-
Semidefinite lower bounds for covering codes
Authors:
Dion Gijswijt,
Sven Polak
Abstract:
Let $K_q(n,r)$ denote the minimum size of a $q$-ary covering code of word length $n$ and covering radius $r$. In other words, $K_q(n,r)$ is the minimum size of a set of $q$-ary codewords of length $n$ such that the Hamming balls of radius $r$ around the codewords cover the Hamming space $\{0,\ldots,q-1\}^n$. The special case $K_3(n,1)$ is often referred to as the football pool problem, as it is eq…
▽ More
Let $K_q(n,r)$ denote the minimum size of a $q$-ary covering code of word length $n$ and covering radius $r$. In other words, $K_q(n,r)$ is the minimum size of a set of $q$-ary codewords of length $n$ such that the Hamming balls of radius $r$ around the codewords cover the Hamming space $\{0,\ldots,q-1\}^n$. The special case $K_3(n,1)$ is often referred to as the football pool problem, as it is equivalent to finding a set of forecasts on $n$ football matches that is guaranteed to contain a forecast with at most one wrong outcome.
In this paper, we build and expand upon the work of Gijswijt (2005), who introduced a semidefinite programming lower bound on $K_q(n,r)$ via matrix cuts. We develop techniques that strengthen this bound, by introducing new semidefinite constraints inspired by Lasserre's hierarchy for 0-1 programs and symmetry reduction methods, and a more powerful objective function. The techniques lead to sharper lower bounds, setting new records across a broad range of values of $q$, $n$, and $r$.
△ Less
Submitted 2 April, 2025;
originally announced April 2025.
-
Automorphism groups of Cayley graphs generated by general transposition sets
Authors:
Dion Gijswijt,
Frank de Meijer
Abstract:
In this paper we study the Cayley graph $\mathrm{Cay}(S_n,T)$ of the symmetric group $S_n$ generated by a set of transpositions $T$. We show that for $n\geq 5$ the Cayley graph is normal. As a corollary, we show that its automorphism group is a direct product of $S_n$ and the automorphism group of the transposition graph associated to $T$. This provides an affirmative answer to a conjecture raised…
▽ More
In this paper we study the Cayley graph $\mathrm{Cay}(S_n,T)$ of the symmetric group $S_n$ generated by a set of transpositions $T$. We show that for $n\geq 5$ the Cayley graph is normal. As a corollary, we show that its automorphism group is a direct product of $S_n$ and the automorphism group of the transposition graph associated to $T$. This provides an affirmative answer to a conjecture raised by Ganesan in arXiv:1703.08109, showing that $\mathrm{Cay}(S_n,T)$ is normal if and only if the transposition graph is not $C_4$ or $K_n$.
△ Less
Submitted 31 January, 2024;
originally announced January 2024.
-
Exploiting Symmetries in Optimal Quantum Circuit Design
Authors:
Frank de Meijer,
Dion Gijswijt,
Renata Sotirov
Abstract:
A physical limitation in quantum circuit design is the fact that gates in a quantum system can only act on qubits that are physically adjacent in the architecture. To overcome this problem, SWAP gates need to be inserted to make the circuit physically realizable. The nearest neighbour compliance problem (NNCP) asks for an optimal embedding of qubits in a given architecture such that the total numb…
▽ More
A physical limitation in quantum circuit design is the fact that gates in a quantum system can only act on qubits that are physically adjacent in the architecture. To overcome this problem, SWAP gates need to be inserted to make the circuit physically realizable. The nearest neighbour compliance problem (NNCP) asks for an optimal embedding of qubits in a given architecture such that the total number of SWAP gates to be inserted is minimized. In this paper we study the NNCP on general quantum architectures. Building upon an existing linear programming formulation, we show how the model can be reduced by exploiting the symmetries of the graph underlying the formulation. The resulting model is equivalent to a generalized network flow problem and follows from an in-depth analysis of the automorphism group of specific Cayley graphs. As a byproduct of our approach, we show that the NNCP is polynomial time solvable for several classes of symmetric quantum architectures. Numerical tests on various architectures indicate that the reduction in the number of variables and constraints is on average at least 90%. In particular, NNCP instances on the star architecture can be solved for quantum circuits up to 100 qubits and more than 1000 quantum gates within a very short computation time. These results are far beyond the computational capacity when solving the instances without the exploitation of symmetries.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Blocking sets, minimal codes and trifferent codes
