-
SPIRe: Boosting LLM Inference Throughput with Speculative Decoding
Authors:
Sanjit Neelam,
Daniel Heinlein,
Vaclav Cvicek,
Akshay Mishra,
Reiner Pope
Abstract:
Speculative decoding (SD) has been shown to reduce the latency of autoregressive decoding (AD) by 2-3x for small batch sizes. However, increasing throughput and therefore reducing the cost per token requires decoding with large batch sizes. Recent work shows that SD can accelerate decoding with large batch sizes too if the context is sufficiently long and the draft model's KV cache is sparse. We i…
▽ More
Speculative decoding (SD) has been shown to reduce the latency of autoregressive decoding (AD) by 2-3x for small batch sizes. However, increasing throughput and therefore reducing the cost per token requires decoding with large batch sizes. Recent work shows that SD can accelerate decoding with large batch sizes too if the context is sufficiently long and the draft model's KV cache is sparse. We introduce SPIRe, a draft model that combines static sparse attention, pruned initialization, and feedback memory to increase the modeled throughput of speculative decoding by over 100% compared to speculation with a much smaller draft model and by over 35% compared to the strong baseline of sparse self-speculation. Our approach is particularly effective when context lengths vary significantly across requests.
△ Less
Submitted 8 April, 2025;
originally announced April 2025.
-
Secure Distributed Matrix Multiplication with Precomputation
Authors:
Ryann Cartor,
Rafael G. L. D'Oliveira,
Salim El Rouayheb,
Daniel Heinlein,
David Karpuk,
Alex Sprintson
Abstract:
We consider the problem of secure distributed matrix multiplication in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We show how to construct polynomial schemes for the outer product partitioning which take advantage of the user's ability to precompute, and provide bounds for our technique. We show that precomputation allows for a red…
▽ More
We consider the problem of secure distributed matrix multiplication in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We show how to construct polynomial schemes for the outer product partitioning which take advantage of the user's ability to precompute, and provide bounds for our technique. We show that precomputation allows for a reduction in the order of the time complexity for the cases where the number of colluding servers is a fixed percentage of the number of servers. Furthermore, with precomputation, any percentage (less than 100%) of collusions can be tolerated, compared to the upper limit of 50% for the case without precomputation.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
The Fireball of November 24, 1970, as the Most Probable Source of the Ischgl Meteorite
Authors:
Maria Gritsevich,
Jarmo Moilanen,
Jaakko Visuri,
Matthias M. M. Meier,
Colin Maden,
Jürgen Oberst,
Dieter Heinlein,
Joachim Flohrer,
Alberto J. Castro-Tirado,
Jorge Delgado-García,
Christian Koeberl,
Ludovic Ferrière,
Franz Brandstätter,
Pavel P. Povinec,
Ivan Sýkora,
Florian Schweidler
Abstract:
In June 1976, a pristine meteorite stone weighing approximately 1 kg, fully covered with a fresh black fusion crust, was collected on a mountain road in the high-altitude Alpine environment. The recovery took place while clearing the remnants of a snow avalanche, 2 km northwest of Ischgl in Austria. Subsequent to its retrieval, the specimen remained in the finder's private residence without underg…
▽ More
In June 1976, a pristine meteorite stone weighing approximately 1 kg, fully covered with a fresh black fusion crust, was collected on a mountain road in the high-altitude Alpine environment. The recovery took place while clearing the remnants of a snow avalanche, 2 km northwest of Ischgl in Austria. Subsequent to its retrieval, the specimen remained in the finder's private residence without undergoing any scientific examination or identification until 2008, when it was brought to the University of Innsbruck. The sample was classified as a well-preserved LL6 chondrite, with a W0 weathering grade, implying a relatively short time between the meteorite fall and its retrieval. To investigate the potential connection between the Ischgl meteorite and a recorded fireball event, we have reviewed all documented fireballs ever photographed by German fireball camera stations. This examination led us to identify the fireball EN241170 observed in Germany by ten different European Network stations on the night of November 23/24, 1970, as the most likely candidate. We employed state-of-the-art techniques to reconstruct the fireball's trajectory, and to reproduce both its luminous and dark flight phases in detail. We find that the determined strewn field and the generated heat map closely align with the recovery location of the Ischgl meteorite. Furthermore, the measured radionuclide data reported here indicate that the pre-atmospheric size of the Ischgl meteoroid is consistent with the mass estimate inferred from our deceleration analysis along the trajectory. Our findings strongly support the conclusion that the Ischgl meteorite originated from the EN241170 fireball, effectively establishing it as a confirmed meteorite fall. This discovery enables to determine, along with the physical properties, also the heliocentric orbit and cosmic history of the Ischgl meteorite.
