CN110224790B - Subspace code division greedy method based on Echelon-Ferrs - Google Patents

Subspace code division greedy method based on Echelon-Ferrs Download PDF

Info

Publication number
CN110224790B
CN110224790B CN201910498888.9A CN201910498888A CN110224790B CN 110224790 B CN110224790 B CN 110224790B CN 201910498888 A CN201910498888 A CN 201910498888A CN 110224790 B CN110224790 B CN 110224790B
Authority
CN
China
Prior art keywords
maximum
dimension
result set
vertex
obtaining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201910498888.9A
Other languages
Chinese (zh)
Other versions
CN110224790A (en
Inventor
何贤芒
姜宇
张足生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan University of Technology
Original Assignee
Dongguan University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan University of Technology filed Critical Dongguan University of Technology
Priority to CN201910498888.9A priority Critical patent/CN110224790B/en
Publication of CN110224790A publication Critical patent/CN110224790A/en
Application granted granted Critical
Publication of CN110224790B publication Critical patent/CN110224790B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/25Error detection or forward error correction by signal space coding, i.e. adding redundancy in the signal constellation, e.g. Trellis Coded Modulation [TCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0076Distributed coding, e.g. network coding, involving channel coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Peptides Or Proteins (AREA)

Abstract

The invention discloses a subspace code division greedy method based on Echelon-Ferrerers, which comprises the following steps: step one, determining a plurality of given parameters to generate a binary vector set of all combination numbers, and calculating the dimensionality of the binary vector; step two, sorting according to the dimension from large to large, and taking the maximum dimension vector as a first result set; calculating from the maximum dimension smaller than the maximum dimension vector until the dimension is equal to 0, obtaining a second result set of the dimension, and obtaining a third result set of the second result set and the first result set which are compatible; and step four, obtaining all maximum cliques through a maximum complete subgraph algorithm, obtaining the best maximum cliques, adding the best maximum cliques into the first result set, and obtaining a final fourth result set.