Authors:
Anurag Bishnoi,
Jozefien D'haeseleer,
Dion Gijswijt,
Aditya Potukuchi
Abstract:
We prove new upper bounds on the smallest size of affine blocking sets, that is, sets of points in a finite affine space that intersect every affine subspace of a fixed codimension. We show an equivalence between affine blocking sets with respect to codimension-$2$ subspaces that are generated by taking a union of lines through the origin, and strong blocking sets in the corresponding projective s…
▽ More
We prove new upper bounds on the smallest size of affine blocking sets, that is, sets of points in a finite affine space that intersect every affine subspace of a fixed codimension. We show an equivalence between affine blocking sets with respect to codimension-$2$ subspaces that are generated by taking a union of lines through the origin, and strong blocking sets in the corresponding projective space, which in turn are equivalent to minimal codes. Using this equivalence, we improve the current best upper bounds on the smallest size of a strong blocking set in finite projective spaces over fields of size at least $3$. Furthermore, using coding theoretic techniques, we improve the current best lower bounds on strong blocking set.
Our main motivation for these new bounds is their application to trifferent codes, which are sets of ternary codes of length $n$ with the property that for any three distinct codewords there is a coordinate where they all have distinct values. Over the finite field $\mathbb{F}_3$, we prove that minimal codes are equivalent to linear trifferent codes. Using this equivalence, we show that any linear trifferent code of length $n$ has size at most $3^{n/4.55}$, improving the recent upper bound of Pohoata and Zakharov. Moreover, we show the existence of linear trifferent codes of length $n$ and size at least $\frac{1}{3}\left( 9/5 \right)^{n/4}$, thus (asymptotically) matching the best lower bound on trifferent codes.
We also give explicit constructions of affine blocking sets with respect to codimension-$2$ subspaces that are a constant factor bigger than the best known lower bound. By restricting to~$\mathbb{F}_3$, we obtain linear trifferent codes of size at least $3^{23n/312}$, improving the current best explicit construction that has size $3^{n/112}$.
△ Less
Submitted 9 May, 2024; v1 submitted 23 January, 2023;
originally announced January 2023.
-
Excluding affine configurations over a finite field
Authors:
Dion Gijswijt
Abstract:
Let $a_{i1}x_1+\cdots+a_{ik}x_k=0$, $i\in[m]$ be a balanced homogeneous system of linear equations with coefficients $a_{ij}$ from a finite field $\mathbb{F}_q$. We say that a solution $x=(x_1,\ldots, x_k)$ with $x_1,\ldots, x_k\in \mathbb{F}_q^n$ is `generic' if every homogeneous balanced linear equation satisfied by $x$ is a linear combination of the given equations.
We show that if the given…
▽ More
Let $a_{i1}x_1+\cdots+a_{ik}x_k=0$, $i\in[m]$ be a balanced homogeneous system of linear equations with coefficients $a_{ij}$ from a finite field $\mathbb{F}_q$. We say that a solution $x=(x_1,\ldots, x_k)$ with $x_1,\ldots, x_k\in \mathbb{F}_q^n$ is `generic' if every homogeneous balanced linear equation satisfied by $x$ is a linear combination of the given equations.
We show that if the given system is `tame', subsets $S\subseteq \mathbb{F}_q^n$ without generic solutions must have exponentially small density. Here, the system is called tame if for every implied system the number of equations is less than half the number of used variables. Using a subspace sampling argument this also gives a `supersaturation result': there is a constant $c$ such that for $ε>0$ sufficiently small, every subset $S\subseteq \mathbb{F}_q^n$ of size at least $q^{(1-ε) n}$ contains $Ω(q^{(k-m-εc)n})$ solutions as $n\to\infty$. For $q<4$ the tameness condition can be left out.
Our main tool is a modification of the slice rank method to leverage the existence of many solutions in order to obtain high rank solutions.
△ Less
Submitted 15 December, 2023; v1 submitted 23 December, 2021;
originally announced December 2021.