△ Less
Submitted 18 April, 2024;
originally announced April 2024.
-
Enumerating Steiner Triple Systems
Authors:
Daniel Heinlein,
Patric R. J. Östergård
Abstract:
Steiner triple systems (STSs) have been classified up to order 19. Earlier estimations of the number of isomorphism classes of STSs of order 21, the smallest open case, are discouraging as for classification, so it is natural to focus on the easier problem of merely counting the isomorphism classes. Computational approaches for counting STSs are here considered and lead to an algorithm that is use…
▽ More
Steiner triple systems (STSs) have been classified up to order 19. Earlier estimations of the number of isomorphism classes of STSs of order 21, the smallest open case, are discouraging as for classification, so it is natural to focus on the easier problem of merely counting the isomorphism classes. Computational approaches for counting STSs are here considered and lead to an algorithm that is used to obtain the number of isomorphism classes for order 21: 14,796,207,517,873,771.
△ Less
Submitted 21 June, 2023; v1 submitted 2 March, 2023;
originally announced March 2023.
-
Constructing Random Steiner Triple Systems: An Experimental Study
Authors:
Daniel Heinlein,
Patric R. J. Östergård
Abstract:
Several methods for generating random Steiner triple systems (STSs) have been proposed in the literature, such as Stinson's hill-climbing algorithm and Cameron's algorithm, but these are not yet completely understood. Those algorithms, as well as some variants, are here assessed for STSs of both small and large orders. For large orders, the number of occurrences of certain configurations in the co…
▽ More
Several methods for generating random Steiner triple systems (STSs) have been proposed in the literature, such as Stinson's hill-climbing algorithm and Cameron's algorithm, but these are not yet completely understood. Those algorithms, as well as some variants, are here assessed for STSs of both small and large orders. For large orders, the number of occurrences of certain configurations in the constructed STSs are compared with the corresponding expected values of random hypergraphs. Modifications of the algorithms are proposed.
△ Less
Submitted 8 May, 2023; v1 submitted 25 August, 2022;
originally announced August 2022.
-
Algorithms and Complexity for Counting Configurations in Steiner Triple Systems
Authors:
Daniel Heinlein,
Patric R. J. Östergård
Abstract:
Steiner triple systems form one of the most studied classes of combinatorial designs. Configurations, including subsystems, play a central role in the investigation of Steiner triple systems. With sporadic instances of small systems, ad-hoc algorithms for counting or listing configurations are typically fast enough for practical needs, but with many systems or large systems, the relevance of compu…
▽ More
Steiner triple systems form one of the most studied classes of combinatorial designs. Configurations, including subsystems, play a central role in the investigation of Steiner triple systems. With sporadic instances of small systems, ad-hoc algorithms for counting or listing configurations are typically fast enough for practical needs, but with many systems or large systems, the relevance of computational complexity and algorithms of low complexity is highlighted. General theoretical results as well as specific practical algorithms for important configurations are presented.
△ Less
Submitted 1 October, 2021;
originally announced October 2021.
