Skip to main content

Showing 1–40 of 40 results for author: Polyanskii, N

  1. arXiv:2401.16540  [pdf, ps, other

    cs.IT

    Efficient Combinatorial Group Testing: Bridging the Gap between Union-Free and Disjunctive Codes

    Authors: Daniil Goshkoder, Nikita Polyanskii, Ilya Vorobyev

    Abstract: This work focuses on non-adaptive group testing, with a primary goal of efficiently identifying a set of at most $d$ defective elements among a given set of elements using the fewest possible number of tests. Non-adaptive combinatorial group testing often employs disjunctive codes and union-free codes. This paper discusses union-free codes with fast decoding (UFFD codes), a recently introduced cla… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  2. arXiv:2310.09613  [pdf, ps, other

    cs.IT cs.DM

    Combinatorial Group Testing in Presence of Deletions

    Authors: Venkata Gandikota, Nikita Polyanskii, Haodong Yang

    Abstract: The study in group testing aims to develop strategies to identify a small set of defective items among a large population using a few pooled tests. The established techniques have been highly beneficial in a broad spectrum of applications ranging from channel communication to identifying COVID-19-infected individuals efficiently. Despite significant research on group testing and its variants since… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: 14 pages, no figures, 6 Algorithms

  3. arXiv:2308.04831  [pdf, ps, other

    cs.CR cs.DC

    Fairness Notions in DAG-based DLTs

    Authors: Mayank Raikwar, Nikita Polyanskii, Sebastian Müller

    Abstract: This paper investigates the issue of fairness in Distributed Ledger Technology (DLT), specifically focusing on the shortcomings observed in current blockchain systems due to Miner Extractable Value (MEV) phenomena and systemic centralization. We explore the potential of Directed Acyclic Graphs (DAGs) as a solution to address or mitigate these fairness concerns. Our objective is to gain a comprehen… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: 8 Pages, Accepted in 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS 2023)

  4. arXiv:2304.12399  [pdf, other

    cs.IT

    Codes Correcting a Single Long Duplication Error

    Authors: Daniil Goshkoder, Nikita Polyanskii, Ilya Vorobyev

    Abstract: We consider the problem of constructing a code capable of correcting a single long tandem duplication error of variable length. As the main contribution of this paper, we present a $q$-ary efficiently encodable code of length $n+1$ and redundancy $1$ that can correct a single duplication of length at least $K=4\cdot\lceil \log_q n\rceil +1$. The complexity of encoding is $O(\frac{n^2}{\log n})$ an… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

  5. arXiv:2206.10735  [pdf, ps, other

    cs.IT

    Signature Codes for a Noisy Adder Multiple Access Channel

    Authors: Gökberk Erdoğan, Georg Maringer, Nikita Polyanskii

    Abstract: In this work, we consider $q$-ary signature codes of length $k$ and size $n$ for a noisy adder multiple access channel. A signature code in this model has the property that any subset of codewords can be uniquely reconstructed based on any vector that is obtained from the sum (over integers) of these codewords. We show that there exists an algorithm to construct a signature code of length… ▽ More

    Submitted 23 July, 2022; v1 submitted 21 June, 2022; originally announced June 2022.

    Comments: 12 pages, 0 figures, submitted to 2022 IEEE Information Theory Workshop

  6. Tangle 2.0 Leaderless Nakamoto Consensus on the Heaviest DAG

    Authors: Sebastian Müller, Andreas Penzkofer, Nikita Polyanskii, Jonas Theis, William Sanders, Hans Moog

    Abstract: We introduce the theoretical foundations of the Tangle 2.0, a probabilistic leaderless consensus protocol based on a directed acyclic graph (DAG) called the Tangle. The Tangle naturally succeeds the blockchain as its next evolutionary step as it offers features suited to establish more efficient and scalable distributed ledger solutions. Consensus is no longer found in the longest chain but on t… ▽ More

    Submitted 12 October, 2022; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: revised version, to appear in IEEE Access

  7. arXiv:2205.01345  [pdf, other

    cs.DC

    Reality-based UTXO Ledger

    Authors: Sebastian Müller, Andreas Penzkofer, Nikita Polyanskii, Jonas Theis, William Sanders, Hans Moog

    Abstract: The Unspent Transaction Output (UTXO) model is commonly used in the field of Distributed Ledger Technology (DLT) to transfer value between participants. One of its advantages is that it allows parallel processing of transactions, as independent transactions can be added in any order. This property of order invariance and parallelisability has potential benefits in terms of scalability. However, si… ▽ More

    Submitted 7 August, 2023; v1 submitted 3 May, 2022; originally announced May 2022.

