S0032946014010037 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1608-3253 |
EndPage | 56 |
ExternalDocumentID | 10_1134_S0032946014010037 |
GroupedDBID | -5B -5G -BR -EM -Y2 -~C -~X .86 .DC .VR 06D 0R~ 0VY 123 1N0 29O 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 408 409 40D 40E 5VS 67Z 6NX 8TC 95- 95. 95~ 96X AAAVM AABHQ AAFGU AAHNG AAIAL AAJKR AANZL AAPBV AARHV AARTL AATNV AATVU AAUYE AAWCG AAYFA AAYIU AAYQN AAYTO ABBBX ABBXA ABDZT ABECU ABFGW ABFTD ABFTV ABHQN ABJNI ABJOX ABKAS ABKCH ABKTR ABMNI ABMQK ABNWP ABPTK ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACBMV ACBRV ACBXY ACBYP ACGFS ACHSB ACHXU ACIGE ACIPQ ACKNC ACMDZ ACMLO ACOKC ACOMO ACSNA ACTTH ACVWB ACWMK ADHHG ADHIR ADINQ ADKNI ADKPE ADMDM ADOXG ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFTE AEGAL AEGNC AEJHL AEJRE AENEX AEOHA AEPYU AESTI AETLH AEVLU AEVTX AEXYK AFFNX AFGCZ AFLOW AFNRJ AFQWF AFWTZ AFZKB AGAYW AGDGC AGGBP AGJBK AGMZJ AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJRNO AKQUC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ ASPBG AVWKF AXYYD AZFZN B-. BA0 BDATZ BGNMA CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS HF~ HG6 HLICF HMJXF HQYDN HRMNR HVGLF HZ~ H~9 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C JBSCW JCJTX JZLTJ KDC KOV LAK LLZTM M4Y MA- N2Q NB0 NPVJJ NQJWS NU0 O9- O93 O9J OAM OVD P2P P9O PF0 PT4 QOS R89 R9I RIG RNI RNS ROL RPX RSV RZC RZE S16 S1Z S27 S3B SAP SDH SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TEORI TN5 TSG TSK TSV TUC U2A UG4 UNUBA UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WH7 WK8 XU3 YLTOR Z88 ZMTXR ~A9 AACDK AAJBT AASML AAYXX AAYZH ABAKF ACAOD ACDTI ACZOJ AEFQL AEMSY AFBBN AGRTI AIGIU CITATION H13 |
ID | FETCH-LOGICAL-c288t-65e47f60d6f7a90a018568271e2d80eb7a9e82d8fa9fd3c9d71927997806ca593 |
IEDL.DBID | AEJHL |
ISSN | 0032-9460 |
IngestDate | Thu Nov 21 22:47:53 EST 2024 Sat Dec 16 12:03:29 EST 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Asymptotic Equality Information Transmission Random Code Asymptotic Inequality Combinatorial Code Theory |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c288t-65e47f60d6f7a90a018568271e2d80eb7a9e82d8fa9fd3c9d71927997806ca593 |
PageCount | 30 |
ParticipantIDs | crossref_primary_10_1134_S0032946014010037 springer_journals_10_1134_S0032946014010037 |
PublicationCentury | 2000 |
PublicationDate | 4-2014 2014-1-00 |
PublicationDateYYYYMMDD | 2014-01-01 |
PublicationDate_xml | – year: 2014 text: 4-2014 |
PublicationDecade | 2010 |
PublicationPlace | Moscow |
PublicationPlace_xml | – name: Moscow |
PublicationTitle | Problems of information transmission |
PublicationTitleAbbrev | Probl Inf Transm |
PublicationYear | 2014 |
Publisher | Pleiades Publishing |
Publisher_xml | – name: Pleiades Publishing |
