Skip to main content

Showing 1–35 of 35 results for author: Dau, S H

  1. arXiv:2406.12160  [pdf, other

    cs.IT cs.CR

    Block Circulant Codes with Application to Decentralized Systems

    Authors: Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau

    Abstract: The structure of linear dependence relations between coded symbols of a linear code, irrespective of specific coefficients involved, is referred to as the {\em topology} of the code. The specification of coefficients is referred to as an {\em instantiation} of the topology. In this paper, we propose a new block circulant topology $T_{[μ,λ,ω]}(ρ)$ parameterized by integers $ρ\geq 2$, $ω\geq 1$,… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2405.07180  [pdf, other

    cs.IT

    Repairing Reed-Solomon Codes with Side Information

    Authors: Thi Xinh Dinh, Ba Thong Le, Son Hoang Dau, Serdar Boztas, Stanislav Kruglik, Han Mao Kiah, Emanuele Viterbo, Tuvi Etzion, Yeow Meng Chee

    Abstract: We generalize the problem of recovering a lost/erased symbol in a Reed-Solomon code to the scenario in which some side information about the lost symbol is known. The side information is represented as a set $S$ of linearly independent combinations of the sub-symbols of the lost symbol. When $S = \varnothing$, this reduces to the standard problem of repairing a single codeword symbol. When $S$ is… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    MSC Class: 94B05; 94B60 ACM Class: E.4

  3. arXiv:2405.06583  [pdf, other

    cs.IT

    Private Repair of a Single Erasure in Reed-Solomon Codes

    Authors: Stanislav Kruglik, Han Mao Kiah, Son Hoang Dau, Eitan Yaakobi

    Abstract: We investigate the problem of privately recovering a single erasure for Reed-Solomon codes with low communication bandwidths. For an $[n,k]_{q^\ell}$ code with $n-k\geq q^{m}+t-1$, we construct a repair scheme that allows a client to recover an arbitrary codeword symbol without leaking its index to any set of $t$ colluding helper nodes at a repair bandwidth of $(n-1)(\ell-m)$ sub-symbols in… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: Full version of the paper accepted for the 2024 IEEE International Symposium on Information Theory (ISIT)

  4. arXiv:2405.03614  [pdf, ps, other

    cs.IT

    Repairing with Zero Skip Cost

    Authors: Wenqin Zhang, Yeow Meng Chee, Son Hoang Dau, Tuvi Etzion, Han Mao Kiah, Yuan Luo

    Abstract: To measure repair latency at helper nodes, we introduce a new metric called skip cost that quantifies the number of contiguous sections accessed on a disk. We provide explicit constructions of zigzag codes and fractional repetition codes that incur zero skip cost

    Submitted 6 May, 2024; originally announced May 2024.

  5. arXiv:2401.16647  [pdf, other

    cs.IT math.CO

    A Family of Low-Complexity Binary Codes with Constant Hamming Weights

    Authors: Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau

    Abstract: In this paper, we focus on the design of binary constant weight codes that admit low-complexity encoding and decoding algorithms, and that have a size $M=2^k$. For every integer $\ell \geq 3$, we construct a $(n=2^\ell, M=2^{k_{\ell}}, d=2)$ constant weight code ${\cal C}[\ell]$ of weight $\ell$ by encoding information in the gaps between successive $1$'s. The code is associated with an integer se… ▽ More

    Submitted 30 June, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: Submitted to Designs, Codes and Cryptography

  6. arXiv:2310.00467  [pdf, ps, other

    cs.IT cs.DC

    New results on Erasure Combinatorial Batch Codes

    Authors: Phuc-Lu Le, Son Hoang Dau, Hy Dinh Ngo, Thuc D. Nguyen

    Abstract: We investigate in this work the problem of Erasure Combinatorial Batch Codes, in which $n$ files are stored on $m$ servers so that every set of $n-r$ servers allows a client to retrieve at most $k$ distinct files by downloading at most $t$ files from each server. Previous studies have solved this problem for the special case of $t=1$ using Combinatorial Batch Codes. We tackle the general case… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

