Skip to main content

Showing 1–42 of 42 results for author: Vorobyev, I

.
  1. arXiv:2404.02723  [pdf, ps, other

    cs.IT

    Deterministic Identification Codes for Fading Channels

    Authors: Ilya Vorobyev, Christian Deppe, Holger Boche

    Abstract: Many communication applications incorporate event-triggered behavior, where the conventional Shannon capacity may not effectively gauge performance. Consequently, we advocate for the concept of identification capacity as a more suitable metric for assessing these systems. We consider deterministic identification codes for the Gaussian AWGN, the slow fading, and the fast fading channels with power… ▽ More

    Submitted 8 May, 2024; v1 submitted 3 April, 2024; originally announced April 2024.

    Comments: Minor corrections

  2. arXiv:2401.16540  [pdf, ps, other

    cs.IT

    Efficient Combinatorial Group Testing: Bridging the Gap between Union-Free and Disjunctive Codes

    Authors: Daniil Goshkoder, Nikita Polyanskii, Ilya Vorobyev

    Abstract: This work focuses on non-adaptive group testing, with a primary goal of efficiently identifying a set of at most $d$ defective elements among a given set of elements using the fewest possible number of tests. Non-adaptive combinatorial group testing often employs disjunctive codes and union-free codes. This paper discusses union-free codes with fast decoding (UFFD codes), a recently introduced cla… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  3. arXiv:2305.06691  [pdf, ps, other

    cs.IT math.CO

    Correcting One Error in Non-Binary Channels with Feedback

    Authors: Ilya Vorobyev, Vladimir Lebedev, Alexey Lebedev

    Abstract: In this paper, the problem of correction of a single error in $q$-ary symmetric channel with noiseless feedback is considered. We propose an algorithm to construct codes with feedback inductively. For all prime power $q$ we prove that two instances of feedback are sufficient to transmit over the $q$-ary symmetric channel the same number of messages as in the case of complete feedback. Our other co… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  4. arXiv:2304.12399  [pdf, other

    cs.IT

    Codes Correcting a Single Long Duplication Error

    Authors: Daniil Goshkoder, Nikita Polyanskii, Ilya Vorobyev

    Abstract: We consider the problem of constructing a code capable of correcting a single long tandem duplication error of variable length. As the main contribution of this paper, we present a $q$-ary efficiently encodable code of length $n+1$ and redundancy $1$ that can correct a single duplication of length at least $K=4\cdot\lceil \log_q n\rceil +1$. The complexity of encoding is $O(\frac{n^2}{\log n})$ an… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

  5. arXiv:2302.02414  [pdf, ps, other

    cs.IT cs.CR cs.DM math.CO

    Secure Codes with List Decoding

    Authors: Yujie Gu, Ilya Vorobyev, Ying Miao

    Abstract: In this paper we consider combinatorial secure codes in traitor tracing for protecting copyright of multimedia content. First, we introduce a new notion of secure codes with list decoding (SCLDs) for collusion-resistant multimedia fingerprinting, which includes many existing types of fingerprinting codes as special cases. Next, we build efficient identifying algorithms for SCLDs with complete trac… ▽ More

    Submitted 5 February, 2023; originally announced February 2023.

    Comments: 20 pages

  6. arXiv:2301.01848  [pdf, ps, other

    cs.IT math.CO

    Correcting one error in channels with feedback

    Authors: Ilya Vorobyev, Alexey Lebedev, Vladimir Lebedev, Christian Deppe

    Abstract: We address the problem of correcting a single error in an arbitrary discrete memoryless channel with error-free instantaneous feedback. For the case of a one-time feedback, we propose a method for constructing optimal transmission strategies. The obtained result allows us to prove that for a binary channel, two feedbacks are sufficient to transmit the same number of messages as in the case of comp… ▽ More

    Submitted 4 January, 2023; originally announced January 2023.