-
Field Trace Polynomial Codes for Secure Distributed Matrix Multiplication
Authors:
Roberto Assis Machado,
Rafael G. L. D'Oliveira,
Salim El Rouayheb,
Daniel Heinlein
Abstract:
We consider the problem of communication efficient secure distributed matrix multiplication. The previous literature has focused on reducing the number of servers as a proxy for minimizing communication costs. The intuition being, that the more servers used, the higher the communication cost. We show that this is not the case. Our central technique relies on adapting results from the literature on…
▽ More
We consider the problem of communication efficient secure distributed matrix multiplication. The previous literature has focused on reducing the number of servers as a proxy for minimizing communication costs. The intuition being, that the more servers used, the higher the communication cost. We show that this is not the case. Our central technique relies on adapting results from the literature on repairing Reed-Solomon codes where instead of downloading the whole of the computing task, a user downloads field traces of these computations. We present field trace polynomial codes, a family of codes, that explore this technique and characterize regimes for which our codes outperform the existing codes in the literature.
△ Less
Submitted 9 June, 2022; v1 submitted 19 August, 2021;
originally announced August 2021.
-
Degree Tables for Secure Distributed Matrix Multiplication
Authors:
Rafael G. L. D'Oliveira,
Salim El Rouayheb,
Daniel Heinlein,
David Karpuk
Abstract:
We consider the problem of secure distributed matrix multiplication (SDMM) in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We construct polynomial codes for SDMM by studying a recently introduced combinatorial tool called the degree table. For a fixed partitioning, minimizing the total communication cost of a polynomial code for SDMM…
▽ More
We consider the problem of secure distributed matrix multiplication (SDMM) in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We construct polynomial codes for SDMM by studying a recently introduced combinatorial tool called the degree table. For a fixed partitioning, minimizing the total communication cost of a polynomial code for SDMM is equivalent to minimizing $N$, the number of distinct elements in the corresponding degree table.
We propose new constructions of degree tables with a low number of distinct elements. These new constructions lead to a general family of polynomial codes for SDMM, which we call $\mathsf{GASP}_{r}$ (Gap Additive Secure Polynomial codes) parametrized by an integer $r$. $\mathsf{GASP}_{r}$ outperforms all previously known polynomial codes for SDMM under an outer product partitioning. We also present lower bounds on $N$ and prove the optimality or asymptotic optimality of our constructions for certain regimes. Moreover, we formulate the construction of optimal degree tables as an integer linear program and use it to prove the optimality of $\mathsf{GASP}_{r}$ for all the system parameters that we were able to test.
△ Less
Submitted 17 June, 2021;
originally announced June 2021.
-
Steiner Triple Systems of Order 21 with Subsystems
Authors:
Daniel Heinlein,
Patric R. J. Östergård
Abstract:
The smallest open case for classifying Steiner triple systems is order 21. A Steiner triple system of order 21, an STS(21), can have subsystems of orders 7 and 9, and it is known that there are 12,661,527,336 isomorphism classes of STS(21)s with sub-STS(9)s. Here, the classification of STS(21)s with subsystems is completed by settling the case of STS(21)s with sub-STS(7)s. There are 116,635,963,20…
▽ More
The smallest open case for classifying Steiner triple systems is order 21. A Steiner triple system of order 21, an STS(21), can have subsystems of orders 7 and 9, and it is known that there are 12,661,527,336 isomorphism classes of STS(21)s with sub-STS(9)s. Here, the classification of STS(21)s with subsystems is completed by settling the case of STS(21)s with sub-STS(7)s. There are 116,635,963,205,551 isomorphism classes of such systems. An estimation of the number of isomorphism classes of STS(21)s is given.
△ Less
Submitted 24 August, 2022; v1 submitted 14 April, 2021;
originally announced April 2021.