    Comments: Allerton conference

  7. arXiv:2309.04700  [pdf, other

    cs.CR

    From Programming Bugs to Multimillion-Dollar Scams: An Analysis of Trapdoor Tokens on Decentralized Exchanges

    Authors: Phuong Duy Huynh, Thisal De Silva, Son Hoang Dau, Xiaodong Li, Iqbal Gondal, Emanuele Viterbo

    Abstract: We investigate in this work a recently emerging type of scam token called Trapdoor, which has caused the investors hundreds of millions of dollars in the period of 2020-2023. In a nutshell, by embedding logical bugs and/or owner-only features to the smart contract codes, a Trapdoor token allows users to buy but prevent them from selling. We develop the first systematic classification of Trapdoor t… ▽ More

    Submitted 21 September, 2023; v1 submitted 9 September, 2023; originally announced September 2023.

    Comments: 22 pages, 11 figures

  8. arXiv:2308.16391  [pdf, other

    cs.CR cs.CE cs.LG q-fin.ST

    Improving Robustness and Accuracy of Ponzi Scheme Detection on Ethereum Using Time-Dependent Features

    Authors: Phuong Duy Huynh, Son Hoang Dau, Xiaodong Li, Phuc Luong, Emanuele Viterbo

    Abstract: The rapid development of blockchain has led to more and more funding pouring into the cryptocurrency market, which also attracted cybercriminals' interest in recent years. The Ponzi scheme, an old-fashioned fraud, is now popular on the blockchain, causing considerable financial losses to many crypto-investors. A few Ponzi detection methods have been proposed in the literature, most of which detect… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Comments: 17 pages, 9 figures, 4 tables

  9. arXiv:2305.06600  [pdf, other

    cs.IT cs.DM

    Designing Compact Repair Groups for Reed-Solomon Codes

    Authors: Thi Xinh Dinh, Serdar Boztas, Son Hoang Dau, Emanuele Viterbo

    Abstract: Motivated by the application of Reed-Solomon codes to recently emerging decentralized storage systems such as Storj and Filebase/Sia, we study the problem of designing compact repair groups for recovering multiple failures in a decentralized manner. Here, compactness means that the corresponding trace repair schemes of these groups of helpers can be generated from a single or a few seed repair sch… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  10. arXiv:2302.02230  [pdf, ps, other

    cs.IT cs.CR

    $k$-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size

    Authors: Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang

    Abstract: We consider the problem of designing a Private Information Retrieval (PIR) scheme on $m$ files replicated on $k$ servers that can collude or, even worse, can return incorrect answers. Our goal is to correctly retrieve a specific message while keeping its identity private from the database servers. We consider the asymptotic information-theoretic capacity of this problem defined as the maximum rati… ▽ More

    Submitted 5 May, 2023; v1 submitted 4 February, 2023; originally announced February 2023.

    Comments: Accepted to IEEE International Symposium on Information Theory 2023

  11. arXiv:2302.01733  [pdf, other

    cs.CR cs.DB cs.IR

    Committed Private Information Retrieval

    Authors: Quang Cao, Hong Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah

    Abstract: A private information retrieval (PIR) scheme allows a client to retrieve a data item $x_i$ among $n$ items $x_1,x_2,\ldots,x_n$ from $k$ servers, without revealing what $i$ is even when $t < k$ servers collude and try to learn $i$. Such a PIR scheme is said to be $t$-private. A PIR scheme is $v$-verifiable if the client can verify the correctness of the retrieved $x_i$ even when $v \leq k$ servers… ▽ More

    Submitted 25 September, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: Accepted at ESORICS 2023

  12. arXiv:2301.11730  [pdf, ps, other

    cs.IT cs.CR

    Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification

    Authors: Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang

    Abstract: Private Information Retrieval (PIR) schemes allow a client to retrieve any file of interest, while hiding the file identity from the database servers. In contrast to most existing PIR schemes that assume honest-but-curious servers, we study the case of dishonest servers. The latter provide incorrect answers and try to persuade the client to output the wrong result. We introduce several PIR schemes… ▽ More

    Submitted 8 June, 2023; v1 submitted 27 January, 2023; originally announced January 2023.

