633,854 research outputs found

    List decoding Reed-Muller codes over small fields

    Full text link
    The list decoding problem for a code asks for the maximal radius up to which any ball of that radius contains only a constant number of codewords. The list decoding radius is not well understood even for well studied codes, like Reed-Solomon or Reed-Muller codes. Fix a finite field F\mathbb{F}. The Reed-Muller code RMF(n,d)\mathrm{RM}_{\mathbb{F}}(n,d) is defined by nn-variate degree-dd polynomials over F\mathbb{F}. In this work, we study the list decoding radius of Reed-Muller codes over a constant prime field F=Fp\mathbb{F}=\mathbb{F}_p, constant degree dd and large nn. We show that the list decoding radius is equal to the minimal distance of the code. That is, if we denote by δ(d)\delta(d) the normalized minimal distance of RMF(n,d)\mathrm{RM}_{\mathbb{F}}(n,d), then the number of codewords in any ball of radius δ(d)ε\delta(d)-\varepsilon is bounded by c=c(p,d,ε)c=c(p,d,\varepsilon) independent of nn. This resolves a conjecture of Gopalan-Klivans-Zuckerman [STOC 2008], who among other results proved it in the special case of F=F2\mathbb{F}=\mathbb{F}_2; and extends the work of Gopalan [FOCS 2010] who proved the conjecture in the case of d=2d=2. We also analyse the number of codewords in balls of radius exceeding the minimal distance of the code. For ede \leq d, we show that the number of codewords of RMF(n,d)\mathrm{RM}_{\mathbb{F}}(n,d) in a ball of radius δ(e)ε\delta(e) - \varepsilon is bounded by exp(cnde)\exp(c \cdot n^{d-e}), where c=c(p,d,ε)c=c(p,d,\varepsilon) is independent of nn. The dependence on nn is tight. This extends the work of Kaufman-Lovett-Porat [IEEE Inf. Theory 2012] who proved similar bounds over F2\mathbb{F}_2. The proof relies on several new ingredients: an extension of the Frieze-Kannan weak regularity to general function spaces, higher-order Fourier analysis, and an extension of the Schwartz-Zippel lemma to compositions of polynomials.Comment: fixed a bug in the proof of claim 5.6 (now lemma 5.5

    Complete electroweak one loop contributions to the pair production cross section of MSSM charged and neutral Higgs bosons in e+e- collisions

    Full text link
    In this paper, we review the production cross section for charged and neutral Higgs bosons pairs in e+ee^{+}e^{-} collisions beyond the tree level, in the framework of the Minimal Supersymmetric Standard Model (MSSM). A complete list of formulas for all electroweak contributions at the one loop level is given. A numerical code has been developed in order to compute them accurately and, in turn, to compare the MSSM Higgs bosons pair production cross sections at tree level and at the one loop level.Comment: 58 pages, 3 eps figure

    The immersion-minimal infinitely edge-connected graph

    Full text link
    We show that there is a unique immersion-minimal infinitely edge-connected graph: every such graph contains the halved Farey graph, which is itself infinitely edge-connected, as an immersion minor. By contrast, any minimal list of infinitely edge-connected graphs represented in all such graphs as topological minors must be uncountable.Comment: 19 pages, 4 figures, to appear in JCTB, tikz code of figures in comment

    Pauli Manipulation Detection codes and Applications to Quantum Communication over Adversarial Channels

    Full text link
    We introduce and explicitly construct a quantum code we coin a "Pauli Manipulation Detection" code (or PMD), which detects every Pauli error with high probability. We apply them to construct the first near-optimal codes for two tasks in quantum communication over adversarial channels. Our main application is an approximate quantum code over qubits which can efficiently correct from a number of (worst-case) erasure errors approaching the quantum Singleton bound. Our construction is based on the composition of a PMD code with a stabilizer code which is list-decodable from erasures. Our second application is a quantum authentication code for "qubit-wise" channels, which does not require a secret key. Remarkably, this gives an example of a task in quantum communication which is provably impossible classically. Our construction is based on a combination of PMD codes, stabilizer codes, and classical non-malleable codes (Dziembowski et al., 2009), and achieves "minimal redundancy" (rate 1o(1)1-o(1))
    corecore