  7. arXiv:2212.14452  [pdf, other

    nucl-ex physics.ins-det

    Letter of Intent: the NA60+ experiment

    Authors: C. Ahdida, G. Alocco, F. Antinori, M. Arba, M. Aresti, R. Arnaldi, A. Baratto Roldan, S. Beole, A. Beraudo, J. Bernhard, L. Bianchi, M. Borysova, S. Bressler, S. Bufalino, E. Casula, C. Cicalo, S. Coli, P. Cortese, A. Dainese, H. Danielsson, A. De Falco, K. Dehmelt, A. Drees, A. Ferretti, F. Fionda , et al. (37 additional authors not shown)

    Abstract: We propose a new fixed-target experiment for the study of electromagnetic and hard probes of the Quark-Gluon Plasma (QGP) in heavy-ion collisions at the CERN SPS. The experiment aims at performing measurements of the dimuon spectrum from threshold up to the charmonium region, and of hadronic decays of charm and strange hadrons. It is based on a muon spectrometer, which includes a toroidal magnet a… ▽ More

    Submitted 29 December, 2022; originally announced December 2022.

    Comments: Letter of Intent submitted to the CERN SPSC

    Report number: CERN-SPSC-2022-036 / SPSC-I-259

  8. arXiv:2211.04264  [pdf, ps, other

    cs.IT math.CO

    Note on generalized group testing

    Authors: Ilya Vorobyev

    Abstract: In this note, we present a new adaptive algorithm for generalized group testing, which is asymptotically optimal if $d=o(\log_2|E|)$, $E$ is a set of potentially contaminated sets, $d$ is a maximal size of elements of $E$. Also, we design a 3-stage algorithm, which is asymptotically optimal for $d=2$.

    Submitted 8 November, 2022; originally announced November 2022.

  9. arXiv:2202.00136  [pdf, ps, other

    cs.IT math.CO

    Non-adaptive and two-stage coding over the Z-channel

    Authors: Alexey Lebedev, Ilya Vorobyev, Vladimir Lebedev, Christian Deppe

    Abstract: In this paper, we developed new coding strategies for the Z-channel. In particular, we look at the case with two-stage encoding. In this case, the encoder uses noiseless feedback once and adjusts the further encoding strategy based on the previous partial output of the channel. Nevertheless, the developed codes improve the known results with full feedback for small length and 1 error. A tool for t… ▽ More

    Submitted 8 September, 2022; v1 submitted 31 January, 2022; originally announced February 2022.

    Comments: Some references and known results, which were missed in the previous version, have been added

  10. Reevaluation of the cosmic antideuteron flux from cosmic-ray interactions and from exotic sources

    Authors: Laura Šerkšnytė, Stephan Königstorfer, Philip von Doetinchem, Laura Fabbietti, Diego Mauricio Gomez-Coral, Johannes Herms, Alejandro Ibarra, Thomas Pöschl, Anirvan Shukla, Andrew Strong, Ivan Vorobyev

    Abstract: Cosmic-ray antideuterons could be a key for the discovery of exotic phenomena in our Galaxy, such as dark-matter annihilations or primordial black hole evaporation. Unfortunately the theoretical predictions of the antideuteron flux at Earth are plagued with uncertainties from the mechanism of antideuteron production and propagation in the Galaxy. We present the most up-to-date calculation of the a… ▽ More

    Submitted 6 April, 2022; v1 submitted 3 January, 2022; originally announced January 2022.

    Journal ref: Phys. Rev. D 105, 083021 (2022)

  11. arXiv:2110.02008  [pdf, ps, other

    cs.IT

    Lifted Reed-Solomon Codes and Lifted Multiplicity Codes

    Authors: Lukas Holzbaur, Rina Polyanskaya, Nikita Polyanskii, Ilya Vorobyev, Eitan Yaakobi

    Abstract: Lifted Reed-Solomon and multiplicity codes are classes of codes, constructed from specific sets of $m$-variate polynomials. These codes allow for the design of high-rate codes that can recover every codeword or information symbol from many disjoint sets. Recently, the underlying approaches have been combined for the bi-variate case to construct lifted multiplicity codes, a generalization of lifted… ▽ More