-
On the size of subsets of $\mathbb{F}_q^n$ avoiding solutions to linear systems with repeated columns
Authors:
Josse van Dobben de Bruyn,
Dion Gijswijt
Abstract:
Consider a system of $m$ balanced linear equations in $k$ variables with coefficients in $\mathbb{F}_q$. If $k \geq 2m + 1$, then a routine application of the slice rank method shows that there are constants $β,γ\geq 1$ with $γ< q$ such that, for every subset $S \subseteq \mathbb{F}_q^n$ of size at least $β\cdot γ^n$, the system has a solution $(x_1,\ldots,x_k) \in S^k$ with $x_1,\ldots,x_k$ not a…
▽ More
Consider a system of $m$ balanced linear equations in $k$ variables with coefficients in $\mathbb{F}_q$. If $k \geq 2m + 1$, then a routine application of the slice rank method shows that there are constants $β,γ\geq 1$ with $γ< q$ such that, for every subset $S \subseteq \mathbb{F}_q^n$ of size at least $β\cdot γ^n$, the system has a solution $(x_1,\ldots,x_k) \in S^k$ with $x_1,\ldots,x_k$ not all equal. Building on a series of papers by Mimura and Tokushige and on a paper by Sauermann, this paper investigates the problem of finding a solution of higher non-degeneracy; that is, a solution where $x_1,\ldots,x_k$ are pairwise distinct, or even a solution where $x_1,\ldots,x_k$ do not satisfy any balanced linear equation that is not a linear combination of the equations in the system.
In this paper, we focus on linear systems with repeated columns. For a large class of systems of this type, we prove that there are constants $β,γ\geq 1$ with $γ< q$ such that every subset $S \subseteq \mathbb{F}_q^n$ of size at least $β\cdot γ^n$ contains a solution that is non-degenerate (in one of the two senses described above). This class is disjoint from the class covered by Sauermann's result, and captures the systems studied by Mimura and Tokushige into a single proof. Moreover, a special case of our results shows that, if $S \subseteq \mathbb{F}_p^n$ is a subset such that $S - S$ does not contain a non-trivial $k$-term arithmetic progression (with $p$ prime and $3 \leq k \leq p$), then $S$ must have exponentially small density.
△ Less
Submitted 22 September, 2023; v1 submitted 18 November, 2021;
originally announced November 2021.
-
Constructing Tree Decompositions of Graphs with Bounded Gonality
Authors:
Hans L. Bodlaender,
Josse van Dobben de Bruyn,
Dion Gijswijt,
Harry Smit
Abstract:
In this paper, we give a constructive proof of the fact that the treewidth of a graph is at most its divisorial gonality. The proof gives a polynomial time algorithm to construct a tree decomposition of width at most $k$, when an effective divisor of degree $k$ that reaches all vertices is given. We also give a similar result for two related notions: stable divisorial gonality and stable gonality.
In this paper, we give a constructive proof of the fact that the treewidth of a graph is at most its divisorial gonality. The proof gives a polynomial time algorithm to construct a tree decomposition of width at most $k$, when an effective divisor of degree $k$ that reaches all vertices is given. We also give a similar result for two related notions: stable divisorial gonality and stable gonality.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
Integer packing sets form a well-quasi-ordering
Authors:
Alberto Del Pia,
Dion Gijswijt,
Jeff Linderoth,
Haoran Zhu
Abstract:
An integer packing set is a set of non-negative integer vectors with the property that, if a vector $x$ is in the set, then every non-negative integer vector $y$ with $y \leq x$ is in the set as well. Integer packing sets appear naturally in Integer Optimization. In fact, the set of integer points in any packing polyhedron is an integer packing set. The main result of this paper is that integer pa…
▽ More
An integer packing set is a set of non-negative integer vectors with the property that, if a vector $x$ is in the set, then every non-negative integer vector $y$ with $y \leq x$ is in the set as well. Integer packing sets appear naturally in Integer Optimization. In fact, the set of integer points in any packing polyhedron is an integer packing set. The main result of this paper is that integer packing sets, ordered by inclusion, form a well-quasi-ordering. This result allows us to answer a question recently posed by Bodur et al. In fact, we prove that the k-aggregation closure of any packing polyhedron is again a packing polyhedron. The generality of our main result allows us to provide a generalization to non-polyhedral sets: The k-aggregation closure of any downset of $\mathbb{R}^n_+$ is a packing polyhedron.