-
Trajectory and orbit of the unique carbonaceous meteorite Flensburg
Authors:
Jiří Borovička,
Felix Bettonvil,
Gerd Baumgarten,
Jörg Strunk,
Mike Hankey,
Pavel Spurný,
Dieter Heinlein
Abstract:
The C1-ungrouped carbonaceous chondrite Flensburg fell in Germany on September 12, 2019, in the daytime. We determined the atmospheric trajectory, velocity, and heliocentric orbit using one dedicated AllSky6 meteor camera and three casual video records of the bolide. It was found that the meteorite originated in the vicinity of the 5:2 resonance with Jupiter at heliocentric distance of 2.82 AU. Wh…
▽ More
The C1-ungrouped carbonaceous chondrite Flensburg fell in Germany on September 12, 2019, in the daytime. We determined the atmospheric trajectory, velocity, and heliocentric orbit using one dedicated AllSky6 meteor camera and three casual video records of the bolide. It was found that the meteorite originated in the vicinity of the 5:2 resonance with Jupiter at heliocentric distance of 2.82 AU. When combined with the bolide energy reported by the U.S. Government sensors (USGS), the pre-atmospheric diameter of the meteoroid was estimated to 2 - 3 meters and the mass to 10,000 - 20,000 kg. The meteoroid fragmented heavily in the atmosphere at heights of 46 - 37 km, under dynamic pressures of 0.7 - 2 MPa. The recovery of just one meteorite suggests that only a very small part of the original mass reached the ground. The bolide velocity vector was compared with that reported by the USGS. There is good agreement in the radiant but the velocity value has been underestimated by the USGS by almost 1 km/s.
△ Less
Submitted 6 January, 2021;
originally announced January 2021.
-
Notes on Communication and Computation in Secure Distributed Matrix Multiplication
Authors:
Rafael G. L. D'Oliveira,
Salim El Rouayheb,
Daniel Heinlein,
David Karpuk
Abstract:
We consider the problem of secure distributed matrix multiplication in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. In this paper, we answer the following question: Is it beneficial to offload the computations if security is a concern? We answer this question in the affirmative by showing that by adjusting the parameters in a polynom…
▽ More
We consider the problem of secure distributed matrix multiplication in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. In this paper, we answer the following question: Is it beneficial to offload the computations if security is a concern? We answer this question in the affirmative by showing that by adjusting the parameters in a polynomial code we can obtain a trade-off between the user's and the servers' computational time. Indeed, we show that if the computational time complexity of an operation in $\mathbb{F}_q$ is at most $\mathcal{Z}_q$ and the computational time complexity of multiplying two $n\times n$ matrices is $\mathcal{O}(n^ω\mathcal{Z}_q)$ then, by optimizing the trade-off, the user together with the servers can compute the multiplication in $\mathcal{O}(n^{4-\frac{6}{ω+1}} \mathcal{Z}_q)$ time. We also show that if the user is only concerned in optimizing the download rate, a common assumption in the literature, then the problem can be converted into a simple private information retrieval problem by means of a scheme we call Private Oracle Querying. However, this comes at large upload and computational costs for both the user and the servers.
△ Less
Submitted 8 May, 2020; v1 submitted 15 January, 2020;
originally announced January 2020.
-
On projective $q^r$-divisible codes
Authors:
Daniel Heinlein,
Thomas Honold,
Michael Kiermaier,
Sascha Kurz,
Alfred Wassermann
Abstract:
A projective linear code over $\mathbb{F}_q$ is called $Δ$-divisible if all weights of its codewords are divisible by $Δ$. Especially, $q^r$-divisible projective linear codes, where $r$ is some integer, arise in many applications of collections of subspaces in $\mathbb{F}_q^v$. One example are upper bounds on the cardinality of partial spreads. Here we survey the known results on the possible leng…
▽ More
A projective linear code over $\mathbb{F}_q$ is called $Δ$-divisible if all weights of its codewords are divisible by $Δ$. Especially, $q^r$-divisible projective linear codes, where $r$ is some integer, arise in many applications of collections of subspaces in $\mathbb{F}_q^v$. One example are upper bounds on the cardinality of partial spreads. Here we survey the known results on the possible lengths of projective $q^r$-divisible linear codes.
△ Less
Submitted 20 December, 2019;
originally announced December 2019.
