2002
DOI: 10.1006/jcta.2002.3290
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric Binary Covering Codes

Abstract: An asymmetric binary covering code of length n and radius R is a subset C of the n-cube Q n such that every vector x 2 Q n can be obtained from some vector c 2 C by changing at most R 1's of c to 0's, where R is as small as possible. K þ ðn; RÞ is defined as the smallest size of such a code. We show K þ ðn; RÞ 2 Yð2 n =n R Þ for constant R; using an asymmetric sphere-covering bound and probabilistic methods. We showThese two results are extended to near-constant R and % R R; respectively. Various bounds on K þ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
1

Year Published

2003
2003
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(19 citation statements)
references
References 6 publications
0
18
0
1
Order By: Relevance
“…Prompted by applications to the manufacture of semiconductor wafers, Cooper, Ellis and Kahng [7] have investigated the asymptotic behavior of D(n, R) for fixed R as n → ∞. In Section 2 of the present paper we show that the values of D(n, 1) for n ≤ 8 are as shown in Table 1.…”
Section: Introductionmentioning
confidence: 72%
See 1 more Smart Citation
“…Prompted by applications to the manufacture of semiconductor wafers, Cooper, Ellis and Kahng [7] have investigated the asymptotic behavior of D(n, R) for fixed R as n → ∞. In Section 2 of the present paper we show that the values of D(n, 1) for n ≤ 8 are as shown in Table 1.…”
Section: Introductionmentioning
confidence: 72%
“…Table 5 gives values of N (n, k, k −1, M ) together with a brief indication of how they were found. An entry such as 11,8,7 : 63(40); 64(1193)(based on [10,7,6, 46])…”
Section: New Values For Covering Numbersmentioning
confidence: 99%
“…However, we are still left with answering the question: how do we pack all the k th -order marginals into as few marginals of order m as possible, for each m > k. That will lead us to the matter of "asymmetric covering codes" or "covering numbers" [7,9].…”
Section: Computing Many Marginals At One Reducermentioning
confidence: 99%
“…Let n = 3, and let the three groups be A 1 A 2 A 3 , B 1 B 2 B 3 , and C 1 C 2 C 3 . From the first rule, we get the handles 9 2 /3 = 12.…”
Section: Nd-order Marginals Covered By 3rd-order Handlesmentioning
confidence: 99%
“…Теперь оценим мощность покрытия множества E n k с помощью конструкции, обобща-ющей метод доказательства [10] верхней оценки мощности когда, асимметрически покрывающего булев куб.…”
Section: оценка мощности асимметричного покрытия «вниз»unclassified