    Comments: Accepted to IEEE International Symposium on Information Theory 2023

  13. arXiv:2210.06042  [pdf, ps, other

    cs.IT

    Efficient Hamiltonian Reduction for Quantum Annealing on SatCom Beam Placement Problem

    Authors: Thinh Q. Dinh, Son Hoang Dau, Eva Lagunas, Symeon Chatzinotas

    Abstract: Beam Placement (BP) is a well-known problem in Low-Earth Orbit (LEO) satellite communication (SatCom) systems, which can be modelled as an NP-hard clique cover problem. Recently, quantum computing has emerged as a novel technology which revolutionizes how to solve challenging optimization problems by formulating Quadratic Unconstrained Binary Optimization (QUBO), then preparing Hamiltonians as inp… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

  14. arXiv:2205.11015  [pdf, other

    cs.IT

    Practical Considerations in Repairing Reed-Solomon Codes

    Authors: Thi Xinh Dinh, Luu Y Nhi Nguyen, Lakshmi J. Mohan, Serdar Boztas, Tran Thi Luong, Son Hoang Dau

    Abstract: The issue of repairing Reed-Solomon codes currently employed in industry has been sporadically discussed in the literature. In this work we carry out a systematic study of these codes and investigate important aspects of repairing them under the trace repair framework, including which evaluation points to select and how to implement a trace repair scheme efficiently. In particular, we employ diffe… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: 6 pages, accepted to the IEEE International Symposium on Information Theory

    MSC Class: 94B05; 94B60 ACM Class: E.4

  15. arXiv:2205.05211  [pdf, other

    cs.DS cs.CR math.CO

    TreePIR: Efficient Private Retrieval of Merkle Proofs via Tree Colorings with Fast Indexing and Zero Storage Overhead

    Authors: Son Hoang Dau, Quang Cao, Rinaldo Gagiano, Duy Huynh, Xun Yi, Phuc Lu Le, Quang-Hung Luu, Emanuele Viterbo, Yu-Chih Huang, Jingge Zhu, Mohammad M. Jalalzai, Chen Feng

    Abstract: A Batch Private Information Retrieval (batch-PIR) scheme allows a client to retrieve multiple data items from a database without revealing them to the storage server(s). Most existing approaches for batch-PIR are based on batch codes, in particular, probabilistic batch codes (PBC) (Angel et al. S&P'18), which incur large storage overheads. In this work, we show that \textit{zero} storage overhead… ▽ More

    Submitted 4 June, 2024; v1 submitted 10 May, 2022; originally announced May 2022.

    Comments: 25 pages

    MSC Class: 05C05; 05C15; 05C85; 05C90; ACM Class: G.2.2; F.2.0; E.1

  16. arXiv:2111.08843  [pdf, ps, other

    cs.IT

    On the Formation of Min-weight Codewords of Polar/PAC Codes and Its Applications

    Authors: Mohammad Rowshan, Son Hoang Dau, Emanuele Viterbo

    Abstract: Minimum weight codewords play a crucial role in the error correction performance of a linear block code. In this work, we establish an explicit construction for these codewords of polar codes as a sum of the generator matrix rows, which can then be used as a foundation for two applications. In the first application, we obtain a lower bound for the number of minimum-weight codewords (a.k.a. the err… ▽ More

    Submitted 20 September, 2023; v1 submitted 16 November, 2021; originally announced November 2021.

    Comments: Accepted in IEEE Trans. Inf. Theory, 23 pages, 13 figures, 6 tables, 3 listings

  17. arXiv:1506.02349  [pdf, ps, other

    cs.IT

    Local Codes with Addition Based Repair

    Authors: Han Mao Kiah, Son Hoang Dau, Wentu Song, Chau Yuen

    Abstract: We consider the complexities of repair algorithms for locally repairable codes and propose a class of codes that repair single node failures using addition operations only, or codes with addition based repair. We construct two families of codes with addition based repair. The first family attains distance one less than the Singleton-like upper bound, while the second family attains the Singleton-l… ▽ More

    Submitted 8 June, 2015; originally announced June 2015.