-
Generalized linkage construction for constant-dimension codes
Authors:
Daniel Heinlein
Abstract:
A constant-dimension code (CDC) is a set of subspaces of constant dimension in a common vector space with upper bounded pairwise intersection. We improve and generalize two constructions for CDCs, the improved linkage construction and the parallel linkage construction, to the generalized linkage construction which in turn yields many improved lower bounds for the cardinalities of CDCs; a quantity…
▽ More
A constant-dimension code (CDC) is a set of subspaces of constant dimension in a common vector space with upper bounded pairwise intersection. We improve and generalize two constructions for CDCs, the improved linkage construction and the parallel linkage construction, to the generalized linkage construction which in turn yields many improved lower bounds for the cardinalities of CDCs; a quantity not known in general.
△ Less
Submitted 13 November, 2019; v1 submitted 24 October, 2019;
originally announced October 2019.
-
New and Updated Semidefinite Programming Bounds for Subspace Codes
Authors:
Daniel Heinlein,
Ferdinand Ihringer
Abstract:
We show that $A_2(7,4) \leq 388$ and, more generally, $A_q(7,4) \leq (q^2-q+1)[7]_q + q^4 - 2q^3 + 3q^2 - 4q + 4$ by semidefinite programming for $q \leq 101$. Furthermore, we extend results by Bachoc et al. on SDP bounds for $A_2(n,d)$, where $d$ is odd and $n$ is small, to $A_q(n,d)$ for small $q$ and small $n$.
We show that $A_2(7,4) \leq 388$ and, more generally, $A_q(7,4) \leq (q^2-q+1)[7]_q + q^4 - 2q^3 + 3q^2 - 4q + 4$ by semidefinite programming for $q \leq 101$. Furthermore, we extend results by Bachoc et al. on SDP bounds for $A_2(n,d)$, where $d$ is odd and $n$ is small, to $A_q(n,d)$ for small $q$ and small $n$.
△ Less
Submitted 30 October, 2020; v1 submitted 25 September, 2018;
originally announced September 2018.
-
Binary Subspace Codes in Small Ambient Spaces
Authors:
Daniel Heinlein,
Sascha Kurz
Abstract:
Codes in finite projective spaces equipped with the subspace distance have been proposed for error control in random linear network coding. Here we collect the present knowledge on lower and upper bounds for binary subspace codes for projective dimensions of at most $7$. We obtain several improvements of the bounds and perform two classifications of optimal subspace codes, which are unknown so far…
▽ More
Codes in finite projective spaces equipped with the subspace distance have been proposed for error control in random linear network coding. Here we collect the present knowledge on lower and upper bounds for binary subspace codes for projective dimensions of at most $7$. We obtain several improvements of the bounds and perform two classifications of optimal subspace codes, which are unknown so far in the literature.
△ Less
Submitted 2 July, 2018; v1 submitted 6 April, 2018;
originally announced April 2018.
-
Generalized vector space partitions
Authors:
Daniel Heinlein,
Thomas Honold,
Michael Kiermaier,
Sascha Kurz
Abstract:
A vector space partition $\mathcal{P}$ in $\mathbb{F}_q^v$ is a set of subspaces such that every $1$-dimensional subspace of $\mathbb{F}_q^v$ is contained in exactly one element of $\mathcal{P}$. Replacing "every point" by "every $t$-dimensional subspace", we generalize this notion to vector space $t$-partitions and study their properties. There is a close connection to subspace codes and some pro…
▽ More
A vector space partition $\mathcal{P}$ in $\mathbb{F}_q^v$ is a set of subspaces such that every $1$-dimensional subspace of $\mathbb{F}_q^v$ is contained in exactly one element of $\mathcal{P}$. Replacing "every point" by "every $t$-dimensional subspace", we generalize this notion to vector space $t$-partitions and study their properties. There is a close connection to subspace codes and some problems are even interesting and unsolved for the set case $q=1$.
△ Less
Submitted 16 January, 2019; v1 submitted 27 March, 2018;
originally announced March 2018.