    Comments: revised version, accepted in ACM DLT

  8. arXiv:2110.02008  [pdf, ps, other

    cs.IT

    Lifted Reed-Solomon Codes and Lifted Multiplicity Codes

    Authors: Lukas Holzbaur, Rina Polyanskaya, Nikita Polyanskii, Ilya Vorobyev, Eitan Yaakobi

    Abstract: Lifted Reed-Solomon and multiplicity codes are classes of codes, constructed from specific sets of $m$-variate polynomials. These codes allow for the design of high-rate codes that can recover every codeword or information symbol from many disjoint sets. Recently, the underlying approaches have been combined for the bi-variate case to construct lifted multiplicity codes, a generalization of lifted… ▽ More

    Submitted 11 October, 2021; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: The results on lifted RS codes have partially been presented at the IEEE International Symposium on Information Theory (ISIT) 2020 (arXiv:2001.11981) and parts of the results on lifted multiplicity codes have been presented at the IEEE Information Theory Workshop (ITW) 2020 (arXiv:2008.04717)

  9. arXiv:2109.14478  [pdf, ps, other

    cs.IT math.AG

    Quadratic-Curve-Lifted Reed-Solomon Codes

    Authors: Hedongliang Liu, Lukas Holzbaur, Nikita Polyanskii, Sven Puchinger, Antonia Wachter-Zeh

    Abstract: Lifted codes are a class of evaluation codes attracting more attention due to good locality and intermediate availability. In this work we introduce and study quadratic-curve-lifted Reed-Solomon (QC-LRS) codes, where the codeword symbols whose coordinates are on a quadratic curve form a codeword of a Reed-Solomon code. We first develop a necessary and sufficient condition on the monomials which fo… ▽ More

    Submitted 18 February, 2022; v1 submitted 29 September, 2021; originally announced September 2021.

    Comments: 16 pages, 2 figures. A short version is accepted by WCC 2022 (12th International Workshop on Coding and Cryptography)

  10. arXiv:2105.02298  [pdf, ps, other

    cs.IT

    Optimal Codes Correcting Localized Deletions

    Authors: Rawad Bitar, Serge Kas Hanna, Nikita Polyanskii, Ilya Vorobyev

    Abstract: We consider the problem of constructing codes that can correct deletions that are localized within a certain part of the codeword that is unknown a priori. Namely, the model that we study is when at most $k$ deletions occur in a window of size $k$, where the positions of the deletions within this window are not necessarily consecutive. Localized deletions are thus a generalization of burst deletio… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: 10 pages, a full version of the paper accepted to 2021 IEEE ISIT

  11. arXiv:2105.01427  [pdf, ps, other

    cs.IT cs.CC math.CO

    Codes for the Z-channel

    Authors: Nikita Polyanskii, Yihan Zhang

    Abstract: This paper is a collection of results on combinatorial properties of codes for the Z-channel. A Z-channel with error fraction $τ$ takes as input a length-$n$ binary codeword and injects in an adversarial manner up to $nτ$ asymmetric errors, i.e., errors that only zero out bits but do not flip $0$'s to $1$'s. It is known that the largest $(L-1)$-list-decodable code for the Z-channel with error frac… ▽ More

    Submitted 2 July, 2023; v1 submitted 4 May, 2021; originally announced May 2021.

