-
arXiv:1502.06007 [pdf, ps, other]
Degrees of Freedom and Secrecy in Wireless Relay Networks
Abstract: We translate the problem of designing a secure communications protocol for several users communicating through a relay in a wireless network into understanding certain subvarieties of products of Grassmannians. We calculate the dimension of these subvarieties and provide various results concerning their defning equations. When the relay and all of the users have the same number of antennas, this a… ▽ More
Submitted 12 December, 2014; originally announced February 2015.
Comments: Submitted to MEGA (Effective Methods in Algebraic Geometry) 2015
-
On the Combinatorics of Locally Repairable Codes via Matroid Theory
Abstract: This paper provides a link between matroid theory and locally repairable codes (LRCs) that are either linear or more generally almost affine. Using this link, new results on both LRCs and matroid theory are derived. The parameters $(n,k,d,r,δ)$ of LRCs are generalized to matroids, and the matroid analogue of the generalized Singleton bound in [P. Gopalan et al., "On the locality of codeword symbol… ▽ More
Submitted 21 January, 2016; v1 submitted 31 December, 2014; originally announced January 2015.
Comments: 48 pages. Submitted for publication. In this version: The text has been edited to improve the readability. Parameter d for matroids is now defined by the use of the rank function instead of the dual matroid. Typos are corrected. Section III is divided into two parts, and some numberings of theorems etc. have been changed
-
arXiv:1410.6339 [pdf, ps, other]
Constructions and Properties of Linear Locally Repairable Codes
Abstract: In this paper, locally repairable codes with all-symbol locality are studied. Methods to modify already existing codes are presented. Also, it is shown that with high probability, a random matrix with a few extra columns guaranteeing the locality property, is a generator matrix for a locally repairable code with a good minimum distance. The proof of this also gives a constructive method to find lo… ▽ More
Submitted 13 January, 2015; v1 submitted 23 October, 2014; originally announced October 2014.
Comments: 32 pages. Second code construction in Section V is corrected in this version. Also, some typos are corrected. The results remain the same. Submitted to IEEE Transactions on Information Theory. This is extended, generalized, and clarified version of arXiv:1408.0180
Journal ref: IEEE Transactions on Information Theory, vol. 62, issue 3, 2016, pages 1129-1143
-
arXiv:1008.3310 [pdf, ps, other]
Partially ordered secretaries
Abstract: The elements of a finite nonempty partially ordered set are exposed at independent uniform times in $[0,1]$ to a selector who, at any given time, can see the structure of the induced partial order on the exposed elements. The selector's task is to choose online a maximal element. This generalizes the classical linear order secretary problem, for which it is known that the selector can succeed with… ▽ More
Submitted 6 October, 2010; v1 submitted 19 August, 2010; originally announced August 2010.
Comments: 5 pages