-
New LMRD bounds for constant dimension codes and improved constructions
Authors:
Daniel Heinlein
Abstract:
We generalize upper bounds for constant dimension codes containing a lifted maximum rank distance code first studied by Etzion and Silberstein. The proof allows to construct several improved codes.
We generalize upper bounds for constant dimension codes containing a lifted maximum rank distance code first studied by Etzion and Silberstein. The proof allows to construct several improved codes.
△ Less
Submitted 15 January, 2018;
originally announced January 2018.
-
Classifying optimal binary subspace codes of length 8, constant dimension 4 and minimum distance 6
Authors:
Daniel Heinlein,
Thomas Honold,
Michael Kiermaier,
Sascha Kurz,
Alfred Wassermann
Abstract:
The maximum size $A_2(8,6;4)$ of a binary subspace code of packet length $v=8$, minimum subspace distance $d=6$, and constant dimension $k=4$ is $257$, where the $2$ isomorphism types are extended lifted maximum rank distance codes. In finite geometry terms the maximum number of solids in $\operatorname{PG}(7,2)$, mutually intersecting in at most a point, is $257$. The result was obtained by combi…
▽ More
The maximum size $A_2(8,6;4)$ of a binary subspace code of packet length $v=8$, minimum subspace distance $d=6$, and constant dimension $k=4$ is $257$, where the $2$ isomorphism types are extended lifted maximum rank distance codes. In finite geometry terms the maximum number of solids in $\operatorname{PG}(7,2)$, mutually intersecting in at most a point, is $257$. The result was obtained by combining the classification of substructures with integer linear programming techniques. This implies that the maximum size $A_2(8,6)$ of a binary mixed-dimension code of packet length $8$ and minimum subspace distance $6$ is $257$ as well.
△ Less
Submitted 20 October, 2018; v1 submitted 17 November, 2017;
originally announced November 2017.
-
A subspace code of size $333$ in the setting of a binary $q$-analog of the Fano plane
Authors:
Daniel Heinlein,
Michael Kiermaier,
Sascha Kurz,
Alfred Wassermann
Abstract:
We show that there is a binary subspace code of constant dimension 3 in ambient dimension 7, having minimum distance 4 and cardinality 333, i.e., $333 \le A_2(7,4;3)$, which improves the previous best known lower bound of 329. Moreover, if a code with these parameters has at least 333 elements, its automorphism group is in one of $31$ conjugacy classes. This is achieved by a more general technique…
▽ More
We show that there is a binary subspace code of constant dimension 3 in ambient dimension 7, having minimum distance 4 and cardinality 333, i.e., $333 \le A_2(7,4;3)$, which improves the previous best known lower bound of 329. Moreover, if a code with these parameters has at least 333 elements, its automorphism group is in one of $31$ conjugacy classes. This is achieved by a more general technique for an exhaustive search in a finite group that does not depend on the enumeration of all subgroups.
△ Less
Submitted 22 March, 2019; v1 submitted 21 August, 2017;
originally announced August 2017.
-
Asymptotic bounds for the sizes of constant dimension codes and an improved lower bound
Authors:
Daniel Heinlein,
Sascha Kurz
Abstract:
We study asymptotic lower and upper bounds for the sizes of constant dimension codes with respect to the subspace or injection distance, which is used in random linear network coding. In this context we review known upper bounds and show relations between them. A slightly improved version of the so-called linkage construction is presented which is e.g. used to construct constant dimension codes wi…
▽ More
We study asymptotic lower and upper bounds for the sizes of constant dimension codes with respect to the subspace or injection distance, which is used in random linear network coding. In this context we review known upper bounds and show relations between them. A slightly improved version of the so-called linkage construction is presented which is e.g. used to construct constant dimension codes with subspace distance $d=4$, dimension $k=3$ of the codewords for all field sizes $q$, and sufficiently large dimensions $v$ of the ambient space, that exceed the MRD bound, for codes containing a lifted MRD code, by Etzion and Silberstein.