  12. On Codes for the Noisy Substring Channel

    Authors: Yonatan Yehezkeally, Nikita Polyanskii

    Abstract: We consider the problem of coding for the substring channel, in which information strings are observed only through their (multisets of) substrings. Due to existing DNA sequencing techniques and applications in DNA-based storage systems, interest in this channel has renewed in recent years. In contrast to existing literature, we consider a noisy channel model where information is subject to noise… ▽ More

    Submitted 26 March, 2024; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: Author submitted, peer-reviewed, version

  13. Two-stage coding over the Z-channel

    Authors: Alexey Lebedev, Vladimir Lebedev, Nikita Polyanskii

    Abstract: In this paper, we discuss two-stage encoding algorithms capable of correcting a fraction of asymmetric errors. Suppose that the encoder transmits $n$ binary symbols $(x_1,\ldots,x_n)$ one-by-one over the Z-channel, in which a 1 is received only if a 1 is transmitted. At some designated moment, say $n_1$, the encoder uses noiseless feedback and adjusts further encoding strategy based on the partial… ▽ More

    Submitted 10 January, 2022; v1 submitted 30 October, 2020; originally announced October 2020.

    Comments: ten pages, two columns, three figures, one table, published in IEEE Transactions on Information Theory

  14. Feedback Insertion-Deletion Codes

    Authors: Georg Maringer, Nikita Polyanskii, Ilya Vorobyev, Lorenz Welter

    Abstract: In this paper, a new problem of transmitting information over the adversarial insertion-deletion channel with feedback is introduced. Suppose that the encoder transmits $n$ binary symbols one-by-one over a channel, in which some symbols can be deleted and some additional symbols can be inserted. After each transmission, the encoder is notified about the insertions or deletions that have occurred w… ▽ More

    Submitted 10 January, 2022; v1 submitted 29 October, 2020; originally announced October 2020.

    Comments: 33 pages, 8 figures

  15. arXiv:2010.10433  [pdf, ps, other

    cs.IT

    Decoding of Lifted Affine-Invariant Codes

    Authors: Lukas Holzbaur, Nikita Polyanskii

    Abstract: Lifted Reed-Solomon codes, a subclass of lifted affine-invariant codes, have been shown to be of high rate while preserving locality properties similar to generalized Reed-Muller codes, which they contain as subcodes. This work introduces a simple bounded distance decoder for (subcodes of) lifted affine-invariant codes that is guaranteed to decode up to almost half of their minimum distance. Furth… ▽ More

    Submitted 21 April, 2021; v1 submitted 20 October, 2020; originally announced October 2020.

    Comments: This updated version fixes some minor typos and inaccuracies

  16. arXiv:2008.04717  [pdf, ps, other

    cs.IT cs.DM

    Lifted Multiplicity Codes

    Authors: Lukas Holzbaur, Rina Polyanskaya, Nikita Polyanskii, Ilya Vorobyev, Eitan Yaakobi

    Abstract: Lifted Reed-Solomon codes and multiplicity codes are two classes of evaluation codes that allow for the design of high-rate codes that can recover every codeword or information symbol from many disjoint sets. Recently, the underlying approaches have been combined to construct lifted bi-variate multiplicity codes, that can further improve on the rate. We continue the study of these codes by providi… ▽ More

    Submitted 29 October, 2020; v1 submitted 11 August, 2020; originally announced August 2020.

  17. arXiv:2007.04026  [pdf, ps, other

    cs.IT

    Coding with Noiseless Feedback over the Z-channel

    Authors: Christian Deppe, Vladimir Lebedev, Georg Maringer, Nikita Polyanskii

    Abstract: In this paper, we consider encoding strategies for the Z-channel with noiseless feedback. We analyze the combinatorial setting where the maximum number of errors inflicted by an adversary is proportional to the number of transmissions, which goes to infinity. Without feedback, it is known that the rate of optimal asymmetric-error-correcting codes for the error fraction $τ\ge 1/4$ vanishes as the b… ▽ More

    Submitted 9 February, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

    Comments: 12 pages, 5 figures

  18. Almost Affinely Disjoint Subspaces

    Authors: Hedongliang Liu, Nikita Polyanskii, Ilya Vorobyev, Antonia Wachter-Zeh

    Abstract: In this work, we introduce a natural notion concerning finite vector spaces. A family of $k$-dimensional subspaces of $\mathbb{F}_q^n$, which forms a partial spread, is called almost affinely disjoint if any $(k+1)$-dimensional subspace containing a subspace from the family non-trivially intersects with only a few subspaces from the family. The central question discussed in the paper is the polyno… ▽ More

    Submitted 27 June, 2021; v1 submitted 3 July, 2020; originally announced July 2020.