Description

Subspace code division greedy method based on Echelon-Ferrs
Technical Field
The invention relates to the field of network coding error correcting codes, in particular to a subspace code division greedy method based on Echelon-Ferrers.
Background
The current social communication field develops at a high speed, the transmission requirement on a communication network is higher and higher, and the traditional transmission mode cannot meet the increasing demand, so that new theories and technologies are continuously developed. The traditional way of transmitting data in a communication network is storage forwarding, and except for a sending node and a receiving node, an intermediate node in the network is only responsible for routing, that is, only plays a role of forwarding without any processing on the data. On a network
Before coding appears, people generally think that no benefit can be obtained when data of an intermediate node is processed, and the network coding theory proposed by R Ahlswede et al thoroughly overturns the traditional view. Network coding (Network coding) is an information exchange technology combining routing and coding, and the core idea is to allow a Network intermediate node to perform linear or nonlinear processing on data and then forward the data to a downstream node, wherein the intermediate node plays the role of an encoder. Due to the constraint of the maximum flow and the minimum cut theorem in the graph theory, the maximum rate of the communication network must not exceed the maximum flow value between the sending end and the receiving end, and the maximum flow value cannot be reached by the traditional multicast routing method. R Ahlswede et al take the research of butterfly network as an example, and indicate that the maximum stream bound of multicast routing transmission is possible to achieve in network coding, which shows that the network coding can greatly improve the transmission efficiency of information, thereby laying an important position in the communication field.
The network coding has the great significance that: it indicates that the network information stream can be compressed, thereby overriding the classical conclusion that individual bits can no longer be compressed. Network coding allows the intermediate nodes to play the role of signal processors, which, although increasing the complexity of the network, greatly increases the network capacity and the transmission efficiency of information. The network coding has the advantages that: (1) the throughput of the network is improved; (2) improving network load balance; (3) the bandwidth utilization rate is improved; (4) energy consumption of the wireless network nodes is saved. In linear stochastic network coding, Koetter and Kschischang propose linear operator channel models, and subspace coding is increasingly gaining attention. Subspace coding (Subspace coding) is an important component of network coding, and unlike conventional error correction codes, each codeword in Subspace coding is a Subspace, and it is a Subspace distance that is used to measure error detection and correction capabilities of codes. Subspace coding is an important linear network coding.
Koetter et al gives the error detection and correction capabilities of subspace coding: if the subspace distance d satisfies the condition d >2t +2p, the subspace code can correct t packet errors and p erasure errors. Therefore, when the subspace distance d is determined, if the subspace meeting the distance condition can be obtained as many as possible in the limited space, more code words can be obtained, and the information transmission efficiency is improved. How to obtain more code numbers in a limited space is an important research topic in the field of subspace coding.
Disclosure of Invention
The invention designs and develops a subspace code division greedy method based on Echelon-Ferrers, and aims to solve the problem of acquiring more code numbers in a limited space.
The technical scheme provided by the invention is as follows:
a subspace code division greedy method based on Echelon-Ferrers comprises the following steps:
step one, determining a plurality of given parameters to generate a binary vector set of all combination numbers, and calculating the dimensionality of the binary vector;
step two, sorting according to the dimension from large to large, and taking the maximum dimension vector as a first result set;
calculating from the maximum dimension smaller than the maximum dimension vector until the dimension is equal to 0, obtaining a second result set of the dimension, and obtaining a third result set of the second result set and the first result set which are compatible;
and step four, obtaining all maximum cliques through a maximum complete subgraph algorithm, obtaining the best maximum cliques, adding the best maximum cliques into the first result set, and obtaining a final fourth result set.
Preferably, in the first step, the process of calculating the dimensionality of the binary vector comprises:
and expressing the vector according to a simplest row-column ladder matrix, and determining that the number of rows and columns in the matrix is removed according to the given parameters, wherein the remaining minimum number of points is the dimension.
Preferably, in the fourth step, the maximal complete subgraph algorithm includes:
firstly, determining a set C, a graph T and a set D of the maximum complete subgraph;
then, by calling
Figure BDA0002089521870000031
Starting depth-first traversal, and when the set C and the graph T are both empty sets, representing a maximum complete sub-graph generation;
finally, selecting a vertex Vp with the maximum degree from the union set of the T & ltU & gt D every time, traversing each vertex v in the set T', adding v into the candidate set C, recursively calling an MCE algorithm once for each vertex, using whether other vertices can generate a maximum complete subgraph, removing the vertex v, and then putting back the vertex v into the set D again;
where N (Vp) is the set of all points adjacent to Vp, and T' is the set of vertex sets N (Vp) connected to Vp subtracted from the set T.