References | Kautz, Singleton (CR4) 1964; 10 D’yachkov (CR10) 1980; 16 Kim, Lebedev (CR21) 2004; 12 Lebedev (CR16) 2003; 39 Stinson, Wei, Zhu (CR23) 2000; 90 D’yachkov, Rykov, Deppe, Lebedev, Aydinian, Cicalese, Deppe (CR19) 2013 Engel (CR24) 1996; 5 Csiszár, Körner (CR9) 1981 CR17 D’yachkov, Rashad (CR12) 1989; 29 CR15 D’yachkov, Vilenkin, Macula, Torney (CR18) 2001 D’yachkov, Macula, Rykov (CR5) 2000; 46 D’yachkov (CR30) 2003 (CR32) 1998; 5 Chen, Fu (CR20) 2009; 157 D’yachkov, Rykov (CR3) 1983; 12 D’yachkov, Rykov, Rashad (CR7) 1989; 18 Fano (CR8) 1961 Nguyen Quang, Zeisel (CR26) 1988; 17 Mitchell, Piper (CR1) 1988; 21 CR2 Cheng, Du (CR31) 2008; 15 Rashad (CR29) 1990; 19 D’yachkov (CR11) 1984; 13 CR27 CR25 D’yachkov, Rykov (CR13) 1982; 18 Galeev, Tikhomirov (CR33) 2000 D’yachkov, Rykov, Antonov (CR28) 1989 D’yachkov, Macula, Rykov, Althöfer, Cai, Dueck, Khachatrian, Pinsker, Sárközy, Wegener, Zhang (CR6) 2000 D’yachkov, Vilenkin, Macula, Torney (CR14) 2002; 99 Sidelnikov, Prikhodov (CR22) 2009; 45 HK Kim (4190_CR21) 2004; 12 HB Chen (4190_CR20) 2009; 157 A D’yachkov (4190_CR14) 2002; 99 RM Fano (4190_CR8) 1961 AG D’yachkov (4190_CR3) 1983; 12 AG D’yachkov (4190_CR13) 1982; 18 CJ Mitchell (4190_CR1) 1988; 21 DR Stinson (4190_CR23) 2000; 90 A D’yachkov (4190_CR5) 2000; 46 A D’yachkov (4190_CR6) 2000 4190_CR15 (4190_CR32) 1998; 5 4190_CR2 YX Cheng (4190_CR31) 2008; 15 WH Kautz (4190_CR4) 1964; 10 VS Lebedev (4190_CR16) 2003; 39 I Csiszár (4190_CR9) 1981 AG D’yachkov (4190_CR11) 1984; 13 AG D’yachkov (4190_CR12) 1989; 29 VM Sidelnikov (4190_CR22) 2009; 45 4190_CR17 AG D’yachkov (4190_CR7) 1989; 18 AG D’yachkov (4190_CR19) 2013 AM Rashad (4190_CR29) 1990; 19 K Engel (4190_CR24) 1996; 5 AG D’yachkov (4190_CR30) 2003 EM Galeev (4190_CR33) 2000 AG D’yachkov (4190_CR28) 1989 A Nguyen Quang (4190_CR26) 1988; 17 AG D’yachkov (4190_CR18) 2001 4190_CR27 4190_CR25 AG D’yachkov (4190_CR10) 1980; 16 |
References_xml | – volume: 157 start-page: 1581 issue: 7 year: 2009 end-page: 1585 ident: CR20 article-title: Nonadaptive Algorithms for Threshold Group Testing publication-title: Discr. Appl. Math. doi: 10.1016/j.dam.2008.06.003 contributor: fullname: Fu – volume: 99 start-page: 195 issue: 2 year: 2002 end-page: 218 ident: CR14 article-title: Families of Finite Sets in Which No Intersection of Sets Is Covered by the Union of Others publication-title: J. Combin. Theory, Ser. A doi: 10.1006/jcta.2002.3257 contributor: fullname: Torney – volume: 12 start-page: 79 issue: 2 year: 2004 end-page: 91 ident: CR21 article-title: On Optimal Superimposed Codes publication-title: J. Combin. Des. doi: 10.1002/jcd.10056 contributor: fullname: Lebedev – volume: 5 start-page: 373 issue: 4 year: 1996 end-page: 384 ident: CR24 article-title: Interval Packing and Covering in the Boolean Lattice publication-title: Combin. Probab. Comput. doi: 10.1017/S0963548300002121 contributor: fullname: Engel – volume: 90 start-page: 224 year: 2000 end-page: 234 ident: CR23 article-title: Some New Bounds for Cover-Free Families publication-title: J. Combin. Theory, Ser. A doi: 10.1006/jcta.1999.3036 contributor: fullname: Zhu – ident: CR2 – start-page: 116 year: 1989 end-page: 119 ident: CR28 article-title: Disjunctive Codes with List Decoding publication-title: Proc. 10th Sympos. on Reliability Problem in Information Systems contributor: fullname: Antonov – volume: 