△ Less
Submitted 10 May, 2017;
originally announced May 2017.
-
A new upper bound for subspace codes
Authors:
Daniel Heinlein,
Sascha Kurz
Abstract:
It is shown that the maximum size $A_2(8,6;4)$ of a binary subspace code of packet length $v=8$, minimum subspace distance $d=4$, and constant dimension $k=4$ is at most $272$. In Finite Geometry terms, the maximum number of solids in $\operatorname{PG}(7,2)$, mutually intersecting in at most a point, is at most $272$. Previously, the best known upper bound $A_2(8,6;4)\le 289$ was implied by the J…
▽ More
It is shown that the maximum size $A_2(8,6;4)$ of a binary subspace code of packet length $v=8$, minimum subspace distance $d=4$, and constant dimension $k=4$ is at most $272$. In Finite Geometry terms, the maximum number of solids in $\operatorname{PG}(7,2)$, mutually intersecting in at most a point, is at most $272$. Previously, the best known upper bound $A_2(8,6;4)\le 289$ was implied by the Johnson bound and the maximum size $A_2(7,6;3)=17$ of partial plane spreads in $\operatorname{PG}(6,2)$. The result was obtained by combining the classification of subspace codes with parameters $(7,17,6;3)_2$ and $(7,34,5;\{3,4\})_2$ with integer linear programming techniques. The classification of $(7,33,5;\{3,4\})_2$ subspace codes is obtained as a byproduct.
△ Less
Submitted 25 March, 2017;
originally announced March 2017.
-
Projective divisible binary codes
Authors:
Daniel Heinlein,
Thomas Honold,
Michael Kiermaier,
Sascha Kurz,
Alfred Wassermann
Abstract:
For which positive integers $n,k,r$ does there exist a linear $[n,k]$ code $C$ over $\mathbb{F}_q$ with all codeword weights divisible by $q^r$ and such that the columns of a generating matrix of $C$ are projectively distinct? The motivation for studying this problem comes from the theory of partial spreads, or subspace codes with the highest possible minimum distance, since the set of holes of a…
▽ More
For which positive integers $n,k,r$ does there exist a linear $[n,k]$ code $C$ over $\mathbb{F}_q$ with all codeword weights divisible by $q^r$ and such that the columns of a generating matrix of $C$ are projectively distinct? The motivation for studying this problem comes from the theory of partial spreads, or subspace codes with the highest possible minimum distance, since the set of holes of a partial spread of $r$-flats in $\operatorname{PG}(v-1,\mathbb{F}_q)$ corresponds to a $q^r$-divisible code with $k\leq v$. In this paper we provide an introduction to this problem and report on new results for $q=2$.
△ Less
Submitted 24 March, 2017;
originally announced March 2017.
-
Tables of subspace codes
Authors:
Daniel Heinlein,
Michael Kiermaier,
Sascha Kurz,
Alfred Wassermann
Abstract:
One of the main problems of subspace coding asks for the maximum possible cardinality of a subspace code with minimum distance at least $d$ over $\mathbb{F}_q^n$, where the dimensions of the codewords, which are vector spaces, are contained in $K\subseteq\{0,1,\dots,n\}$. In the special case of $K=\{k\}$ one speaks of constant dimension codes. Since this (still) emerging field is very prosperous o…
▽ More
One of the main problems of subspace coding asks for the maximum possible cardinality of a subspace code with minimum distance at least $d$ over $\mathbb{F}_q^n$, where the dimensions of the codewords, which are vector spaces, are contained in $K\subseteq\{0,1,\dots,n\}$. In the special case of $K=\{k\}$ one speaks of constant dimension codes. Since this (still) emerging field is very prosperous on the one hand side and there are a lot of connections to classical objects from Galois geometry it is a bit difficult to keep or to obtain an overview about the current state of knowledge. To this end we have implemented an on-line database of the (at least to us) known results at \url{subspacecodes.uni-bayreuth.de}. The aim of this recurrently updated technical report is to provide a user guide how this technical tool can be used in research projects and to describe the so far implemented theoretic and algorithmic knowledge.
