633,854 research outputs found
List decoding Reed-Muller codes over small fields
The list decoding problem for a code asks for the maximal radius up to which
any ball of that radius contains only a constant number of codewords. The list
decoding radius is not well understood even for well studied codes, like
Reed-Solomon or Reed-Muller codes.
Fix a finite field . The Reed-Muller code
is defined by -variate degree-
polynomials over . In this work, we study the list decoding radius
of Reed-Muller codes over a constant prime field ,
constant degree and large . We show that the list decoding radius is
equal to the minimal distance of the code.
That is, if we denote by the normalized minimal distance of
, then the number of codewords in any ball of
radius is bounded by independent
of . This resolves a conjecture of Gopalan-Klivans-Zuckerman [STOC 2008],
who among other results proved it in the special case of
; and extends the work of Gopalan [FOCS 2010] who
proved the conjecture in the case of .
We also analyse the number of codewords in balls of radius exceeding the
minimal distance of the code. For , we show that the number of
codewords of in a ball of radius is bounded by , where
is independent of . The dependence on is tight.
This extends the work of Kaufman-Lovett-Porat [IEEE Inf. Theory 2012] who
proved similar bounds over .
The proof relies on several new ingredients: an extension of the
Frieze-Kannan weak regularity to general function spaces, higher-order Fourier
analysis, and an extension of the Schwartz-Zippel lemma to compositions of
polynomials.Comment: fixed a bug in the proof of claim 5.6 (now lemma 5.5
Complete electroweak one loop contributions to the pair production cross section of MSSM charged and neutral Higgs bosons in e+e- collisions
In this paper, we review the production cross section for charged and neutral
Higgs bosons pairs in collisions beyond the tree level, in the
framework of the Minimal Supersymmetric Standard Model (MSSM). A complete list
of formulas for all electroweak contributions at the one loop level is given. A
numerical code has been developed in order to compute them accurately and, in
turn, to compare the MSSM Higgs bosons pair production cross sections at tree
level and at the one loop level.Comment: 58 pages, 3 eps figure
The immersion-minimal infinitely edge-connected graph
We show that there is a unique immersion-minimal infinitely edge-connected
graph: every such graph contains the halved Farey graph, which is itself
infinitely edge-connected, as an immersion minor.
By contrast, any minimal list of infinitely edge-connected graphs represented
in all such graphs as topological minors must be uncountable.Comment: 19 pages, 4 figures, to appear in JCTB, tikz code of figures in
comment
Recommended from our members
GPERF : a perfect hash function generator
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element lookup table and a pair of functions, phash and in_word_set. phash uniquely maps keywords in keyfile onto the range 0 .. k - 1, where k >/= n. If k = n, then phash is considered a minimal perfect hash function. in_word_set uses phash to determine whether a particular string of characters str occurs in the keyfile, using at most one string comparison.This paper describes the user-interface, options, features, algorithm design and implementation strategies incorporated in gperf. It also presents the results from an empirical comparison between gperf-generated recognizers and other popular techniques for reserved word lookup
Pauli Manipulation Detection codes and Applications to Quantum Communication over Adversarial Channels
We introduce and explicitly construct a quantum code we coin a "Pauli
Manipulation Detection" code (or PMD), which detects every Pauli error with
high probability. We apply them to construct the first near-optimal codes for
two tasks in quantum communication over adversarial channels. Our main
application is an approximate quantum code over qubits which can efficiently
correct from a number of (worst-case) erasure errors approaching the quantum
Singleton bound. Our construction is based on the composition of a PMD code
with a stabilizer code which is list-decodable from erasures.
Our second application is a quantum authentication code for "qubit-wise"
channels, which does not require a secret key. Remarkably, this gives an
example of a task in quantum communication which is provably impossible
classically. Our construction is based on a combination of PMD codes,
stabilizer codes, and classical non-malleable codes (Dziembowski et al., 2009),
and achieves "minimal redundancy" (rate )
- …