19 start-page: 141 issue: 2 year: 1990 end-page: 149 ident: CR29 article-title: Random Coding Bounds on the Rate for List-Decoding Superimposed Codes publication-title: Probl. Control Inform. Theory contributor: fullname: Rashad – year: 1981 ident: CR9 publication-title: Information Theory: Coding Theorems for Discrete Memoryless Systems contributor: fullname: Körner – volume: 18 start-page: 237 issue: 4 year: 1989 end-page: 250 ident: CR7 article-title: Superimposed Distance Codes publication-title: Probl. Control Inform. Theory contributor: fullname: Rashad – start-page: 509 year: 2013 end-page: 533 ident: CR19 article-title: Superimposed Codes and Threshold Group Testing publication-title: Information Theory, Combinatorics, and Search Theory. In Memory of Rudolf Ahlswede doi: 10.1007/978-3-642-36899-8_25 contributor: fullname: Deppe – ident: CR25 – ident: CR27 – volume: 13 start-page: 357 issue: 6 year: 1984 end-page: 369 ident: CR11 article-title: Random Constant-Composition Codes for Multiple Access Channels publication-title: Probl. Control Inform. Theory contributor: fullname: D’yachkov – volume: 5 issue: 1 year: 1998 ident: CR32 publication-title: Electron. J. Combin. – volume: 21 start-page: 215 issue: 3 year: 1988 end-page: 228 ident: CR1 article-title: Key Storage in Secure Networks publication-title: Discrete Appl. Math. doi: 10.1016/0166-218X(88)90068-6 contributor: fullname: Piper – volume: 45 start-page: 36 issue: 1 year: 2009 end-page: 40 ident: CR22 article-title: On the Construction of ( ) Cover-Free Codes publication-title: Probl. Peredachi Inf. contributor: fullname: Prikhodov – volume: 17 start-page: 223 issue: 4 year: 1988 end-page: 230 ident: CR26 article-title: Bounds on Constant Weight Binary Superimposed Codes publication-title: Probl. Control Inform. Theory contributor: fullname: Zeisel – ident: CR15 – volume: 12 start-page: 229 issue: 4 year: 1983 end-page: 242 ident: CR3 article-title: A Survey of Superimposed Code Theory publication-title: Probl. Control Inform. Theory contributor: fullname: Rykov – start-page: 265 year: 2000 end-page: 282 ident: CR6 article-title: New Applications and Results of Superimposed Code Theory Arising from Potentialities of Molecular Biology publication-title: Numbers, Information, and Complexity doi: 10.1007/978-1-4757-6048-4_22 contributor: fullname: Zhang – ident: CR17 – year: 2003 ident: CR30 article-title: Lectures on Designing Screening Experiments publication-title: , vol. 10 contributor: fullname: D’yachkov – volume: 15 start-page: 195 issue: 2 year: 2008 end-page: 205 ident: CR31 article-title: New Constructions of One- and Two-Stage Pooling Designs publication-title: J. Comput. Biol. doi: 10.1089/cmb.2007.0195 contributor: fullname: Du – year: 2000 ident: CR33 publication-title: Optimizatsiya: teoriya, primery, zadachi contributor: fullname: Tikhomirov – start-page: 63 year: 2001 end-page: 75 ident: CR18 article-title: Two Models of Non-adaptive Group Testing for Designing Screening Experiments publication-title: Advances in Model Oriented Design and