Preferably, in the third step, the hamming distance of the vectors consistent with the first result set and the second result set is not less than the given parameter.
Preferably, in the fourth step, the best maximum cluster is the maximum cluster with the largest number of codewords.
Preferably, the simplest row-column ladder matrix is:
the initial coefficient of each row is positioned at the right side of the initial coefficient of the previous row; all leader coefficients are 1; all coefficients located to the left of the leader coefficient are 0; each item leader coefficient is the only nonzero element positioned in the column;
wherein the leader coefficient is the first element in a row that is not 0.
Compared with the prior art, the invention has the following beneficial effects: the method provided by the invention can improve the number of the existing subspace code words, can obtain the subspace meeting the distance condition as much as possible in the limited space, can also obtain more code words, and improves the information transmission efficiency.
Drawings
Fig. 1 is 2 completely large subgraphs as described in example 1 of the present invention.
Detailed Description
The present invention is further described in detail below with reference to the attached drawings so that those skilled in the art can implement the invention by referring to the description text.
The invention provides a subspace code division greedy method based on Echelon-Ferrerers, which comprises the following steps:
step one, given parameters n, k and d, generating all combination numbers
Figure BDA0002089521870000041
A binary vector set with the length of n and the weight of k is recorded as iVset;
step two, calculating the dimensionality of the vectors;
step three, sorting according to the dimension from large to small;
step four, putting the max vector of the maximum dimension into a result set Sv;
step five, calculating from the second largest dimension until the dimension is equal to 0; namely, the dimension is equal to max-1 from i, 1 is reduced each time until 0, all vector sets with the dimension being i are obtained, and all sets iSet which are compatible with the result set Sv are found; calling an existing maximum complete subgraph algorithm MCE (phi, iSet, phi) to generate all maximum cliques; selecting the best maximum cluster from the result sets and adding the best maximum cluster into the result set sv;
and step six, returning the result set Sv, namely the final result set.
In another embodiment, the dimension is calculated by firstly representing the vector according to a simplest row-column ladder matrix; wherein, the simplest row-column ladder matrix is defined as follows:
1) the leading coefficient of each row (the first element in a row that is not 0) is located to the right of the leading coefficient of the previous row;
2) all leader coefficients are 1;
3) all the coefficients located at the left side of the leader coefficient are 0
4) Each item leader coefficient is the only nonzero element positioned in the column;
in this embodiment, preferably, when n is 6, k is 3, and d is 4, the vector (110100) is expressed as follows according to the simplest row-column ladder matrix:
Figure BDA0002089521870000042
transformed into Ferrers diagram
Figure BDA0002089521870000043
(remove 0,1 and lean right)
Setting parameters
Figure BDA0002089521870000044
After removing the i rows and the delta-i columns from the above figure, the minimum number of points remaining is the dimension, which is therefore 5 in this embodiment, depending on the calculation process.
In another embodiment, the maximum complete subgraph algorithm MCE needs to input three parameters: set C, graph T, set D:
step 1, if the set T is an empty set
Figure BDA0002089521870000045
And D is an empty set
Figure BDA0002089521870000046
{
The output set C is a very large complete subgraph;
the program is ended;
}
step 2, selecting a vertex Vp with the maximum degree from the union set of T and D;
step 3, T' is that the vertex set N (Vp) connected with Vp is subtracted from T;
step 4, for any vertex v belonging to the set T', the following two steps are carried out:
1) removing vertex v from T; recursively calling MCE (union of set C and { v }, set T and N (v) and set D and N (v));
2) adding the vertex v into the set D;
the further explanation of the steps comprises the following steps: all the maximal complete subgraphs of the graph T returned by the MCE algorithm are generated by a method of traversing the whole graph deeply by a backtracking method, and the algorithm calls
Figure BDA0002089521870000051
Starting depth-first traversal, and when C and T are both empty sets, representing a maximum complete sub-graph generation; selecting a vertex Vp with the maximum degree from the T U D union each time, traversing each vertex v in T', adding v into the candidate set C, recursively calling an MCE algorithm for each vertex, and finally backtracking to try to use other vertices to generate a maximum complete subgraph or not and remove the vertex v, so that the vertex V is replaced and the D is removed again; where N (Vp) represents the set of all points adjacent to Vp.
Example 1
As shown in fig. 1, running the above algorithm results in 2 completely maximal sub-graphs { {0,2,3}, {0,1,3,4} }, the implementation process of the algorithm:
three parameters are input: collection
Figure BDA0002089521870000052
Graph T {0,1,2,3,4}, set
Figure BDA0002089521870000053
At the time of starting the operation of the device,
step one, the set T is not an empty set and does not meet the condition;
secondly, selecting a vertex Vp (0) with the maximum degree from the union set T and D;
third, T' is equal to the set T ═ {0,1,2,3,4} minus {1,2,3,4}, T ═ 0 };
step four, v ═ 0 belongs to the set T', and the following two steps are performed:
1) t ═ 1,2,3,4, call
Figure BDA0002089521870000054
2)D={0};
Maximal complete subgraph algorithm
Figure BDA0002089521870000055
When the machine is in operation,
step one, the set T is not an empty set and does not meet the condition;