△ Less
Submitted 30 May, 2020; v1 submitted 28 November, 2019;
originally announced November 2019.
-
Parallel Machine Scheduling with a Single Resource per Job
Authors:
T. Janssen,
C. Swennenhuis,
A. Bitar,
T. Bosman,
D. Gijswijt,
L. van Iersel,
S. Dauzére-Pérès,
C. Yugma
Abstract:
We study the problem of scheduling jobs on parallel machines minimizing the total completion time, with each job using exactly one resource. First, we derive fundamental properties of the problem and show that the problem is polynomially solvable if $p_j = 1$. Then we look at a variant of the shortest processing time rule as an approximation algorithm for the problem and show that it gives at leas…
▽ More
We study the problem of scheduling jobs on parallel machines minimizing the total completion time, with each job using exactly one resource. First, we derive fundamental properties of the problem and show that the problem is polynomially solvable if $p_j = 1$. Then we look at a variant of the shortest processing time rule as an approximation algorithm for the problem and show that it gives at least a $(2-\frac{1}{m})$-approximation. Subsequently, we show that, although the complexity of the problem remains open, three related problems are $\mathcal{NP}$-hard. In the first problem, every resource also has a subset of machines on which it can be used. In the second problem, once a resource has been used on a machine it cannot be used on any other machine, hence all jobs using the same resource need to be scheduled on the same machine. In the third problem, every job needs exactly two resources instead of just one.
△ Less
Submitted 16 November, 2018; v1 submitted 13 September, 2018;
originally announced September 2018.
-
On large subsets of $F_q^n$ with no three-term arithmetic progression
Authors:
Jordan S. Ellenberg,
Dion Gijswijt
Abstract:
In this note, we show that the method of Croot, Lev, and Pach can be used to bound the size of a subset of $F_q^n$ with no three terms in arithmetic progression by $c^n$ with $c < q$. For $q=3$, the problem of finding the largest subset with no three terms in arithmetic progression is called the `cap problem'. Previously the best known upper bound for the cap problem, due to Bateman and Katz, was…
▽ More
In this note, we show that the method of Croot, Lev, and Pach can be used to bound the size of a subset of $F_q^n$ with no three terms in arithmetic progression by $c^n$ with $c < q$. For $q=3$, the problem of finding the largest subset with no three terms in arithmetic progression is called the `cap problem'. Previously the best known upper bound for the cap problem, due to Bateman and Katz, was $O(3^n / n^{1+ε})$.
△ Less
Submitted 30 May, 2016;
originally announced May 2016.
-
Asymptotic upper bounds on progression-free sets in $\mathbb{Z}_p^n$
Authors:
Dion Gijswijt
Abstract:
We show that any subset of $\mathbb{Z}_p^n$ ($p$ an odd prime) without $3$-term arithmetic progression has size $O(p^{cn})$, where $c:=1-\frac{1}{18\log p}<1$. In particular, we find an upper bound of $O(2.84^n)$ on the maximum size of an affine cap in $GF(3)^n$.
We show that any subset of $\mathbb{Z}_p^n$ ($p$ an odd prime) without $3$-term arithmetic progression has size $O(p^{cn})$, where $c:=1-\frac{1}{18\log p}<1$. In particular, we find an upper bound of $O(2.84^n)$ on the maximum size of an affine cap in $GF(3)^n$.
△ Less
Submitted 1 June, 2016; v1 submitted 18 May, 2016;
originally announced May 2016.
-
On the constant in a transference inequality for the vector-valued Fourier transform
Authors:
Dion Gijswijt,
Jan van Neerven
Abstract:
The standard proof of the equivalence of Fourier type on R^d and on the torus T^d is usually stated in terms of an implicit constant, defined as the minimum of a sum of powers of sinc functions. In this note we compute this minimum explicitly.
The standard proof of the equivalence of Fourier type on R^d and on the torus T^d is usually stated in terms of an implicit constant, defined as the minimum of a sum of powers of sinc functions. In this note we compute this minimum explicitly.