Analysis (Proc. 6th Int. Workshop on Model Oriented Design and Analysis, Puchberg/Schneeberg, Austria, 2001) contributor: fullname: Torney – year: 1961 ident: CR8 publication-title: Transmission of Information; a Statistical Theory of Communications contributor: fullname: Fano – volume: 16 start-page: 3 issue: 4 year: 1980 end-page: 8 ident: CR10 article-title: Bounds on the Average Error Probability for a Code Ensemble with Fixed Composition publication-title: Probl. Peredachi Inf. contributor: fullname: D’yachkov – volume: 18 start-page: 7 issue: 3 year: 1982 end-page: 13 ident: CR13 article-title: Bounds on the Length of Disjunctive Codes publication-title: Probl. Peredachi Inf. contributor: fullname: Rykov – volume: 39 start-page: 3 issue: 4 year: 2003 end-page: 9 ident: CR16 article-title: Asymptotic Upper Bound for the Rate of ( ) Cover-Free Codes publication-title: Probl. Peredachi Inf. contributor: fullname: Lebedev – volume: 29 start-page: 965 issue: 6 year: 1989 end-page: 971 ident: CR12 article-title: Universal Decoding for Random Design of Screening Experiments publication-title: Microelectron. Reliab. doi: 10.1016/0026-2714(89)90022-X contributor: fullname: Rashad – volume: 10 start-page: 363 issue: 4 year: 1964 end-page: 377 ident: CR4 article-title: Nonrandom Binary Superimposed Codes publication-title: IEEE Trans. Inform. Theory doi: 10.1109/TIT.1964.1053689 contributor: fullname: Singleton – volume: 46 start-page: 284 issue: 1 year: 2000 end-page: 290 ident: CR5 article-title: New Constructions of Superimposed Codes publication-title: IEEE Trans. Inform. Theory doi: 10.1109/18.817530 contributor: fullname: Rykov – volume: 5 issue: 1 year: 1998 ident: 4190_CR32 publication-title: Electron. J. Combin. – volume: 18 start-page: 7 issue: 3 year: 1982 ident: 4190_CR13 publication-title: Probl. Peredachi Inf. contributor: fullname: AG D’yachkov – volume: 16 start-page: 3 issue: 4 year: 1980 ident: 4190_CR10 publication-title: Probl. Peredachi Inf. contributor: fullname: AG D’yachkov – start-page: 265 volume-title: Numbers, Information, and Complexity year: 2000 ident: 4190_CR6 doi: 10.1007/978-1-4757-6048-4_22 contributor: fullname: A D’yachkov – volume: 19 start-page: 141 issue: 2 year: 1990 ident: 4190_CR29 publication-title: Probl. Control Inform. Theory contributor: fullname: AM Rashad – volume: 29 start-page: 965 issue: 6 year: 1989 ident: 4190_CR12 publication-title: Microelectron. Reliab. doi: 10.1016/0026-2714(89)90022-X contributor: fullname: AG D’yachkov – volume: 157 start-page: 1581 issue: 7 year: 2009 ident: 4190_CR20 publication-title: Discr. Appl. Math. doi: 10.1016/j.dam.2008.06.003 contributor: fullname: HB Chen – start-page: 63 volume-title: Advances in Model Oriented Design and Analysis (Proc. 6th Int. Workshop on Model Oriented Design and Analysis, Puchberg/Schneeberg, Austria, 2001) year: 2001 ident: 4190_CR18 contributor: fullname: AG D’yachkov – volume: 99 start-page: 195 issue: 2 year: 2002 ident: 4190_CR14 publication-title: J. Combin. Theory, Ser. A doi: 10.1006/jcta.2002.3257 contributor: