In principle, network codes derived from non-Abelian groups can be used to attain every point in the capacity region of wired acyclic networks. However, group codes derived from a particular group, and its subgroups, is useful only if it can model independent sources, as well as violate the Ingleton bound which restricts the capacity region obtainable by linear network codes. We study both the independent source and the Ingleton-violating requirement for subgroups of the groups PGL(2,p) and GL(2,p) with primes p ≥ 5. For both these groups we demonstrate that the requirements can be met, which suggests that PGL(2,p) and GL(2,p) are rich enough groups to construct network codes superior to linear ones. We also construct a model for independen...
Abstract—In an acyclic multicast network, it is well known that a linear network coding solution ove...
Typical minimum distances and error exponents are analyzed on the 8-PSK Gaussian channel for two cap...
Typical minimum distances and error exponents are analyzed on the 8-PSK Gaussian channel for two cap...
In principle, network codes derived from non-Abelian groups can be used to attain every point in the...
Abstract — In this paper, we show that random variables mapped under group homomorphisms from a unif...
Given n discrete random variables, its entropy vector is the 2^n - 1-dimensional vector obtained fro...
The capacity of finite Abelian group codes over symmetric memoryless channels is determined. For cer...
It is well known that there is a one-to-one correspondence between the entropy vector of a collecti...
Linear rank inequalities in 4 subspaces are characterized by Shannon-type inequalities and the Ingle...
summary:The entropy region is a fundamental object of study in mathematics, statistics, and informat...
In this paper we study ensembles of Abelian group codes on symmetric channels. Our main example is t...
This thesis is dedicated to the study of information inequalities and quasi-uniform codes using grou...
We consider the problem of compression of a non-Abelian source.This is motivated by the problem of d...
We study the natural problem of secure n-party computation (in the computationally unbounded attack ...
The study of group codes as an ideal in a group algebra has been developed long time ago. If char(F)...
Abstract—In an acyclic multicast network, it is well known that a linear network coding solution ove...
Typical minimum distances and error exponents are analyzed on the 8-PSK Gaussian channel for two cap...
Typical minimum distances and error exponents are analyzed on the 8-PSK Gaussian channel for two cap...
In principle, network codes derived from non-Abelian groups can be used to attain every point in the...
Abstract — In this paper, we show that random variables mapped under group homomorphisms from a unif...
Given n discrete random variables, its entropy vector is the 2^n - 1-dimensional vector obtained fro...
The capacity of finite Abelian group codes over symmetric memoryless channels is determined. For cer...
It is well known that there is a one-to-one correspondence between the entropy vector of a collecti...
Linear rank inequalities in 4 subspaces are characterized by Shannon-type inequalities and the Ingle...
summary:The entropy region is a fundamental object of study in mathematics, statistics, and informat...
In this paper we study ensembles of Abelian group codes on symmetric channels. Our main example is t...
This thesis is dedicated to the study of information inequalities and quasi-uniform codes using grou...
We consider the problem of compression of a non-Abelian source.This is motivated by the problem of d...
We study the natural problem of secure n-party computation (in the computationally unbounded attack ...
The study of group codes as an ideal in a group algebra has been developed long time ago. If char(F)...
Abstract—In an acyclic multicast network, it is well known that a linear network coding solution ove...
Typical minimum distances and error exponents are analyzed on the 8-PSK Gaussian channel for two cap...
Typical minimum distances and error exponents are analyzed on the 8-PSK Gaussian channel for two cap...