△ Less
Submitted 5 April, 2016; v1 submitted 23 November, 2015;
originally announced December 2015.
-
Computing graph gonality is hard
Authors:
Dion Gijswijt,
Harry Smit,
Marieke van der Wegen
Abstract:
There are several notions of gonality for graphs. The divisorial gonality dgon(G) of a graph G is the smallest degree of a divisor of positive rank in the sense of Baker-Norine. The stable gonality sgon(G) of a graph G is the minimum degree of a finite harmonic morphism from a refinement of G to a tree, as defined by Cornelissen, Kato and Kool. We show that computing dgon(G) and sgon(G) are NP-har…
▽ More
There are several notions of gonality for graphs. The divisorial gonality dgon(G) of a graph G is the smallest degree of a divisor of positive rank in the sense of Baker-Norine. The stable gonality sgon(G) of a graph G is the minimum degree of a finite harmonic morphism from a refinement of G to a tree, as defined by Cornelissen, Kato and Kool. We show that computing dgon(G) and sgon(G) are NP-hard by a reduction from the maximum independent set problem and the vertex cover problem, respectively. Both constructions show that computing gonality is moreover APX-hard.
△ Less
Submitted 13 April, 2019; v1 submitted 25 April, 2015;
originally announced April 2015.
-
Treewidth is a lower bound on graph gonality
Authors:
Josse van Dobben de Bruyn,
Dion Gijswijt
Abstract:
We prove that the (divisorial) gonality of a finite connected graph is lower bounded by its treewidth. We show that equality holds for grid graphs and complete multipartite graphs.
We prove that the treewidth lower bound also holds for \emph{metric graphs} by constructing for any positive rank divisor on a metric graph $Γ$ a positive rank divisor of the same degree on a subdivision of the underl…
▽ More
We prove that the (divisorial) gonality of a finite connected graph is lower bounded by its treewidth. We show that equality holds for grid graphs and complete multipartite graphs.
We prove that the treewidth lower bound also holds for \emph{metric graphs} by constructing for any positive rank divisor on a metric graph $Γ$ a positive rank divisor of the same degree on a subdivision of the underlying graph.
Finally, we show that the treewidth lower bound also holds for a related notion of gonality defined by Caporaso and for stable gonality as introduced by Cornelissen et al.
△ Less
Submitted 18 August, 2014; v1 submitted 25 July, 2014;
originally announced July 2014.
-
Approximation Algorithms for Hard Capacitated $k$-facility Location Problems
Authors:
Karen Aardal,
Pieter van den Berg,
Dion Gijswijt,
Shanfei Li
Abstract:
We study the capacitated $k$-facility location problem, in which we are given a set of clients with demands, a set of facilities with capacities and a constant number $k$. It costs $f_i$ to open facility $i$, and $c_{ij}$ for facility $i$ to serve one unit of demand from client $j$. The objective is to open at most $k$ facilities serving all the demands and satisfying the capacity constraints whil…
▽ More
We study the capacitated $k$-facility location problem, in which we are given a set of clients with demands, a set of facilities with capacities and a constant number $k$. It costs $f_i$ to open facility $i$, and $c_{ij}$ for facility $i$ to serve one unit of demand from client $j$. The objective is to open at most $k$ facilities serving all the demands and satisfying the capacity constraints while minimizing the sum of service and opening costs.
In this paper, we give the first fully polynomial time approximation scheme (FPTAS) for the single-sink (single-client) capacitated $k$-facility location problem. Then, we show that the capacitated $k$-facility location problem with uniform capacities is solvable in polynomial time if the number of clients is fixed by reducing it to a collection of transportation problems. Third, we analyze the structure of extreme point solutions, and examine the efficiency of this structure in designing approximation algorithms for capacitated $k$-facility location problems. Finally, we extend our results to obtain an improved approximation algorithm for the capacitated facility location problem with uniform opening cost.
△ Less
Submitted 12 September, 2014; v1 submitted 19 November, 2013;
originally announced November 2013.