fullname: A D’yachkov – start-page: 116 volume-title: Proc. 10th Sympos. on Reliability Problem in Information Systems year: 1989 ident: 4190_CR28 contributor: fullname: AG D’yachkov – volume: 18 start-page: 237 issue: 4 year: 1989 ident: 4190_CR7 publication-title: Probl. Control Inform. Theory contributor: fullname: AG D’yachkov – ident: 4190_CR15 – ident: 4190_CR17 – volume: 46 start-page: 284 issue: 1 year: 2000 ident: 4190_CR5 publication-title: IEEE Trans. Inform. Theory doi: 10.1109/18.817530 contributor: fullname: A D’yachkov – volume: 13 start-page: 357 issue: 6 year: 1984 ident: 4190_CR11 publication-title: Probl. Control Inform. Theory contributor: fullname: AG D’yachkov – ident: 4190_CR2 – volume: 45 start-page: 36 issue: 1 year: 2009 ident: 4190_CR22 publication-title: Probl. Peredachi Inf. contributor: fullname: VM Sidelnikov – volume: 21 start-page: 215 issue: 3 year: 1988 ident: 4190_CR1 publication-title: Discrete Appl. Math. doi: 10.1016/0166-218X(88)90068-6 contributor: fullname: CJ Mitchell – start-page: 509 volume-title: Information Theory, Combinatorics, and Search Theory. In Memory of Rudolf Ahlswede year: 2013 ident: 4190_CR19 doi: 10.1007/978-3-642-36899-8_25 contributor: fullname: AG D’yachkov – volume: 12 start-page: 79 issue: 2 year: 2004 ident: 4190_CR21 publication-title: J. Combin. Des. doi: 10.1002/jcd.10056 contributor: fullname: HK Kim – volume-title: Com 2 MaC Lect. Note Ser., vol. 10 year: 2003 ident: 4190_CR30 contributor: fullname: AG D’yachkov – volume-title: Transmission of Information; a Statistical Theory of Communications year: 1961 ident: 4190_CR8 contributor: fullname: RM Fano – volume-title: Information Theory: Coding Theorems for Discrete Memoryless Systems year: 1981 ident: 4190_CR9 contributor: fullname: I Csiszár – volume: 17 start-page: 223 issue: 4 year: 1988 ident: 4190_CR26 publication-title: Probl. Control Inform. Theory contributor: fullname: A Nguyen Quang – volume: 39 start-page: 3 issue: 4 year: 2003 ident: 4190_CR16 publication-title: Probl. Peredachi Inf. contributor: fullname: VS Lebedev – volume: 10 start-page: 363 issue: 4 year: 1964 ident: 4190_CR4 publication-title: IEEE Trans. Inform. Theory doi: 10.1109/TIT.1964.1053689 contributor: fullname: WH Kautz – volume: 12 start-page: 229 issue: 4 year: 1983 ident: 4190_CR3 publication-title: Probl. Control Inform. Theory contributor: fullname: AG D’yachkov – volume: 5 start-page: 373 issue: 4 year: 1996 ident: 4190_CR24 publication-title: Combin. Probab. Comput. doi: 10.1017/S0963548300002121 contributor: fullname: K Engel – volume: 15 start-page: 195 issue: 2 year: 2008 ident: 4190_CR31 publication-title: J. Comput. Biol. doi: 10.1089/cmb.2007.0195 contributor: fullname: YX Cheng – volume-title: Optimizatsiya: teoriya, primery, zadachi year: 2000 ident: 4190_CR33 contributor: fullname: EM Galeev – volume: 90 start-page: 224 year: 2000 ident: 4190_CR23 publication-title: J. Combin. Theory, Ser. A doi: 10.1006/jcta.1999.3036 contributor: fullname: DR Stinson – ident: 4190_CR27 – ident: 4190_CR25 |
SSID | ssj0010043 |