secondly, selecting a vertex Vp ═ 3} with the maximum degree from the union set T ═ D;
third, T 'is equal to the set T ═ {1,2,3,4} minus {1,2,4}, T' ═ 3 };
step four, v ═ 3 belongs to the set T', and the following two steps are performed:
1) t ═ 1,2,4, call
Figure BDA0002089521870000061
2) D is added to the vertex v, and D is {3 };
maximal complete subgraph algorithm
Figure BDA0002089521870000062
When the machine is in operation,
step one, the set T is not an empty set and does not meet the condition;
secondly, selecting a vertex Vp (1) with the maximum degree from the union set T and D;
third, T 'is equal to the set T ═ {1,2,4} minus {2,4}, T' ═ 1 };
step four, v ═ 1 belongs to the set T', and the following two steps are performed:
1) t ═ 2,4, call
Figure BDA0002089521870000063
2) D is added to the vertex v, and D is {1 };
maximal complete subgraph algorithm
Figure BDA0002089521870000064
When the machine is in operation,
step one, the set T is not an empty set and does not meet the condition;
secondly, selecting a vertex Vp (4) with the maximum degree from the union set T and D;
third, T 'is equal to the set T {2,4} minus {2}, T' {4 };
step four, v ═ 4 belongs to the set T', and the following two steps are performed:
1) t ═ 2, call
Figure BDA0002089521870000065
2) D is added to the vertex v, and D is {1 };
maximal complete subgraph algorithm
Figure BDA0002089521870000066
When the machine is in operation,
in the first step, the condition is satisfied and {0,1,3,4} is output.
In another embodiment, the best maximum clique is the one with the highest number of codewords.
Example 2
When n is 6, d is 4, k is 3, q is generally 2,3,4,5,7,8,9, all of which are in common
Figure BDA0002089521870000067
And vectors, wherein the Hamming distance of any two vectors in a subset S is to be found out, the Hamming distance of any two vectors in the subset S is more than or equal to 4, and the sum of the number (the dimension power of q) of the corresponding code words of the vectors in the subset S is as much as possible.
Step one, generating all 20 vectors as shown in table 1
TABLE 1
Figure BDA0002089521870000068
Figure BDA0002089521870000071
Step two, defining the distance d to be 4 according to the dimensionality in the method of the patent, wherein the computed dimensionality is shown in the table above;
step three, sorting the components according to the dimension in the table:
v1,v2,v3,v5,v4,v6,v11,v7,v8,v12,v13,v9,v14,v15,v10,v16,v17,v18,v19,v20
the fourth step of mixing v1Put result set Sv ═ { v ═ v1}
The fifth step, according to v1Dimension i is calculated from 5 up to 0;
when i is 5, 4, 3, according to hamming distance, no addition is made because of incompatibility with the result set;
when i is 2, there is v according to Hamming distance8Can be added;
when i is 1, there is v according to Hamming distance15Can be added;
when i is 0, there is v according to Hamming distance19Can be added;
sixthly, the result set Sv is set as { v ═ v1,v8,v15,v19Returning;
the algorithm is applied to obtain 4 vectors { v } in S1,v8,v15,v19According to the construction method, the lower bound of the code word of Aq (6, 4, 3) exceeds q6+q2+q+1。
Example 3
As shown in table 2, n is 13, k is 5, d is 4, and q is prime power, and is generally 2,3,4,5,7,8, and 9, which are common
Figure BDA0002089521870000072
And vectors, wherein the Hamming distance of any two vectors in a subset S is to be found out, the Hamming distance of any two vectors in the subset S is more than or equal to 4, and the sum of the number (the dimension power of q) of the corresponding code words of the vectors in the subset S is as much as possible. Applying the above algorithm results in 100 vectors in S, 24 of which are in the following table, according to the construction method according to the above algorithm, the code word lower bound of Aq (13, 4, 5) exceeds q32+q28+q26+8q24+q23+3q22+q21+4q20+4q19+4q18+4q17+4q16+6q15+12q14+7q13+6q12+5q11+2q10+8q9+4q8+3q7+q6+4q4+q3+3q2+q+1
TABLE 2
(Vector) Dimension number (Vector) Dimension number
1 1111100000000 32 13 0110101010000 22
2 1110011000000 28 14 0110110001000 22
3 1101010100000 26 15 0111001001000 22
4 1011001100000 24 16 1010101001000 21
5 1001111000000 24 17 1110000001100 20
6 1100110010000 24 18 0101110000100 20
7 1010110100000 24 19 0101100110000 20
8 1110000110000 24 20 0111000100100 20
9 1100101100000 24 21 0011100101000 19
10 0111010010000 24 22 0011101000100 19
11 1101001010000 24 23 0011110000010 19
12 1011010001000 23 24 1011000010100 19
Based on the prior art, the greedy _ multicomponent lower bound on the Aq (13, 4, 5) codeword is currently as follows:
q32+q28+q26+8q24+q23+q22+3q21+2q20+3q19+5q18+5q17+9q16+q15+3q14+3q13+3q12+6q11+3q10+q9+8q8+q7+3q6+3q5+4q4+4q3+2q2+q+1
the lower bound is not as large as the number of code words in the method of the invention, and the calculation finds that there are 161 lower bound improvements, including the following results:
aq (13, 4, 5), Aq (14, 4, 5), Aq (13, 4, 6), Aq (14, 4, 6), Aq (15, 4, 6), Aq (16, 4, 6), Aq (17, 4, 6), Aq (15, 4, 7), Aq (16, 4, 7), Aq (17, 4, 7), Aq (18, 4, 7), Aq (19, 4, 7), Aq (15, 6, 6), Aq (16, 6, 6), A q (17, 6, 6), Aq (18, 6, 6), Aq (19, 6, 6), Aq (14, 6, 7), Aq (15, 6, 7), Aq (16, 6, 7), Aq (17, 6, 7), Aq (18, 6, 7), Aq (19, 6, 7), wherein {2, 3,4,5, 8,9, 8 }, may be used as {2, 3,4, 7 }, or {2, 6, 7 }, or 4.
From the increasing ratio, the code word which is increased most is A2(19, 4, 7), the code word is increased by 11.5% on the basis of the original code word, the minimum code word is A2(13, 4, 6), the number of the code words is increased from 38325127529 to 38325131657, and the code word is increased by 1.07 multiplied by 10-7
While embodiments of the invention have been described above, it is not limited to the applications set forth in the description and the embodiments, which are fully applicable in various fields of endeavor to which the invention pertains, and further modifications may readily be made by those skilled in the art, it being understood that the invention is not limited to the details shown and described herein without departing from the general concept defined by the appended claims and their equivalents.