    Comments: 10 pages; Published in Finite Fields and Their Applications, Volume 75, October 2021, 101879

    Journal ref: Finite Fields and Their Applications, Volume 75, October 2021, 101879

  19. arXiv:2006.11516  [pdf, ps, other

    cs.IT

    Systematic Single-Deletion Multiple-Substitution Correcting Codes

    Authors: Wentu Song, Nikita Polyanskii, Kui Cai, Xuan He

    Abstract: Recent work by Smagloy et al. (ISIT 2020) shows that the redundancy of a single-deletion $s$-substitution correcting code is asymptotically at least $(s+1)\log n+o(\log n)$, where $n$ is the length of the codes. They also provide a construction of single-deletion and single-substitution codes with redundancy $6\log n+8$. In this paper, we propose a family of systematic single-deletion $s$-substitu… ▽ More

    Submitted 20 November, 2020; v1 submitted 20 June, 2020; originally announced June 2020.

  20. arXiv:2001.11981  [pdf, ps, other

    cs.IT

    Lifted Reed-Solomon Codes with Application to Batch Codes

    Authors: Lukas Holzbaur, Rina Polyanskaya, Nikita Polyanskii, Ilya Vorobyev

    Abstract: Guo, Kopparty and Sudan have initiated the study of error-correcting codes derived by lifting of affine-invariant codes. Lifted Reed-Solomon (RS) codes are defined as the evaluation of polynomials in a vector space over a field by requiring their restriction to every line in the space to be a codeword of the RS code. In this paper, we investigate lifted RS codes and discuss their application to ba… ▽ More

    Submitted 4 February, 2020; v1 submitted 31 January, 2020; originally announced January 2020.

    Comments: 7 pages, 1 figure, a short version was submitted to ISIT 2020

  21. arXiv:2001.06641  [pdf, ps, other

    cs.IT

    Optimal Codes Correcting a Burst of Deletions of Variable Length

    Authors: Andreas Lenz, Nikita Polyanskii

    Abstract: In this paper, we present an efficiently encodable and decodable code construction that is capable of correction a burst of deletions of length at most $k$. The redundancy of this code is $\log n + k(k+1)/2\log \log n+c_k$ for some constant $c_k$ that only depends on $k$ and thus is scaling-optimal. The code can be split into two main components. First, we impose a constraint that allows to locate… ▽ More

    Submitted 18 January, 2020; originally announced January 2020.

    Comments: 6 pages

  22. arXiv:2001.06242  [pdf, ps, other

    cs.IT

    Duplication with transposition distance to the root for $q$-ary strings

    Authors: Nikita Polyanskii, Ilya Vorobyev

    Abstract: We study the duplication with transposition distance between strings of length $n$ over a $q$-ary alphabet and their roots. In other words, we investigate the number of duplication operations of the form $x = (abcd) \to y = (abcbd)$, where $x$ and $y$ are strings and $a$, $b$, $c$ and $d$ are their substrings, needed to get a $q$-ary string of length $n$ starting from the set of strings without du… ▽ More

    Submitted 17 January, 2020; originally announced January 2020.

    Comments: 6 pages, 1 table, submitted to International Symposium on Information Theory (ISIT) 2020

  23. Weight Distributions for Successive Cancellation Decoding of Polar Codes

    Authors: Rina Polyanskaya, Mars Davletshin, Nikita Polyanskii

    Abstract: In this paper, we derive the exact weight distributions that emerge during each stage of successive cancellation decoding of polar codes. Though we do not compute the distance spectrum of polar codes, the results allow us to get an estimate of the decoding error probability and to show a link between the first nonzero components of the weight distribution and the partial order between the syntheti… ▽ More

    Submitted 11 September, 2020; v1 submitted 19 August, 2019; originally announced August 2019.