    Submitted 11 October, 2021; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: The results on lifted RS codes have partially been presented at the IEEE International Symposium on Information Theory (ISIT) 2020 (arXiv:2001.11981) and parts of the results on lifted multiplicity codes have been presented at the IEEE Information Theory Workshop (ITW) 2020 (arXiv:2008.04717)

  12. arXiv:2108.13359  [pdf, ps, other

    cs.IT math.CO

    Fast Decoding of Union-free Codes

    Authors: Ilya Vorobyev

    Abstract: Union-free codes and disjunctive codes are two combinatorial structures, which are used in nonadaptive group testing to find a set of $d$ defective elements among $n$ samples by carrying out the minimal number of tests $t$. It is known that union-free codes have a larger rate, whereas disjunctive codes provide a more efficient decoding algorithm. In this paper we introduce a new family of codes fo… ▽ More

    Submitted 12 January, 2022; v1 submitted 30 August, 2021; originally announced August 2021.

  13. arXiv:2108.09015  [pdf, ps, other

    cs.IT

    Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise with Optimal Rate

    Authors: Ilya Vorobyev

    Abstract: In this paper we consider complete traceability multimedia fingerprinting codes resistant to averaging attacks and adversarial noise. Recently it was shown that there are no such codes for the case of an arbitrary linear attack. However, for the case of averaging attacks complete traceability multimedia fingerprinting codes of exponential cardinality resistant to constant adversarial noise were co… ▽ More

    Submitted 23 August, 2022; v1 submitted 20 August, 2021; originally announced August 2021.

  14. arXiv:2105.02298  [pdf, ps, other

    cs.IT

    Optimal Codes Correcting Localized Deletions

    Authors: Rawad Bitar, Serge Kas Hanna, Nikita Polyanskii, Ilya Vorobyev

    Abstract: We consider the problem of constructing codes that can correct deletions that are localized within a certain part of the codeword that is unknown a priori. Namely, the model that we study is when at most $k$ deletions occur in a window of size $k$, where the positions of the deletions within this window are not necessarily consecutive. Localized deletions are thus a generalization of burst deletio… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: 10 pages, a full version of the paper accepted to 2021 IEEE ISIT

  15. arXiv:2012.08786  [pdf, ps, other

    math.CO

    Wiener index and graphs, almost half of whose vertices satisfy Šoltés property

    Authors: Margarita Akhmejanova, Konstantin Olmezov, Aleksei Volostnov, Ilya Vorobyev, Konstantin Vorob'ev, Yury Yarovikov

    Abstract: The Wiener index $W(G)$ of a connected graph $G$ is a sum of distances between all pairs of vertices of $G$. In 1991, Šoltés formulated the problem of finding all graphs $G$ such that for every vertex $v$ the equation $W(G)=W(G-v)$ holds. The cycle $C_{11}$ is the only known graph with this property. In this paper we consider the following relaxation of the original problem: find a graph with a la… ▽ More

    Submitted 15 August, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: 7 pages, 3 figures, 2 tables; typos corrected

    MSC Class: 05C09; 05C12

  16. Feedback Insertion-Deletion Codes

    Authors: Georg Maringer, Nikita Polyanskii, Ilya Vorobyev, Lorenz Welter

    Abstract: In this paper, a new problem of transmitting information over the adversarial insertion-deletion channel with feedback is introduced. Suppose that the encoder transmits $n$ binary symbols one-by-one over a channel, in which some symbols can be deleted and some additional symbols can be inserted. After each transmission, the encoder is notified about the insertions or deletions that have occurred w… ▽ More

    Submitted 10 January, 2022; v1 submitted 29 October, 2020; originally announced October 2020.

