期刊文献+

(s,l)-叠加码的构作及其性质 被引量:1

A Construction of Binary Superimposed(s,l)-code and Its Properties
原文传递
导出
摘要 一个二元叠加(s,l)-码在许多领域有着极为广泛的应用.利用有限集[n]的子集构作了一个(0,1)-矩阵C,并证明了它是一个(s,l)-码,给出了(s,l)-码的性质. A binary superimposed(s,l)— code is widely used in many areas.A(0,1)—matrix C is constructed by the subsets of the finite set[n],and proved that the matrix C is a binary superimposed(s,l)—code and obtained its properties.
出处 《数学的实践与认识》 北大核心 2016年第8期277-280,共4页 Mathematics in Practice and Theory
基金 河北省张家口市科技支撑研究项目(1112025B)
关键词 有限集 布尔和 布尔积 (s l)-码 汉明距离 finite set Boolean sum boolean product (s 1)-code hamming distance
  • 相关文献

参考文献11

  • 1Kautz W H,Singleton R C.Nonrandom binary superimposed codes[J].IEEE Trans Inform Theory,1964,10:363-377.
  • 2Ateniese G,Blundo C,Santis D A,Stinson D R.Visual cryptography for general access structures[J].Inform and Comput,1996,129(2):86-106.
  • 3Stinson D R,Tran V T,Wei R.Secure frameproof codes,key distribution patterns,group testing algorithms and related structures[J].J Statist Plann Inference,2000,86:595-617.
  • 4Mitchel C J,Piper F C.Key storage in secure networks[J].Discrete Appl Math,1988,21:1994,215-228.
  • 5Stinson D R,Tran van Trung,Wei R.Secure frame proof codes,key distribution patterns,group testing algorithms and related structures[J].J Statist Plann Inference,2000,86:595-617.
  • 6Bonis A D,Vaccaro U.Improved algorithms for group testing with inhibitors[J].Inform Process Lett,1998,67(3):57-64.
  • 7Bonis A D,Vaccaro U.Constructions of generalized superimpoesd codes with applications to group testing and conflict resolution in multiple access channels[J].Theoretical Computer science,2003,306:223-243.
  • 8DU Ding-zhu,HWANG F K.Pooling Designs and Nonadaptive Group Testing[M].2nd Edition World Scientific Singepore,2006.
  • 9Clementi A E F,Monti A,Silvestri R.Selective families,superimposed codes,and broadcasting on unknown radio networks[C]//Proc.of Symp.on Discrete Algorithms(SODA'01),Washington,DC,709-718.
  • 10D'yachkov A G,Macula A J,Torney D,Vilenkin P,Yekhanin S.New result in the theory of superimposed codes:PartⅠ[J].the ZBMath Journal,2000:126-130.

二级参考文献15

  • 1Kautz W H, Singleton R C. Nonrandom binary superimposed codes[J]. IEEE Trans Inform Theory 1964, 10: 363-377.
  • 2Ateniese G, Blundo C, Santis D A, Stinson D R. Visual cryptography for general access structures[J] Inform and Comput 1996, 129(2): 86-106.
  • 3Stinson D R, Tran V T, Wei R. Secure flameproof codes, key distribution patterns, group testing algorithms and related structures[J]. J Statist Plann Inference, 2000, 86: 595-617.
  • 4Mitchel C J, Piper F C. Key storage in secure networks[J]. Discrete Appl Math, 1988, 21: 1994, 215-228.
  • 5Stinson D R, Tran van Trung, Wei R. Secure frame proof codes, key distribution patterns, group testing algorithms and related structures(31. J Statist Plann Inference 2000, 86: 595-617.
  • 6Bonis A D, Vaccaro U. Improved algorithms for group testing with inhibitors[J]. Inform Process Lett, 1998, 67(3): 57-64.
  • 7Bonis A D, Vaccaro U. Constructions of generalized superimpoesd codes with applications to group testing and conflict resolution in multiple access channels[J]. Theoretical Computer science, 2003, 306: 223-243.
  • 8DU Ding-zhu, HWANG F K. Combinatorial Group Testing and its Applications[M]. 2nd Edition, World Scientific, Singepore, 2000.
  • 9Ciementi A E F, Monti A, Silves~ri R. Selective families, superimposed codes, aild broadcasting on unknown radio networks[C]//Proc of Symp on Discrete Algorithms (SODA'01), Washington, DC, 709-718.
  • 10Macula A J, A simple construction of d-disjunct matrices with certain constant weights[J]. Discrete Mathematics, 1996, 162: 311-312.

共引文献2

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部