    Comments: 15 pages, 2 figures, 2 tables

  24. arXiv:1901.06741  [pdf, ps, other

    cs.IT math.CO

    Constructions of Batch Codes via Finite Geometry

    Authors: Nikita Polyanskii, Ilya Vorobyev

    Abstract: A primitive $k$-batch code encodes a string $x$ of length $n$ into string $y$ of length $N$, such that each multiset of $k$ symbols from $x$ has $k$ mutually disjoint recovering sets from $y$. We develop new explicit and random coding constructions of linear primitive batch codes based on finite geometry. In some parameter regimes, our proposed codes have lower redundancy than previously known bat… ▽ More

    Submitted 20 January, 2019; originally announced January 2019.

    Comments: 7 pages, 1 figure, 1 table

  25. On capacities of the two-user union channel with complete feedback

    Authors: Zilin Jiang, Nikita Polyanskii, Ilya Vorobyev

    Abstract: The exact values of the optimal symmetric rate point in the Cover--Leung capacity region of the two-user union channel with complete feedback were determined by Willems when the size of the input alphabet is 2, and by Vinck, Hoeks and Post when the size is at least 6. We complete this line of research when the size of the input alphabet is 3, 4 or 5. The proof hinges on the technical lemma that co… ▽ More

    Submitted 5 December, 2018; v1 submitted 23 April, 2018; originally announced April 2018.

    Comments: 16 pages, 1 figure, 1 table, accepted to IEEE Trans. Inf. Theory, corrections suggested by the referees have been incorporated

    MSC Class: 94A40; 94A24; 94A17

    Journal ref: IEEE Transactions on Information Theory, vol. 65, no. 5, pp. 2774-2781, May 2019

  26. arXiv:1712.02723  [pdf, ps, other

    math.CO cs.DM cs.IT

    On the metric dimension of Cartesian powers of a graph

    Authors: Zilin Jiang, Nikita Polyanskii

    Abstract: A set of vertices $S$ resolves a graph if every vertex is uniquely determined by its vector of distances to the vertices in $S$. The metric dimension of a graph is the minimum cardinality of a resolving set of the graph. Fix a connected graph $G$ on $q \ge 2$ vertices, and let $M$ be the distance matrix of $G$. We prove that if there exists $w \in \mathbb{Z}^q$ such that $\sum_i w_i = 0$ and the v… ▽ More

    Submitted 15 January, 2019; v1 submitted 7 December, 2017; originally announced December 2017.

    Comments: 12 pages, 1 figure, 1 table, accepted to J. Comb. Theory A, corrections suggested by the referees have been incorporated

    MSC Class: 05C12; 05C76; 06A07

    Journal ref: Journal of Combinatorial Theory, Series A, Volume 165, 2019, Pages 1-14

  27. arXiv:1701.07521  [pdf, other

    cs.IT

    Floor Scale Modulo Lifting for QC-LDPC codes

    Authors: Nikita Polyanskii, Vasiliy Usatyuk, Ilya Vorobyev

    Abstract: In the given paper we present a novel approach for constructing a QC-LDPC code of smaller length by lifting a given QC-LDPC code. The proposed method can be considered as a generalization of floor lifting. Also we prove several probabilistic statements concerning a theoretical improvement of the method with respect to the number of small cycles. Making some offline calculation of scale parameter i… ▽ More

    Submitted 4 February, 2017; v1 submitted 25 January, 2017; originally announced January 2017.

    Comments: 7 pages, 2 columns

  28. arXiv:1701.06201  [pdf, other

    cs.IT

    Hypothesis Test for Bounds on the Size of Random Defective Set

    Authors: A. G. D'yachkov, N. A. Polyanskii, V. Yu. Shchukin, I. V. Vorobyev

    Abstract: The conventional model of disjunctive group testing assumes that there are several defective elements (or defectives) among a large population, and a group test yields the positive response if and only if the testing group contains at least one defective element. The basic problem is to find all defectives using a minimal possible number of group tests. However, when the number of defectives is un… ▽ More

    Submitted 19 August, 2019; v1 submitted 22 January, 2017; originally announced January 2017.