  18. arXiv:1504.05662  [pdf, other

    cs.IT math.CO

    Weakly Secure MDS Codes for Simple Multiple Access Networks

    Authors: Son Hoang Dau, Wentu Song, Chau Yuen

    Abstract: We consider a simple multiple access network (SMAN), where $k$ sources of unit rates transmit their data to a common sink via $n$ relays. Each relay is connected to the sink and to certain sources. A coding scheme (for the relays) is weakly secure if a passive adversary who eavesdrops on less than $k$ relay-sink links cannot reconstruct the data from each source. We show that there exists a weakly… ▽ More

    Submitted 22 April, 2015; originally announced April 2015.

    Comments: Accepted at ISIT'15

  19. arXiv:1504.04926  [pdf, other

    cs.IT math.CO

    Locally Encodable and Decodable Codes for Distributed Storage Systems

    Authors: Son Hoang Dau, Han Mao Kiah, Wentu Song, Chau Yuen

    Abstract: We consider the locality of encoding and decoding operations in distributed storage systems (DSS), and propose a new class of codes, called locally encodable and decodable codes (LEDC), that provides a higher degree of operational locality compared to currently known codes. For a given locality structure, we derive an upper bound on the global distance and demonstrate the existence of an optimal L… ▽ More

    Submitted 19 April, 2015; originally announced April 2015.

    Comments: 7 pages

  20. arXiv:1502.00842  [pdf, ps, other

    cs.IT

    Erasure codes with symbol locality and group decodability for distributed storage

    Authors: Wentu Song, Son Hoang Dau, Chau Yuen

    Abstract: We introduce a new family of erasure codes, called group decodable code (GDC), for distributed storage system. Given a set of design parameters {α; β; k; t}, where k is the number of information symbols, each codeword of an (α; β; k; t)-group decodable code is a t-tuple of strings, called buckets, such that each bucket is a string of βsymbols that is a codeword of a [β; α] MDS code (which is encod… ▽ More

    Submitted 28 July, 2015; v1 submitted 3 February, 2015; originally announced February 2015.

    Comments: 9 pages

  21. arXiv:1410.3214  [pdf, other

    cs.IT

    Secure Erasure Codes With Partial Decodability

    Authors: Son Hoang Dau, Wentu Song, Chau Yuen

    Abstract: The MDS property (aka the $k$-out-of-$n$ property) requires that if a file is split into several symbols and subsequently encoded into $n$ coded symbols, each being stored in one storage node of a distributed storage system (DSS), then an user can recover the file by accessing any $k$ nodes. We study the so-called $p$-decodable $μ$-secure erasure coding scheme… ▽ More

    Submitted 13 October, 2014; originally announced October 2014.

    Comments: 11 pages

  22. arXiv:1401.3807  [pdf, other

    cs.IT cs.DM

    On the Existence of MDS Codes Over Small Fields With Constrained Generator Matrices

    Authors: Son Hoang Dau, Wentu Song, Chau Yuen

    Abstract: We study the existence over small fields of Maximum Distance Separable (MDS) codes with generator matrices having specified supports (i.e. having specified locations of zero entries). This problem unifies and simplifies the problems posed in recent works of Yan and Sprintson (NetCod'13) on weakly secure cooperative data exchange, of Halbawi et al. (arxiv'13) on distributed Reed-Solomon codes for s… ▽ More

    Submitted 15 January, 2014; originally announced January 2014.

    Comments: 8 pages

  23. arXiv:1309.2712  [pdf, other

    cs.IT math.CO

    On Block Security of Regenerating Codes at the MBR Point for Distributed Storage Systems

    Authors: Son Hoang Dau, Wentu Song, Chau Yuen

    Abstract: A passive adversary can eavesdrop stored content or downloaded content of some storage nodes, in order to learn illegally about the file stored across a distributed storage system (DSS). Previous work in the literature focuses on code constructions that trade storage capacity for perfect security. In other words, by decreasing the amount of original data that it can store, the system can guarantee… ▽ More

    Submitted 18 February, 2014; v1 submitted 10 September, 2013; originally announced September 2013.