    Comments: 33 pages, 8 figures

  17. arXiv:2008.04717  [pdf, ps, other

    cs.IT cs.DM

    Lifted Multiplicity Codes

    Authors: Lukas Holzbaur, Rina Polyanskaya, Nikita Polyanskii, Ilya Vorobyev, Eitan Yaakobi

    Abstract: Lifted Reed-Solomon codes and multiplicity codes are two classes of evaluation codes that allow for the design of high-rate codes that can recover every codeword or information symbol from many disjoint sets. Recently, the underlying approaches have been combined to construct lifted bi-variate multiplicity codes, that can further improve on the rate. We continue the study of these codes by providi… ▽ More

    Submitted 29 October, 2020; v1 submitted 11 August, 2020; originally announced August 2020.

  18. Almost Affinely Disjoint Subspaces

    Authors: Hedongliang Liu, Nikita Polyanskii, Ilya Vorobyev, Antonia Wachter-Zeh

    Abstract: In this work, we introduce a natural notion concerning finite vector spaces. A family of $k$-dimensional subspaces of $\mathbb{F}_q^n$, which forms a partial spread, is called almost affinely disjoint if any $(k+1)$-dimensional subspace containing a subspace from the family non-trivially intersects with only a few subspaces from the family. The central question discussed in the paper is the polyno… ▽ More

    Submitted 27 June, 2021; v1 submitted 3 July, 2020; originally announced July 2020.

    Comments: 10 pages; Published in Finite Fields and Their Applications, Volume 75, October 2021, 101879

    Journal ref: Finite Fields and Their Applications, Volume 75, October 2021, 101879

  19. arXiv:2001.11981  [pdf, ps, other

    cs.IT

    Lifted Reed-Solomon Codes with Application to Batch Codes

    Authors: Lukas Holzbaur, Rina Polyanskaya, Nikita Polyanskii, Ilya Vorobyev

    Abstract: Guo, Kopparty and Sudan have initiated the study of error-correcting codes derived by lifting of affine-invariant codes. Lifted Reed-Solomon (RS) codes are defined as the evaluation of polynomials in a vector space over a field by requiring their restriction to every line in the space to be a codeword of the RS code. In this paper, we investigate lifted RS codes and discuss their application to ba… ▽ More

    Submitted 4 February, 2020; v1 submitted 31 January, 2020; originally announced January 2020.

    Comments: 7 pages, 1 figure, a short version was submitted to ISIT 2020

  20. arXiv:2001.08005  [pdf, ps, other

    cs.IT math.CO

    Optimal Multistage Group Testing Algorithm for 3 Defectives

    Authors: Ilya Vorobyev

    Abstract: Group testing is a well-known search problem that consists in detecting of $s$ defective members of a set of $t$ samples by carrying out tests on properly chosen subsets of samples. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests in the worst case. In this work, a multistage group testing problem is considered. Our goal is to cons… ▽ More

    Submitted 15 May, 2020; v1 submitted 22 January, 2020; originally announced January 2020.

    MSC Class: 68R05

  21. arXiv:2001.06242  [pdf, ps, other

    cs.IT

    Duplication with transposition distance to the root for $q$-ary strings

    Authors: Nikita Polyanskii, Ilya Vorobyev

    Abstract: We study the duplication with transposition distance between strings of length $n$ over a $q$-ary alphabet and their roots. In other words, we investigate the number of duplication operations of the form $x = (abcd) \to y = (abcbd)$, where $x$ and $y$ are strings and $a$, $b$, $c$ and $d$ are their substrings, needed to get a $q$-ary string of length $n$ starting from the set of strings without du… ▽ More

    Submitted 17 January, 2020; originally announced January 2020.