-
Violating the Shannon capacity of metric graphs with entanglement
Authors:
Jop Briet,
Harry Buhrman,
Dion Gijswijt
Abstract:
The Shannon capacity of a graph G is the maximum asymptotic rate at which messages can be sent with zero probability of error through a noisy channel with confusability graph G. This extensively studied graph parameter disregards the fact that on atomic scales, Nature behaves in line with quantum mechanics. Entanglement, arguably the most counterintuitive feature of the theory, turns out to be a u…
▽ More
The Shannon capacity of a graph G is the maximum asymptotic rate at which messages can be sent with zero probability of error through a noisy channel with confusability graph G. This extensively studied graph parameter disregards the fact that on atomic scales, Nature behaves in line with quantum mechanics. Entanglement, arguably the most counterintuitive feature of the theory, turns out to be a useful resource for communication across noisy channels. Recently, Leung, Mancinska, Matthews, Ozols and Roy [Comm. Math. Phys. 311, 2012] presented two examples of graphs whose Shannon capacity is strictly less than the capacity attainable if the sender and receiver have entangled quantum systems. Here we give new, possibly infinite, families of graphs for which the entangled capacity exceeds the Shannon capacity.
△ Less
Submitted 7 July, 2012;
originally announced July 2012.
-
Characterizing partition functions of the vertex model
Authors:
Jan Draisma,
Dion Gijswijt,
László Lovász,
Guus Regts,
Alexander Schrijver
Abstract:
We characterize which graph parameters are partition functions of a vertex model over an algebraically closed field of characteristic 0 (in the sense of de la Harpe and Jones). We moreover characterize when the vertex model can be taken so that its moment matrix has finite rank.
We characterize which graph parameters are partition functions of a vertex model over an algebraically closed field of characteristic 0 (in the sense of de la Harpe and Jones). We moreover characterize when the vertex model can be taken so that its moment matrix has finite rank.
△ Less
Submitted 24 February, 2011;
originally announced February 2011.
-
Invariant semidefinite programs
Authors:
Christine Bachoc,
Dion C. Gijswijt,
Alexander Schrijver,
Frank Vallentin
Abstract:
In the last years many results in the area of semidefinite programming were obtained for invariant (finite dimensional, or infinite dimensional) semidefinite programs - SDPs which have symmetry. This was done for a variety of problems and applications. The purpose of this handbook chapter is to give the reader the necessary background for dealing with semidefinite programs which have symmetry. Her…
▽ More
In the last years many results in the area of semidefinite programming were obtained for invariant (finite dimensional, or infinite dimensional) semidefinite programs - SDPs which have symmetry. This was done for a variety of problems and applications. The purpose of this handbook chapter is to give the reader the necessary background for dealing with semidefinite programs which have symmetry. Here the basic theory is given and it is illustrated in applications from coding theory, combinatorics, geometry, and polynomial optimization.
△ Less
Submitted 22 November, 2010; v1 submitted 17 July, 2010;
originally announced July 2010.
-
Matrix Algebras and Semidefinite Programming Techniques for Codes
Authors:
Dion Gijswijt
Abstract:
This PhD thesis is concerned with SDP bounds for codes: upper bounds for (non)-binary error correcting codes and lower bounds for (non)-binary covering codes. The methods are based on the method of Schrijver that uses triple distances in stead of pairs as in the classical Delsarte bound.
The main topics discussed are:
1) Block-diagonalisation of matrix *-algebras,
2) Terwilliger-algebra of t…
▽ More
This PhD thesis is concerned with SDP bounds for codes: upper bounds for (non)-binary error correcting codes and lower bounds for (non)-binary covering codes. The methods are based on the method of Schrijver that uses triple distances in stead of pairs as in the classical Delsarte bound.
The main topics discussed are:
1) Block-diagonalisation of matrix *-algebras,
2) Terwilliger-algebra of the nonbinary Hamming scheme (including an explicit block-diagonalisation),
3) SDP-bounds for (nonbinary) error-correcting codes and covering codes (including computational results),
4) Discussion on the relation with matrix-cuts,
5) Computational results for Affine caps.
△ Less
Submitted 6 July, 2010;
originally announced July 2010.