    Comments: 12 pages

  24. arXiv:1307.1961  [pdf, ps, other

    cs.IT

    Optimal Locally Repairable Linear Codes

    Authors: Wentu Song, Son Hoang Dau, Chau Yuen, Tiffany Jing Li

    Abstract: Linear erasure codes with local repairability are desirable for distributed data storage systems. An [n, k, d] code having all-symbol (r, δ})-locality, denoted as (r, δ)a, is considered optimal if it also meets the minimum Hamming distance bound. The existing results on the existence and the construction of optimal (r, δ)a codes are limited to only the special case of δ = 2, and to only two small… ▽ More

    Submitted 8 July, 2013; originally announced July 2013.

    Comments: Under Review

  25. arXiv:1304.6832  [pdf, other

    math.CO cs.DM cs.DS

    Polynomial Time Algorithm for Min-Ranks of Graphs with Simple Tree Structures

    Authors: Son Hoang Dau, Yeow Meng Chee

    Abstract: The min-rank of a graph was introduced by Haemers (1978) to bound the Shannon capacity of a graph. This parameter of a graph has recently gained much more attention from the research community after the work of Bar-Yossef et al. (2006). In their paper, it was shown that the min-rank of a graph G characterizes the optimal scalar linear solution of an instance of the Index Coding with Side Informati… ▽ More

    Submitted 25 April, 2013; originally announced April 2013.

    Comments: Accepted by Algorithmica, 30 pages

  26. arXiv:1301.6433  [pdf, ps, other

    cs.IT math.CO

    Delay Minimization in Varying-Bandwidth Direct Multicast with Side Information

    Authors: Son Hoang Dau, Zheng Dong, Chau Yuen, Terence H. Chan

    Abstract: We study the delay minimization in a direct multicast communication scheme where a base station wishes to transmit a set of original packets to a group of clients. Each of the clients already has in its cache a subset of the original packets, and requests for all the remaining packets. The base station communicates directly with the clients by broadcasting information to them. Assume that bandwidt… ▽ More

    Submitted 27 January, 2013; originally announced January 2013.

    Comments: 5 pages

  27. arXiv:1301.5108  [pdf, ps, other

    cs.IT

    Balanced Sparsest Generator Matrices for MDS Codes

    Authors: Son Hoang Dau, Wentu Song, Zheng Dong, Chau Yuen

    Abstract: We show that given $n$ and $k$, for $q$ sufficiently large, there always exists an $[n, k]_q$ MDS code that has a generator matrix $G$ satisfying the following two conditions: (C1) Sparsest: each row of $G$ has Hamming weight $n - k + 1$; (C2) Balanced: Hamming weights of the columns of $G$ differ from each other by at most one.

    Submitted 22 January, 2013; originally announced January 2013.

    Comments: 5 pages

  28. arXiv:1209.6152  [pdf, ps, other

    cs.IT

    Parity Declustering for Fault-Tolerant Storage Systems via $t$-designs

    Authors: Son Hoang Dau, Yan Jia, Chao Jin, Weiya Xi, Kheong Sann Chan

    Abstract: Parity declustering allows faster reconstruction of a disk array when some disk fails. Moreover, it guarantees uniform reconstruction workload on all surviving disks. It has been shown that parity declustering for one-failure tolerant array codes can be obtained via Balanced Incomplete Block Designs. We extend this technique for array codes that can tolerate an arbitrary number of disk failures vi… ▽ More

    Submitted 15 March, 2013; v1 submitted 27 September, 2012; originally announced September 2012.

    Comments: 13 pages

  29. arXiv:1202.1150  [pdf, ps, other

    cs.IT

    Optimal Index Codes with Near-Extreme Rates

    Authors: Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee

    Abstract: The min-rank of a digraph was shown by Bar-Yossef et al. (2006) to represent the length of an optimal scalar linear solution of the corresponding instance of the Index Coding with Side Information (ICSI) problem. In this work, the graphs and digraphs of near-extreme min-ranks are characterized. Those graphs and digraphs correspond to the ICSI instances having near-extreme transmission rates when u… ▽ More

    Submitted 18 March, 2013; v1 submitted 6 February, 2012; originally announced February 2012.

