AbstractThe use of odd graphs has been proposed as fault-tolerant interconnection networks. The following problem originated in their design: what is the graphical covering radius of an Hadamard code of length 2k − 1 and size 2k − 1 in the odd graph Ok? Of particular interest is the case of k=2m−1, where we can choose this Hadamard code to be a subcode of the punctured first order Reed-Muller code RM(1,m). We define the w-covering radius of a binary code as the largest Hamming distance from a binary word of Hamming weight w to the code. The above problem amounts to finding the k-covering radius of a (2k,4k,k−1) Hadamard code. We find upper and lower bounds on this integer, and determine it for small values of k. Our study suggests a new iso...
Consider the problem of packing Hamming balls of a given relative radius subject to the constraint t...
Consider the problem of packing Hamming balls of a given relative radius subject to the constraint t...
Abstract. Let Rt,n denote the set of t-resilient Boolean functions of n variables. First, we prove t...
AbstractThe use of odd graphs has been proposed as fault-tolerant interconnection networks. The foll...
AbstractThe following problem originated from interconnection network considerations: what is the gr...
AbstractWe introduce a new approach which facilitates the calculation of the covering radius of a bi...
The search for codes of covering radius 1 led Ostergard, Quistor and Wassermann to the OQW method ...
AbstractThe cycle code of a graph is the binary linear span of the characteristic vectors of circuit...
International audienceWe study challenge codes for physically unclonable functions (PUFs). Starting ...
AbstractLet Hm be the binary linear block code with parity-check matrix Hm whose columns are all dis...
The purpose of this paper is to discuss some recent generalizations of the basic covering radius pro...
AbstractLet C be a binary linear code with covering radius R and let C0 be a subcode of C with codim...
The strength and the covering radius of a binary self-complementary code are studied under different...
Let F q0 be a finite field of odd characteristic. For an integer s ≥ 1, let C s (q0) be the generali...
AbstractWe derive new upper bounds on the covering radius of a binary linear code as a function of i...
Consider the problem of packing Hamming balls of a given relative radius subject to the constraint t...
Consider the problem of packing Hamming balls of a given relative radius subject to the constraint t...
Abstract. Let Rt,n denote the set of t-resilient Boolean functions of n variables. First, we prove t...
AbstractThe use of odd graphs has been proposed as fault-tolerant interconnection networks. The foll...
AbstractThe following problem originated from interconnection network considerations: what is the gr...
AbstractWe introduce a new approach which facilitates the calculation of the covering radius of a bi...
The search for codes of covering radius 1 led Ostergard, Quistor and Wassermann to the OQW method ...
AbstractThe cycle code of a graph is the binary linear span of the characteristic vectors of circuit...
International audienceWe study challenge codes for physically unclonable functions (PUFs). Starting ...
AbstractLet Hm be the binary linear block code with parity-check matrix Hm whose columns are all dis...
The purpose of this paper is to discuss some recent generalizations of the basic covering radius pro...
AbstractLet C be a binary linear code with covering radius R and let C0 be a subcode of C with codim...
The strength and the covering radius of a binary self-complementary code are studied under different...
Let F q0 be a finite field of odd characteristic. For an integer s ≥ 1, let C s (q0) be the generali...
AbstractWe derive new upper bounds on the covering radius of a binary linear code as a function of i...
Consider the problem of packing Hamming balls of a given relative radius subject to the constraint t...
Consider the problem of packing Hamming balls of a given relative radius subject to the constraint t...
Abstract. Let Rt,n denote the set of t-resilient Boolean functions of n variables. First, we prove t...