    Comments: 6 pages, 1 table, submitted to International Symposium on Information Theory (ISIT) 2020

  22. arXiv:1902.01211  [pdf, other

    physics.ins-det hep-ex nucl-ex nucl-th

    A next-generation LHC heavy-ion experiment

    Authors: D. Adamová, G. Aglieri Rinella, M. Agnello, Z. Ahammed, D. Aleksandrov, A. Alici, A. Alkin, T. Alt, I. Altsybeev, D. Andreou, A. Andronic, F. Antinori, P. Antonioli, H. Appelshäuser, R. Arnaldi, I. C. Arsene, M. Arslandok, R. Averbeck, M. D. Azmi, X. Bai, R. Bailhache, R. Bala, L. Barioglio, G. G. Barnaföldi, L. S. Barnby , et al. (374 additional authors not shown)

    Abstract: The present document discusses plans for a compact, next-generation multi-purpose detector at the LHC as a follow-up to the present ALICE experiment. The aim is to build a nearly massless barrel detector consisting of truly cylindrical layers based on curved wafer-scale ultra-thin silicon sensors with MAPS technology, featuring an unprecedented low material budget of 0.05% X$_0$ per layer, with th… ▽ More

    Submitted 2 May, 2019; v1 submitted 31 January, 2019; originally announced February 2019.

    Comments: Input to the 2020 Update of the European Particle Physics Strategy

  23. arXiv:1901.06741  [pdf, ps, other

    cs.IT math.CO

    Constructions of Batch Codes via Finite Geometry

    Authors: Nikita Polyanskii, Ilya Vorobyev

    Abstract: A primitive $k$-batch code encodes a string $x$ of length $n$ into string $y$ of length $N$, such that each multiset of $k$ symbols from $x$ has $k$ mutually disjoint recovering sets from $y$. We develop new explicit and random coding constructions of linear primitive batch codes based on finite geometry. In some parameter regimes, our proposed codes have lower redundancy than previously known bat… ▽ More

    Submitted 20 January, 2019; originally announced January 2019.

    Comments: 7 pages, 1 figure, 1 table

  24. arXiv:1901.06740  [pdf, ps, other

    cs.IT

    A New Algorithm for Two-Stage Group Testing

    Authors: Ilya Vorobyev

    Abstract: Group testing is a well-known search problem that consists in detecting of $s$ defective members of a set of $t$ samples by carrying out tests on properly chosen subsets of samples. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests in the worst case. In this work, two-stage group testing is considered. Using the hypergraph approach… ▽ More

    Submitted 30 April, 2019; v1 submitted 20 January, 2019; originally announced January 2019.

    Comments: 7 pages, 1 table

  25. On capacities of the two-user union channel with complete feedback

    Authors: Zilin Jiang, Nikita Polyanskii, Ilya Vorobyev

    Abstract: The exact values of the optimal symmetric rate point in the Cover--Leung capacity region of the two-user union channel with complete feedback were determined by Willems when the size of the input alphabet is 2, and by Vinck, Hoeks and Post when the size is at least 6. We complete this line of research when the size of the input alphabet is 3, 4 or 5. The proof hinges on the technical lemma that co… ▽ More

    Submitted 5 December, 2018; v1 submitted 23 April, 2018; originally announced April 2018.

    Comments: 16 pages, 1 figure, 1 table, accepted to IEEE Trans. Inf. Theory, corrections suggested by the referees have been incorporated

    MSC Class: 94A40; 94A24; 94A17

    Journal ref: IEEE Transactions on Information Theory, vol. 65, no. 5, pp. 2774-2781, May 2019

  26. Online Calibration of the TPC Drift Time in the ALICE High Level Trigger

    Authors: David Rohr, Mikolaj Krzewicki, Chiara Zampolli, Jens Wiechula, Sergey Gorbunov, Alex Chauvin, Ivan Vorobyev, Steffen Weber, Kai Schweda, Volker Lindenstruth

    Abstract: ALICE (A Large Ion Collider Experiment) is one of four major experiments at the Large Hadron Collider (LHC) at CERN. The High Level Trigger (HLT) is a compute cluster, which reconstructs collisions as recorded by the ALICE detector in real-time. It employs a custom online data-transport framework to distribute data and workload among the compute nodes. ALICE employs subdetectors sensitive to env… ▽ More

    Submitted 26 December, 2017; originally announced December 2017.