△ Less
Submitted 21 December, 2019; v1 submitted 12 January, 2016;
originally announced January 2016.
-
Coset Construction for Subspace Codes
Authors:
Daniel Heinlein,
Sascha Kurz
Abstract:
One of the main problems of the research area of network coding is to compute good lower and upper bounds of the achievable cardinality of so-called subspace codes in $\operatorname{PG}(n,q)$, i.e., the set of subspaces of $\mathbb{F}_q^n$, for a given minimal distance. Here we generalize a construction of Etzion and Silberstein to a wide range of parameters. This construction, named coset constru…
▽ More
One of the main problems of the research area of network coding is to compute good lower and upper bounds of the achievable cardinality of so-called subspace codes in $\operatorname{PG}(n,q)$, i.e., the set of subspaces of $\mathbb{F}_q^n$, for a given minimal distance. Here we generalize a construction of Etzion and Silberstein to a wide range of parameters. This construction, named coset construction, improves or attains several of the previously best-known subspace code sizes and attains the MRD bound for an infinite family of parameters.
△ Less
Submitted 26 September, 2017; v1 submitted 23 December, 2015;
originally announced December 2015.
-
The extraordinarily bright optical afterglow of GRB 991208 and its host galaxy
Authors:
A. J. Castro-Tirado,
V. V. Sokolov,
J. Gorosabel,
J. M. Castro Cerón,
J. Greiner,
R. A. M. J. Wijers,
B. L. Jensen,
J. Hjorth,
S. Toft,
H. Pedersen,
E. Palazzi,
E. Pian,
N. Masetti,
R. Sagar,
V. Mohan,
A. K. Pandey,
S. B. Pandey,
S. N. Dodonov,
T. A. Fatkhullin,
V. L. Afanasiev,
V. N. Komarova,
A. V. Moiseev,
R. Hudec,
V. Simon,
P. Vreeswijk
, et al. (28 additional authors not shown)
Abstract:
Observations of the extraordinarily bright optical afterglow (OA) of GRB 991208 started 2.1 d after the event. The flux decay constant of the OA in the R-band is -2.30 +/- 0.07 up to 5 d, which is very likely due to the jet effect, and after that it is followed by a much steeper decay with constant -3.2 +/- 0.2, the fastest one ever seen in a GRB OA. A negative detection in several all-sky films…
▽ More
Observations of the extraordinarily bright optical afterglow (OA) of GRB 991208 started 2.1 d after the event. The flux decay constant of the OA in the R-band is -2.30 +/- 0.07 up to 5 d, which is very likely due to the jet effect, and after that it is followed by a much steeper decay with constant -3.2 +/- 0.2, the fastest one ever seen in a GRB OA. A negative detection in several all-sky films taken simultaneously to the event implies either a previous additional break prior to 2 d after the occurrence of the GRB (as expected from the jet effect). The existence of a second break might indicate a steepening in the electron spectrum or the superposition of two events. Once the afterglow emission vanished, contribution of a bright underlying SN is found, but the light curve is not sufficiently well sampled to rule out a dust echo explanation. Our determination of z = 0.706 indicates that GRB 991208 is at 3.7 Gpc, implying an isotropic energy release of 1.15 x 10E53 erg which may be relaxed by beaming by a factor > 100. Precise astrometry indicates that the GRB coincides within 0.2" with the host galaxy, thus given support to a massive star origin. The absolute magnitude is M_B = -18.2, well below the knee of the galaxy luminosity function and we derive a star-forming rate of 11.5 +/- 7.1 Mo/yr. The quasi-simultaneous broad-band photometric spectral energy distribution of the afterglow is determined 3.5 day after the burst (Dec 12.0) implying a cooling frequency below the optical band, i.e. supporting a jet model with p = -2.30 as the index of the power-law electron distribution.
△ Less
Submitted 20 February, 2001; v1 submitted 9 February, 2001;
originally announced February 2001.