322 research outputs found
On the Construction of High Dimensional Simple Games
Voting is a commonly applied method for the aggregation of the preferences of
multiple agents into a joint decision. If preferences are binary, i.e., "yes"
and "no", every voting system can be described by a (monotone) Boolean function
. However, its naive encoding needs
bits. The subclass of threshold functions, which is sufficient for
homogeneous agents, allows a more succinct representation using weights and
one threshold. For heterogeneous agents, one can represent as an
intersection of threshold functions. Taylor and Zwicker have constructed a
sequence of examples requiring and provided a
construction guaranteeing .
The magnitude of the worst-case situation was thought to be determined by
Elkind et al.~in 2008, but the analysis unfortunately turned out to be wrong.
Here we uncover a relation to coding theory that allows the determination of
the minimum number for a subclass of voting systems. As an application, we
give a construction for , i.e., there is no gain from a
representation complexity point of view.Comment: 13 pages, 1 tabl
Asymptotics for the genus and the number of rational places in towers of function fields over a finite field
We discuss the asymptotic behaviour of the genus and the number of rational places in towers of function fields over a finite field
Bounds for List-Decoding and List-Recovery of Random Linear Codes
A family of error-correcting codes is list-decodable from error fraction
if, for every code in the family, the number of codewords in any Hamming ball
of fractional radius is less than some integer that is independent of
the code length. It is said to be list-recoverable for input list size
if for every sufficiently large subset of codewords (of size or more),
there is a coordinate where the codewords take more than values. The
parameter is said to be the "list size" in either case. The capacity, i.e.,
the largest possible rate for these notions as the list size , is
known to be for list-decoding, and for
list-recovery, where is the alphabet size of the code family.
In this work, we study the list size of random linear codes for both
list-decoding and list-recovery as the rate approaches capacity. We show the
following claims hold with high probability over the choice of the code (below,
is the gap to capacity).
(1) A random linear code of rate requires list
size for list-recovery from input list size
. This is surprisingly in contrast to completely random codes, where suffices w.h.p.
(2) A random linear code of rate requires list size
for list-decoding from error
fraction , when is sufficiently small.
(3) A random binary linear code of rate is
list-decodable from average error fraction with list size with .
The second and third results together precisely pin down the list sizes for
binary random linear codes for both list-decoding and average-radius
list-decoding to three possible values
On Weak Odd Domination and Graph-based Quantum Secret Sharing
A weak odd dominated (WOD) set in a graph is a subset B of vertices for which
there exists a distinct set of vertices C such that every vertex in B has an
odd number of neighbors in C. We point out the connections of weak odd
domination with odd domination, [sigma,rho]-domination, and perfect codes. We
introduce bounds on \kappa(G), the maximum size of WOD sets of a graph G, and
on \kappa'(G), the minimum size of non WOD sets of G. Moreover, we prove that
the corresponding decision problems are NP-complete. The study of weak odd
domination is mainly motivated by the design of graph-based quantum secret
sharing protocols: a graph G of order n corresponds to a secret sharing
protocol which threshold is \kappa_Q(G) = max(\kappa(G), n-\kappa'(G)). These
graph-based protocols are very promising in terms of physical implementation,
however all such graph-based protocols studied in the literature have
quasi-unanimity thresholds (i.e. \kappa_Q(G)=n-o(n) where n is the order of the
graph G underlying the protocol). In this paper, we show using probabilistic
methods, the existence of graphs with smaller \kappa_Q (i.e. \kappa_Q(G)<
0.811n where n is the order of G). We also prove that deciding for a given
graph G whether \kappa_Q(G)< k is NP-complete, which means that one cannot
efficiently double check that a graph randomly generated has actually a
\kappa_Q smaller than 0.811n.Comment: Subsumes arXiv:1109.6181: Optimal accessing and non-accessing
structures for graph protocol
Synchronization with permutation codes and Reed-Solomon codes
D.Ing. (Electrical And Electronic Engineering)We address the issue of synchronization, using sync-words (or markers), for encoded data. We focus on data that is encoded using permutation codes or Reed-Solomon codes. For each type of code (permutation code and Reed-Solomon code) we give a synchronization procedure or algorithm such that synchronization is improved compared to when the procedure is not employed. The gure of merit for judging the performance is probability of synchronization (acquisition). The word acquisition is used to indicate that a sync-word is acquired or found in the right place in a frame. A new synchronization procedure for permutation codes is presented. This procedure is about nding sync-words that can be used speci cally with permutation codes, such that acceptable synchronization performance is possible even under channels with frequency selective fading/jamming, such as the power line communication channel. Our new procedure is tested with permutation codes known as distance-preserving mappings (DPMs). DPMs were chosen because they have de ned encoding and decoding procedures. Another new procedure for avoiding symbols in Reed-Solomon codes is presented. We call the procedure symbol avoidance. The symbol avoidance procedure is then used to improve the synchronization performance of Reed-Solomon codes, where known binary sync-words are used for synchronization. We give performance comparison results, in terms of probability of synchronization, where we compare Reed-Solomon with and without symbol avoidance applied
- …