Claims (5)

1. A subspace code division greedy method based on Echelon-Ferrs is characterized by comprising the following steps:
step one, determining a plurality of given parameters to generate a binary vector set of all combination numbers, and calculating the dimensionality of the binary vector;
step two, sorting according to the dimension from large to small, and taking the maximum dimension vector as a first result set;
calculating from the maximum dimension smaller than the maximum dimension vector until the dimension is equal to 0, obtaining a second result set of the dimension, and obtaining a third result set of the second result set and the first result set which are compatible;
step four, obtaining all maximum cliques through a maximum complete subgraph algorithm, obtaining the best maximum cliques, adding the best maximum cliques into the first result set, and obtaining a final fourth result set;
wherein the maximal complete subgraph algorithm comprises:
firstly, determining a set C, a set T and a set D of the maximum complete subgraph;
then, by calling
Figure FDA0003409528640000011
Starting depth-first traversal, and when the set C and the set T are both empty sets, representing a maximum complete sub-graph generation;
finally, selecting a vertex Vp with the maximum degree from the union set of the T & ltU & gt D every time, traversing each vertex v in the set T', adding v into the candidate set C, recursively calling an MCE algorithm once for each vertex, using other vertices to generate a maximum complete subgraph, removing the vertex v from the set T, and then putting back the vertex V in the set D;
where N (Vp) is the set of all points adjacent to Vp, and T' is the set of vertex sets N (Vp) connected to Vp subtracted from the set T.
2. The Echelon-Ferrers-based subspace code division greedy method of claim 1, wherein in the step one, the process of calculating the dimension of the binary vector comprises:
and expressing the vector according to a simplest row-column ladder matrix, and determining that the number of rows and columns in the matrix is removed according to the given parameters, wherein the remaining minimum number of points is the dimension.
3. The Echelon-Ferrers-based subspace code-division greedy method of claim 1, wherein at the third step, the compatibility is such that the hamming distance of the vectors of the first result set and the second result set is not less than the given parameter.
4. The Echelon-Ferrers-based subspace code division greedy method of claim 1, wherein in the fourth step, the best maximum clique is the maximum clique with the largest number of codewords.
5. The Echelon-Ferrers-based subspace code division greedy method of claim 2, wherein the simplest column-rank ladder matrix is:
the initial coefficient of each row is positioned at the right side of the initial coefficient of the previous row; all leader coefficients are 1; all coefficients located to the left of the leader coefficient are 0; each item leader coefficient is the only nonzero element positioned in the column;
wherein the leader coefficient is the first element in a row that is not 0.
CN201910498888.9A 2019-06-11 2019-06-11 Subspace code division greedy method based on Echelon-Ferrs Expired - Fee Related CN110224790B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910498888.9A CN110224790B (en) 2019-06-11 2019-06-11 Subspace code division greedy method based on Echelon-Ferrs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910498888.9A CN110224790B (en) 2019-06-11 2019-06-11 Subspace code division greedy method based on Echelon-Ferrs