    Comments: 15 pages, submitted to IEEE Transactions on Information Theory

  30. arXiv:1105.2865  [pdf, ps, other

    cs.IT

    Error Correction for Index Coding with Side Information

    Authors: Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee

    Abstract: A problem of index coding with side information was first considered by Y. Birk and T. Kol (IEEE INFOCOM, 1998). In the present work, a generalization of index coding scheme, where transmitted symbols are subject to errors, is studied. Error-correcting methods for such a scheme, and their parameters, are investigated. In particular, the following question is discussed: given the side information h… ▽ More

    Submitted 14 May, 2011; originally announced May 2011.

    Comments: 14 pages

  31. arXiv:1102.2797  [pdf, ps, other

    cs.IT

    On the Security of Index Coding with Side Information

    Authors: Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee

    Abstract: Security aspects of the Index Coding with Side Information (ICSI) problem are investigated. Building on the results of Bar-Yossef et al. (2006), the properties of linear index codes are further explored. The notion of weak security, considered by Bhattad and Narayanan (2005) in the context of network coding, is generalized to block security. It is shown that the linear index code based on a matrix… ▽ More

    Submitted 14 February, 2011; originally announced February 2011.

    Comments: 14 pages

  32. arXiv:1101.2728  [pdf, ps, other

    cs.IT

    Index Coding and Error Correction

    Authors: Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee

    Abstract: A problem of index coding with side information was first considered by Y. Birk and T. Kol (IEEE INFOCOM, 1998). In the present work, a generalization of index coding scheme, where transmitted symbols are subject to errors, is studied. Error-correcting methods for such a scheme, and their parameters, are investigated. In particular, the following question is discussed: given the side information h… ▽ More

    Submitted 14 January, 2011; originally announced January 2011.

    Comments: 5 pages, submitted

  33. arXiv:1011.5566  [pdf, other

    cs.IT cs.CR cs.NI

    Secure Index Coding with Side Information

    Authors: Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee

    Abstract: Security aspects of the Index Coding with Side Information (ICSI) problem are investigated. Building on the results of Bar-Yossef et al. (2006), the properties of linear coding schemes for the ICSI problem are further explored. The notion of weak security, considered by Bhattad and Narayanan (2005) in the context of network coding, is generalized to block security. It is shown that the coding sche… ▽ More

    Submitted 25 November, 2010; originally announced November 2010.

    Comments: 8 pages

  34. arXiv:1008.1611  [pdf, ps, other

    cs.IT cs.DM math.CO

    Linear Size Optimal q-ary Constant-Weight Codes and Constant-Composition Codes

    Authors: Yeow Meng Chee, Son Hoang Dau, Alan C. H. Ling, San Ling

    Abstract: An optimal constant-composition or constant-weight code of weight $w$ has linear size if and only if its distance $d$ is at least $2w-1$. When $d\geq 2w$, the determination of the exact size of such a constant-composition or constant-weight code is trivial, but the case of $d=2w-1$ has been solved previously only for binary and ternary constant-composition and constant-weight codes, and for some s… ▽ More

    Submitted 9 August, 2010; originally announced August 2010.

    Comments: 12 pages

    Journal ref: IEEE Transactions on Information Theory, vol. 56, no. 1, pp. 140-151, 2010

  35. arXiv:0803.3658  [pdf

    cs.IT cs.DM math.CO

    The Sizes of Optimal q-Ary Codes of Weight Three and Distance Four: A Complete Solution

    Authors: Yeow Meng Chee, Son Hoang Dau, Alan C. H. Ling, San Ling

    Abstract: This correspondence introduces two new constructive techniques to complete the determination of the sizes of optimal q-ary codes of constant weight three and distance four.

    Submitted 25 March, 2008; originally announced March 2008.

    Comments: 5 pages

    Journal ref: IEEE Transactions on Information Theory, vol. 54, no. 3, pp. 1291-1295, 2008