-
Semidefinite code bounds based on quadruple distances
Authors:
Dion C. Gijswijt,
Hans D. Mittelmann,
Alexander Schrijver
Abstract:
Let $A(n,d)$ be the maximum number of $0,1$ words of length $n$, any two having Hamming distance at least $d$. We prove $A(20,8)=256$, which implies that the quadruply shortened Golay code is optimal. Moreover, we show $A(18,6)\leq 673$, $A(19,6)\leq 1237$, $A(20,6)\leq 2279$, $A(23,6)\leq 13674$, $A(19,8)\leq 135$, $A(25,8)\leq 5421$, $A(26,8)\leq 9275$, $A(21,10)\leq 47$, $A(22,10)\leq 84$,…
▽ More
Let $A(n,d)$ be the maximum number of $0,1$ words of length $n$, any two having Hamming distance at least $d$. We prove $A(20,8)=256$, which implies that the quadruply shortened Golay code is optimal. Moreover, we show $A(18,6)\leq 673$, $A(19,6)\leq 1237$, $A(20,6)\leq 2279$, $A(23,6)\leq 13674$, $A(19,8)\leq 135$, $A(25,8)\leq 5421$, $A(26,8)\leq 9275$, $A(21,10)\leq 47$, $A(22,10)\leq 84$, $A(24,10)\leq 268$, $A(25,10)\leq 466$, $A(26,10)\leq 836$, $A(27,10)\leq 1585$, $A(25,12)\leq 55$, and $A(26,12)\leq 96$.
The method is based on the positive semidefiniteness of matrices derived from quadruples of words. This can be put as constraint in a semidefinite program, whose optimum value is an upper bound for $A(n,d)$. The order of the matrices involved is huge. However, the semidefinite program is highly symmetric, by which its feasible region can be restricted to the algebra of matrices invariant under this symmetry. By block diagonalizing this algebra, the order of the matrices will be reduced so as to make the program solvable with semidefinite programming software in the above range of values of $n$ and $d$.
△ Less
Submitted 26 May, 2010;
originally announced May 2010.
-
Polyhedra with the Integer Caratheodory Property
Authors:
Dion Gijswijt,
Guus Regts
Abstract:
A polyhedron P has the Integer Caratheodory Property if the following holds. For any positive integer k and any integer vector w in kP, there exist affinely independent integer vectors x_1,...,x_t in P and positive integers n_1,...,n_t such that n_1+...+n_t=k and w=n_1x_1+...+n_tx_t. In this paper we prove that if P is a (poly)matroid base polytope or if P is defined by a TU matrix, then P and pro…
▽ More
A polyhedron P has the Integer Caratheodory Property if the following holds. For any positive integer k and any integer vector w in kP, there exist affinely independent integer vectors x_1,...,x_t in P and positive integers n_1,...,n_t such that n_1+...+n_t=k and w=n_1x_1+...+n_tx_t. In this paper we prove that if P is a (poly)matroid base polytope or if P is defined by a TU matrix, then P and projections of P satisfy the integer Caratheodory property.
△ Less
Submitted 26 April, 2010;
originally announced April 2010.
-
On the Caratheodory rank of polymatroid bases
Authors:
Dion Gijswijt,
Guus Regts
Abstract:
In this paper we prove that the Carathéodory rank of the set of bases of a (poly)matroid is upper bounded by the cardinality of the ground set.
In this paper we prove that the Carathéodory rank of the set of bases of a (poly)matroid is upper bounded by the cardinality of the ground set.
△ Less
Submitted 4 March, 2010;
originally announced March 2010.
-
Block diagonalization for algebra's associated with block codes
Authors:
Dion Gijswijt
Abstract:
For a matrix *-algebra B, consider the matrix *-algebra A consisting of the symmetric tensors in the n-fold tensor product of B. Examples of such algebras in coding theory include the Bose-Mesner algebra and Terwilliger algebra of the (non)binary Hamming cube, and algebras arising in SDP-hierarchies for coding bounds using moment matrices. We give a computationally efficient block diagonalizatio…
▽ More
For a matrix *-algebra B, consider the matrix *-algebra A consisting of the symmetric tensors in the n-fold tensor product of B. Examples of such algebras in coding theory include the Bose-Mesner algebra and Terwilliger algebra of the (non)binary Hamming cube, and algebras arising in SDP-hierarchies for coding bounds using moment matrices. We give a computationally efficient block diagonalization of A in terms of a given block diagonalization of B, and work out some examples, including the Terwilliger algebra of the binary- and nonbinary Hamming cube. As a tool we use some basic facts about representations of the symmetric group.