    Comments: 10 pages, 3 figures

  29. arXiv:1701.06085  [pdf, other

    cs.IT

    Separable Codes for the Symmetric Multiple-Access Channel

    Authors: A. G. Dyachkov, N. Polyanskii, V. Shchukin, I. Vorobyev

    Abstract: A binary matrix is called an s-separable code for the disjunctive multiple-access channel (disj-MAC) if Boolean sums of sets of s columns are all distinct. The well-known issue of the combinatorial coding theory is to obtain upper and lower bounds on the rate of s-separable codes for disj-MAC. In our paper, we generalize the problem and discuss upper and lower bounds on the rate of q-ary s-separab… ▽ More

    Submitted 2 August, 2018; v1 submitted 21 January, 2017; originally announced January 2017.

    Comments: 15 pages

  30. arXiv:1607.00511  [pdf, ps, other

    cs.IT

    On a Hypergraph Approach to Multistage Group Testing Problems

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Group testing is a well known search problem that consists in detecting up to $s$ defective elements of the set $[t]=\{1,\ldots,t\}$ by carrying out tests on properly chosen subsets of $[t]$. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests. In this paper we consider multistage group testing. We propose a general idea how to use a… ▽ More

    Submitted 2 July, 2016; originally announced July 2016.

    Comments: ACCT 2016, 6 pages

  31. arXiv:1607.00507  [pdf, ps, other

    cs.IT cs.DS

    Adaptive Learning a Hidden Hypergraph

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Learning a hidden hypergraph is a natural generalization of the classical group testing problem that consists in detecting unknown hypergraph $H_{un}=H(V,E)$ by carrying out edge-detecting tests. In the given paper we focus our attention only on a specific family $\mathcal{F}(t,s,\ell)$ of localized hypergraphs for which the total number of vertices $|V| = t$, the number of edges $|E|\le s$,… ▽ More

    Submitted 2 July, 2016; originally announced July 2016.

    Comments: ACCT 2016, 6 pages. arXiv admin note: text overlap with arXiv:1601.06705

  32. arXiv:1607.00502  [pdf, ps, other

    cs.IT

    Threshold Decoding for Disjunctive Group Testing

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Let $1 \le s < t$, $N \ge 1$ be integers and a complex electronic circuit of size $t$ is said to be an $s$-active, $\; s \ll t$, and can work as a system block if not more than $s$ elements of the circuit are defective. Otherwise, the circuit is said to be an $s$-defective and should be replaced by a similar $s$-active circuit. Suppose that there exists a possibility to run $N$ non-adaptive group… ▽ More

    Submitted 2 July, 2016; originally announced July 2016.

    Comments: ACCT 2016, 6 pages

  33. arXiv:1605.06847  [pdf, ps, other

    cs.IT

    A simple construction of cover-free $(s,\ell)$-code with certain constant weight

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: We give a method of constructing a cover-free $(s, \ell)$-code. For $k > s$, our construction yields a $ {{n \choose s} \choose \ell}\times {n \choose k}$ cover-free $(s, \ell)$-code with a constant column weight.

    Submitted 22 May, 2016; originally announced May 2016.

    Comments: 2 pages

  34. arXiv:1605.05363  [pdf, ps, other

    cs.IT

    Bounds on the rate of disjunctive codes (in Russian)

    Authors: A. G. Dyachkov, N. Polyanskii, V. Shchukin, I. Vorobyev

    Abstract: A binary code is called a superimposed cover-free $(s,\ell)$-code if the code is identified by the incidence matrix of a family of finite sets in which no intersection of $\ell$ sets is covered by the union of $s$ others. A binary code is called a superimposed list-decoding $s_L$-code if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets ca… ▽ More

    Submitted 17 May, 2016; originally announced May 2016.