Score | 2.162012 |
Snippet | A binary code is said to be a disjunctive (
s, ℓ
) cover-free code if it is an incidence matrix of a family of sets where the intersection of any
ℓ
sets is not... |
SourceID | crossref springer |
SourceType | Aggregation Database Publisher |
StartPage | 27 |
SubjectTerms | Coding Theory Communications Engineering Control Electrical Engineering Engineering Information Storage and Retrieval Networks Systems Theory |
Title | Bounds on the rate of disjunctive codes |
URI | https://link.springer.com/article/10.1134/S0032946014010037 |
Volume | 50 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB5se9GD1apYX-QgCEpkN7t57LFqaxXxYgVvS7JJwApbcdv_b7KPYlEPetqwhBCGSb5vZsg3AKeG2iC2xGLlsAE7CKBYMBpirqQjvFqp2Ph8x_iJP76Im6GXySHL1EX-dtlUJMuLumo7EvsnvRFJYlZGBF41pQUdtzx1vt0ZDO_HD8vagS9uVWKMxDeQb2qZPy6yikarpdASYUbd_-xtCzZrPokGlQNsw5rJe9BtejWg-uj2YOOL8OAOnF35bkoFmuXIEUDk5SLQzCL9WkwdzvkbEPm37sUuPI-Gk-sxrlsm4IwIMceMmphbFmhmuUwCGTg4ZoLw0BAtAqPcTyPc0MrE6ihLNHcMjydehohlkibRHrTzWW72AYWRVVb5-DDQjnNpRaXOpOaKOFITRroP543p0vdKGSMtI4ooTr8ZpA8XjeXS-pAUv88--NPsQ1h3LCau8iJH0J5_LMwxtAq9OKldw3_vJrejT7Gpry0 |
link.rule.ids | 315,782,786,27933,27934,41073,42142,48344,48347,48357,49649,49652,49662,52153 |
linkProvider | Springer Nature |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB5se1APVqtifeYgCMrCbjabx7Fqa4u1Fyt4WzabBPSwK277_032IRb1oLclhBCGSb5vMjvfAJzryPjEYONJiw2ehYDI4zQKPCYTS3iVlES7947xI5s989uhk8kJm1qY8m_3JiVZ3tRV3xHianpDLAgtQwInm9KCDhGUWFfuDCbzu9Fn8sBltyo1Ruw6yDfJzB8XWYWj1VxoCTGj7r82tw1bNaNEg8oFdmBNZz3oNt0aUH14e7D5RXpwFy6uXT-lAuUZshQQOcEIlBukXopXi3TuDkSu2r3Yg6fRcH4z9uqmCV6KOV94NNKEGeoralgi_MS3gEw5ZoHGivta2kHN7adJhFFhKhSzHI8JJ0RE0yQS4T60szzTB4CC0EgjXYToK8u6lIwSlSaKSWxpTRCqPlw2tovfKm2MuIwpQhJ_M0gfrhrLxfUxKX6fffin2WewPp4_TOPpZHZ_BBuW05DqleQY2ov3pT6BVqGWp7WffADa-rGP |
linkToPdf | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1dS8MwFL24DUQfnE7F-ZkHQVCCbZo26ZNMtzF1DEEF30rSJKAP3bDb_zfphzjUB_GtlFDK5abn3NzecwBOdWg8aojB0mIDthAQYh6FPmZSWMKrpKTanXeMHtnkhfcHTibnqp6FKf52r1uS5UyDU2nK5pczZSoPEurmewMS06goD5yESgNa1BYyNtFbvcHdaPzZSHCdrlKZkTg3-bqx-eNDlqFpuS9awM2w_e8X3YSNimmiXpkaW7Cisw60axcHVG3qDqx_kSTchrNr57OUo2mGLDVETkgCTQ1Sr_mbRUD3bURuCj7fgefh4OlmhCszBZwSzuc4CjVlJvJUZJiIPeFZoI44Yb4minta2pua20sjYqOCNFbMcj8WO4GiKBVhHOxCM5tmeg-QHxhppKscPWXZmJKhUKlQTBJLd_xAdeG8jmMyKzUzkqLWCGjyLSBduKijmFTbJ_999f6fVp_A6kN_mIxvJ_cHsGapDi0PTw6hOX9f6CNo5GpxXKXMB6a6ulI |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Bounds+on+the+rate+of+disjunctive+codes&rft.jtitle=Problems+of+information+transmission&rft.au=D%E2%80%99yachkov%2C+A.+G.&rft.au=Vorob%E2%80%99ev%2C+I.+V.&rft.au=Polyansky%2C+N.+A.&rft.au=Shchukin%2C+V.+Yu&rft.date=2014-01-01&rft.pub=Pleiades+Publishing&rft.issn=0032-9460&rft.eissn=1608-3253&rft.volume=50&rft.issue=1&rft.spage=27&rft.epage=56&rft_id=info:doi/10.1134%2FS0032946014010037&rft.externalDocID=10_1134_S0032946014010037 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0032-9460&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0032-9460&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0032-9460&client=summon |