△ Less
Submitted 23 October, 2009;
originally announced October 2009.
-
An algorithm for weighted fractional matroid matching
Authors:
Dion Gijswijt,
Gyula Pap
Abstract:
Let M be a matroid on ground set E. A subset l of E is called a `line' when its rank equals 1 or 2. Given a set L of lines, a `fractional matching' in (M,L) is a nonnegative vector x indexed by the lines in L, that satisfies a system of linear constraints, one for each flat of M. Fractional matchings were introduced by Vande Vate, who showed that the set of fractional matchings is a half-integer r…
▽ More
Let M be a matroid on ground set E. A subset l of E is called a `line' when its rank equals 1 or 2. Given a set L of lines, a `fractional matching' in (M,L) is a nonnegative vector x indexed by the lines in L, that satisfies a system of linear constraints, one for each flat of M. Fractional matchings were introduced by Vande Vate, who showed that the set of fractional matchings is a half-integer relaxation of the matroid matching polytope.
It was shown by Chang et al. that a maximum size fractional matching can be found in polynomial time. In this paper we give a polynomial time algorithm to find for any given weights on the lines in L, a maximum weight fractional matching.
△ Less
Submitted 2 June, 2013; v1 submitted 11 June, 2008;
originally announced June 2008.
-
A Slow-Growing Sequence Defined by an Unusual Recurrence
Authors:
Fokko J. van de Bult,
Dion C. Gijswijt,
John P. Linderman,
N. J. A. Sloane,
Allan R. Wilks
Abstract:
The sequence starts with a(1) = 1; to extend it one writes the sequence so far as XY^k, where X and Y are strings of integers, Y is nonempty and k is as large as possible: then the next term is k. The sequence begins 1, 1, 2, 1, 1, 2, 2, 2, 3, 1, 1, 2, 1, 1, 2, 2, 2, 3, 2, ... A 4 appears for the first time at position 220, but a 5 does not appear until about position 10^{10^{23}}. The main resu…
▽ More
The sequence starts with a(1) = 1; to extend it one writes the sequence so far as XY^k, where X and Y are strings of integers, Y is nonempty and k is as large as possible: then the next term is k. The sequence begins 1, 1, 2, 1, 1, 2, 2, 2, 3, 1, 1, 2, 1, 1, 2, 2, 2, 3, 2, ... A 4 appears for the first time at position 220, but a 5 does not appear until about position 10^{10^{23}}. The main result of the paper is a proof that the sequence is unbounded. We also present results from extensive numerical investigations of the sequence and of certain derived sequences, culminating with a heuristic argument that t (for t=5,6, ...) appears for the first time at about position 2^(2^(3^(4^(5^...^({(t-2)}^{(t-1)}))))), where ^ denotes exponentiation. The final section discusses generalizations.
△ Less
Submitted 22 February, 2006;
originally announced February 2006.
-
On a set-theoretic invariant
Authors:
Dion Gijswijt,
Pieter Moree
Abstract:
Let a_1,...,a_m be positive real numbers. Besser and Moree considered weighted numbers of -1,+1 solutions of the linear inequality |a_i-a_j| < e_ka_k < a_i+a_j, with e_k=-1 of 1 and k running over the integers 1,...,m with i and j skipped. They introduced some invariants and near invariants related to this situation (invariant meaning here: not depending on the choice of i and j).
The main resu…
▽ More
Let a_1,...,a_m be positive real numbers. Besser and Moree considered weighted numbers of -1,+1 solutions of the linear inequality |a_i-a_j| < e_ka_k < a_i+a_j, with e_k=-1 of 1 and k running over the integers 1,...,m with i and j skipped. They introduced some invariants and near invariants related to this situation (invariant meaning here: not depending on the choice of i and j).
The main result of their paper is extended here to a much more general setting, namely that of certain maps from finite sets to {-1,1}. Some applications are given.
△ Less
Submitted 18 January, 2005; v1 submitted 19 September, 2003;
originally announced September 2003.