3,868 research outputs found

    Lattices from Codes for Harnessing Interference: An Overview and Generalizations

    Full text link
    In this paper, using compute-and-forward as an example, we provide an overview of constructions of lattices from codes that possess the right algebraic structures for harnessing interference. This includes Construction A, Construction D, and Construction πA\pi_A (previously called product construction) recently proposed by the authors. We then discuss two generalizations where the first one is a general construction of lattices named Construction πD\pi_D subsuming the above three constructions as special cases and the second one is to go beyond principal ideal domains and build lattices over algebraic integers

    p-Adic valuation of weights in Abelian codes over /spl Zopf/(p/sup d/)

    Get PDF
    Counting polynomial techniques introduced by Wilson are used to provide analogs of a theorem of McEliece. McEliece's original theorem relates the greatest power of p dividing the Hamming weights of words in cyclic codes over GF (p) to the length of the smallest unity-product sequence of nonzeroes of the code. Calderbank, Li, and Poonen presented analogs for cyclic codes over /spl Zopf/(2/sup d/) using various weight functions (Hamming, Lee, and Euclidean weight as well as count of occurrences of a particular symbol). Some of these results were strengthened by Wilson, who also considered the alphabet /spl Zopf/(p/sup d/) for p an arbitrary prime. These previous results, new strengthened versions, and generalizations are proved here in a unified and comprehensive fashion for the larger class of Abelian codes over /spl Zopf/(p/sup d/) with p any prime. For Abelian codes over /spl Zopf//sub 4/, combinatorial methods for use with counting polynomials are developed. These show that the analogs of McEliece's theorem obtained by Wilson (for Hamming weight, Lee weight, and symbol counts) and the analog obtained here for Euclidean weight are sharp in the sense that they give the maximum power of 2 that divides the weights of all the codewords whose Fourier transforms have a specified support

    Symmetries of weight enumerators and applications to Reed-Muller codes

    Get PDF
    Gleason's 1970 theorem on weight enumerators of self-dual codes has played a crucial role for research in coding theory during the last four decades. Plenty of generalizations have been proved but, to our knowledge, they are all based on the symmetries given by MacWilliams' identities. This paper is intended to be a first step towards a more general investigation of symmetries of weight enumerators. We list the possible groups of symmetries, dealing both with the finite and infinite case, we develop a new algorithm to compute the group of symmetries of a given weight enumerator and apply these methods to the family of Reed-Muller codes, giving, in the binary case, an analogue of Gleason's theorem for all parameters.Comment: 14 pages. Improved and extended version of arXiv:1511.00803. To appear in Advances in Mathematics of Communication

    Further Results on Permutation Polynomials over Finite Fields

    Full text link
    Permutation polynomials are an interesting subject of mathematics and have applications in other areas of mathematics and engineering. In this paper, we develop general theorems on permutation polynomials over finite fields. As a demonstration of the theorems, we present a number of classes of explicit permutation polynomials on \gf_q

    On the Geometry of Balls in the Grassmannian and List Decoding of Lifted Gabidulin Codes

    Get PDF
    The finite Grassmannian Gq(k,n)\mathcal{G}_{q}(k,n) is defined as the set of all kk-dimensional subspaces of the ambient space Fqn\mathbb{F}_{q}^{n}. Subsets of the finite Grassmannian are called constant dimension codes and have recently found an application in random network coding. In this setting codewords from Gq(k,n)\mathcal{G}_{q}(k,n) are sent through a network channel and, since errors may occur during transmission, the received words can possible lie in Gq(k′,n)\mathcal{G}_{q}(k',n), where k′≠kk'\neq k. In this paper, we study the balls in Gq(k,n)\mathcal{G}_{q}(k,n) with center that is not necessarily in Gq(k,n)\mathcal{G}_{q}(k,n). We describe the balls with respect to two different metrics, namely the subspace and the injection metric. Moreover, we use two different techniques for describing these balls, one is the Pl\"ucker embedding of Gq(k,n)\mathcal{G}_{q}(k,n), and the second one is a rational parametrization of the matrix representation of the codewords. With these results, we consider the problem of list decoding a certain family of constant dimension codes, called lifted Gabidulin codes. We describe a way of representing these codes by linear equations in either the matrix representation or a subset of the Pl\"ucker coordinates. The union of these equations and the equations which arise from the description of the ball of a given radius in the Grassmannian describe the list of codewords with distance less than or equal to the given radius from the received word.Comment: To be published in Designs, Codes and Cryptography (Springer
    • …
    corecore