Codes for Identification in the King Lattice
β Scribed by Iiro Honkala; Tero Laihonen
- Publisher
- Springer Japan
- Year
- 2003
- Tongue
- English
- Weight
- 324 KB
- Volume
- 19
- Category
- Article
- ISSN
- 0911-0119
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Consider a connected undirected graph G =(V; E) and a subset of vertices C. If for all vertices v β V , the sets Br(v) β© C are all nonempty and di erent, where Br(v) denotes the set of all points within distance r from v, then we call C an r-identifying code. For all r, we give the exact value of th
We study properties of the meet of two rational codes X and Y, defined as the base of the free monoid X\* n Y\*. We first give several examples of rational maximal codes X and Y such that their meet is no longer a maximal code. We give a combinatorial characterization of the rational maximal codes X
In this note, we give Z 4 -code constructions of the Niemeier lattices, showing their embedding in the Leech lattice. These yield an alternative proof of a recent result by Dong et al. [5].
Let G=(V, E) be an undirected graph and C a subset of vertices. If the sets B r (v) 5 C, v Β₯ V, are all nonempty and different, where B r (v) denotes the set of all points within distance r from v, we call C an r-identifying code. We give bounds on the best possible density of r-identifying codes in
This paper proposes two event correlation schemes for fault identification in communication networks. The causality graph model is used to describe the cause-and-effect relationships between network events.