Publications (2)

Publication Number Publication Date
CN110224790A CN110224790A (en) 2019-09-10
CN110224790B true CN110224790B (en) 2022-02-15

Family

ID=67816145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910498888.9A Expired - Fee Related CN110224790B (en) 2019-06-11 2019-06-11 Subspace code division greedy method based on Echelon-Ferrs

Country Status (1)

Country Link
CN (1) CN110224790B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7340674B2 (en) * 2002-12-16 2008-03-04 Xerox Corporation Method and apparatus for normalizing quoting styles in electronic mail messages
CN105426905A (en) * 2015-11-02 2016-03-23 国网山东省电力公司电力科学研究院 Robot barrier identification method based on gradient histogram and support vector machine
CN108573262A (en) * 2018-05-08 2018-09-25 南京大学 A kind of higher-dimension sparse vector reconstructing method based on IGR_OMP
WO2019053205A1 (en) * 2017-09-15 2019-03-21 Qubeeo Ltd Processing content

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7340674B2 (en) * 2002-12-16 2008-03-04 Xerox Corporation Method and apparatus for normalizing quoting styles in electronic mail messages
CN105426905A (en) * 2015-11-02 2016-03-23 国网山东省电力公司电力科学研究院 Robot barrier identification method based on gradient histogram and support vector machine
WO2019053205A1 (en) * 2017-09-15 2019-03-21 Qubeeo Ltd Processing content
CN108573262A (en) * 2018-05-08 2018-09-25 南京大学 A kind of higher-dimension sparse vector reconstructing method based on IGR_OMP

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Error-Correcting Codes in Projective Spaces Via;Tuvi Etzion;《IEEE TRANSACTIONS ON INFORMATION THEORY》;20090616;全文 *

Also Published As

Publication number Publication date
CN110224790A (en) 2019-09-10

Similar Documents

Publication Publication Date Title
Shah et al. Interference alignment in regenerating codes for distributed storage: Necessity and code constructions
Lee et al. Coded computation for multicore setups
CN109951391B (en) Network path rapid calculation method based on multi-QoS constraint
Heide et al. A perpetual code for network coding
Tay The value of feedback in decentralized detection
CN112737596A (en) Dynamic Huffman coding method, device and equipment based on sorting network
Jiang et al. Efficient progressive edge-growth algorithm based on Chinese remainder theorem
Zhang et al. Spatially coupled split-component codes with iterative algebraic decoding
Mitra et al. Communication-efficient LDPC code design for data availability oracle in side blockchains
CN106357275B (en) Huffman compression method and device
CN110224790B (en) Subspace code division greedy method based on Echelon-Ferrs
Harutyunyan et al. On broadcasting in unicyclic graphs
Palmer et al. At most 3.55 n stable matchings
Harutyunyan et al. Linear algorithm for broadcasting in unicyclic graphs
Julé et al. Performance bounds for spatially-coupled LDPC codes over the block erasure channel
Shi et al. An improved genetic algorithm for degree constrained minimum spanning trees
Arslan et al. Cost of guessing: applications to data repair
Cheng et al. Iterative message passing algorithm for bipartite maximum weighted matching
Arbabjolfaei et al. Structural properties of index coding capacity
Rothlauf On the bias and performance of the edge-set encoding
Bayati et al. Generating random graphs with large girth
Paschos et al. Probabilistic models for the steiner tree problem
Mittelholzer et al. Symmetry-based subproduct codes
Fonseca et al. Developing redundant binary representations for genetic search
Rodriguez-Cristerna et al. A mutation-selection algorithm for the problem of minimum brauer chains

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20220215