๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

New constructions for covering designs

โœ Scribed by Daniel M. Gordon; Oren Patashnik; Greg Kuperberg


Publisher
John Wiley and Sons
Year
1995
Tongue
English
Weight
838 KB
Volume
3
Category
Article
ISSN
1063-8539

No coin nor oath required. For personal study only.

โœฆ Synopsis


A (v, k, t) covering design, or covering, is a family of k-subsets, called blocks, chosen from a wet, such that each t-subset is contained in at least one of the blocks. The number of blocks is the covering's size, and the minimum size of such a covering is denoted by C(v, k, t). This paper gives three new methods for constructing good coverings: a greedy algorithm similar to Conway and Sloane's algorithm for lexicographic codes [6], and two methods that synthesize new coverings from preexisting ones. Using these new methods, together with results in the literature, we build tables of upper bounds on C ( v , k , t ) for v 5 32, k 5 16, and t 5 8.


๐Ÿ“œ SIMILAR VOLUMES


New Constructions of BIB Designs
โœ Dr. S. Kageyama; Dr. R. N. Mohan ๐Ÿ“‚ Article ๐Ÿ“… 1985 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 186 KB ๐Ÿ‘ 1 views

A method of construction of certain balanced incomplete block (BIB) designs is defined from which we get new series of BIB designs. ## 1 . Introduction For a BIB design with parameters v, b, r , k, I if the blocks can be separated into t

New constructions of divisible designs
โœ James A. Davis ๐Ÿ“‚ Article ๐Ÿ“… 1993 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 433 KB

## A construction is given for a (pzO(p+ 1),p2,pZnf'(p+ l),~?"+',p~~(p+ 1)) (p a prime) divisible difference set in the group H x 2, \*a+ I where His any abelian group of order pf 1. This can be used to generate a symmetric semi-regular divisible design; this is a new set of parameters for A, #O,

Combinatorial constructions for optimal
โœ Kai-Tai Fang; Gennian Ge; Min-Qian Liu; Hong Qin ๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 241 KB

Combinatorial designs have long had substantial application in the statistical design of experiments, and in the theory of error-correcting codes. Applications in experimental and theoretical computer science, communications, cryptography and networking have also emerged in recent years. In this pap