    Comments: 36 pages, Original Russian Text published in Problemy Peredachi Informatsii, 2014, Vol. 50, No. 1, pp. 31-63

  35. arXiv:1601.06709  [pdf, ps, other

    cs.IT

    Threshold Disjunctive Codes

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Let $1 \le s < t$, $N \ge 1$ be integers and a complex electronic circuit of size $t$ is said to be an $s$-active, $\; s \ll t$, and can work as a system block if not more than $s$ elements of the circuit are defective. Otherwise, the circuit is said to be an $s$-defective and should be substituted for the similar $s$-active circuit. Suppose that there exists a possibility to check the $s$-activit… ▽ More

    Submitted 25 January, 2016; originally announced January 2016.

    Comments: 9 pages, IEEE conference

  36. On Multistage Learning a Hidden Hypergraph

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Learning a hidden hypergraph is a natural generalization of the classical group testing problem that consists in detecting unknown hypergraph $H_{un}=H(V,E)$ by carrying out edge-detecting tests. In the given paper we focus our attention only on a specific family $F(t,s,\ell)$ of localized hypergraphs for which the total number of vertices $|V| = t$, the number of edges $|E|\le s$, $s\ll t$, and t… ▽ More

    Submitted 17 May, 2016; v1 submitted 25 January, 2016; originally announced January 2016.

    Comments: 5 pages, IEEE conference

  37. On a Hypergraph Approach to Multistage Group Testing Problems

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Group testing is a well known search problem that consists in detecting up to $s$ defective elements of the set $[t]=\{1,\ldots,t\}$ by carrying out tests on properly chosen subsets of $[t]$. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests. In this paper we consider multistage group testing. We propose a general idea how to use a… ▽ More

    Submitted 25 January, 2016; originally announced January 2016.

    Comments: 5 pages, IEEE conference

  38. arXiv:1410.8566  [pdf, ps, other

    cs.IT

    Almost Cover-Free Codes and Designs

    Authors: Arkadii D'yachkov, Ilya Vorobyev, Nikita Polyanskii, Vladislav Shchukin

    Abstract: An $s$-subset of codewords of a binary code $X$ is said to be an {\em $(s,\ell)$-bad} in $X$ if the code $X$ contains a subset of other $\ell$ codewords such that the conjunction of the $\ell$ codewords is covered by the disjunctive sum of the $s$ codewords. Otherwise, the $s$-subset of codewords of $X$ is said to be an {\em $(s,\ell)$-good} in~$X$.mA binary code $X$ is said to be a cover-free… ▽ More

    Submitted 25 March, 2015; v1 submitted 30 October, 2014; originally announced October 2014.

    Comments: 18 pages, conference paper

  39. arXiv:1410.8385  [pdf, other

    cs.IT

    Symmetric Disjunctive List-Decoding Codes

    Authors: Arkadii D'yachkov, Ilya Vorobyev, Nikita Polyanskii, Vladislav Shchukin

    Abstract: A binary code is said to be a disjunctive list-decoding $s_L$-code (LD $s_L$-code), $s \ge 2$, $L \ge 1$, if the code is identified by the incidence matrix of a family of finite sets in which the union (or disjunctive sum) of any $s$ sets can cover not more than $L-1$ other sets of the family. In this paper, we consider a similar class of binary codes which are based on a {\em symmetric disjunctiv… ▽ More

    Submitted 29 March, 2015; v1 submitted 30 October, 2014; originally announced October 2014.

    Comments: 18 pages, 1 figure, 1 table, conference paper

  40. arXiv:1407.2482  [pdf, ps, other

    cs.IT

    Almost Disjunctive List-Decoding Codes

    Authors: A. G. Dyachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: A binary code is said to be a disjunctive list-decoding $s_L$-code, $s\ge1$, $L\ge1$, (briefly, LD $s_L$-code) if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets can cover not more than $L-1$ other sets of the family. In this paper, we introduce a natural {\em probabilistic} generalization of LD $s_L$-code when the code is said to be an… ▽ More

    Submitted 9 July, 2014; originally announced July 2014.

    Comments: 17 pages, 1 table