    Comments: 8 pages, 10 figures, proceedings to 2016 IEEE-NPSS Real Time Conference

    Journal ref: IEEE Transactions on Nuclear Science, vol. 64, no. 6, pp. 1263-1270, June 2017

  27. arXiv:1701.07521  [pdf, other

    cs.IT

    Floor Scale Modulo Lifting for QC-LDPC codes

    Authors: Nikita Polyanskii, Vasiliy Usatyuk, Ilya Vorobyev

    Abstract: In the given paper we present a novel approach for constructing a QC-LDPC code of smaller length by lifting a given QC-LDPC code. The proposed method can be considered as a generalization of floor lifting. Also we prove several probabilistic statements concerning a theoretical improvement of the method with respect to the number of small cycles. Making some offline calculation of scale parameter i… ▽ More

    Submitted 4 February, 2017; v1 submitted 25 January, 2017; originally announced January 2017.

    Comments: 7 pages, 2 columns

  28. arXiv:1701.06201  [pdf, other

    cs.IT

    Hypothesis Test for Bounds on the Size of Random Defective Set

    Authors: A. G. D'yachkov, N. A. Polyanskii, V. Yu. Shchukin, I. V. Vorobyev

    Abstract: The conventional model of disjunctive group testing assumes that there are several defective elements (or defectives) among a large population, and a group test yields the positive response if and only if the testing group contains at least one defective element. The basic problem is to find all defectives using a minimal possible number of group tests. However, when the number of defectives is un… ▽ More

    Submitted 19 August, 2019; v1 submitted 22 January, 2017; originally announced January 2017.

    Comments: 10 pages, 3 figures

  29. arXiv:1701.06085  [pdf, other

    cs.IT

    Separable Codes for the Symmetric Multiple-Access Channel

    Authors: A. G. Dyachkov, N. Polyanskii, V. Shchukin, I. Vorobyev

    Abstract: A binary matrix is called an s-separable code for the disjunctive multiple-access channel (disj-MAC) if Boolean sums of sets of s columns are all distinct. The well-known issue of the combinatorial coding theory is to obtain upper and lower bounds on the rate of s-separable codes for disj-MAC. In our paper, we generalize the problem and discuss upper and lower bounds on the rate of q-ary s-separab… ▽ More

    Submitted 2 August, 2018; v1 submitted 21 January, 2017; originally announced January 2017.

    Comments: 15 pages

  30. arXiv:1607.00511  [pdf, ps, other

    cs.IT

    On a Hypergraph Approach to Multistage Group Testing Problems

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Group testing is a well known search problem that consists in detecting up to $s$ defective elements of the set $[t]=\{1,\ldots,t\}$ by carrying out tests on properly chosen subsets of $[t]$. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests. In this paper we consider multistage group testing. We propose a general idea how to use a… ▽ More

    Submitted 2 July, 2016; originally announced July 2016.

    Comments: ACCT 2016, 6 pages

  31. arXiv:1607.00507  [pdf, ps, other

    cs.IT cs.DS

    Adaptive Learning a Hidden Hypergraph

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Learning a hidden hypergraph is a natural generalization of the classical group testing problem that consists in detecting unknown hypergraph $H_{un}=H(V,E)$ by carrying out edge-detecting tests. In the given paper we focus our attention only on a specific family $\mathcal{F}(t,s,\ell)$ of localized hypergraphs for which the total number of vertices $|V| = t$, the number of edges $|E|\le s$,… ▽ More

    Submitted 2 July, 2016; originally announced July 2016.

    Comments: ACCT 2016, 6 pages. arXiv admin note: text overlap with arXiv:1601.06705

  32. arXiv:1607.00502  [pdf, ps, other

    cs.IT

    Threshold Decoding for Disjunctive Group Testing

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Let $1 \le s < t$, $N \ge 1$ be integers and a complex electronic circuit of size $t$ is said to be an $s$-active, $\; s \ll t$, and can work as a system block if not more than $s$ elements of the circuit are defective. Otherwise, the circuit is said to be an $s$-defective and should be replaced by a similar $s$-active circuit. Suppose that there exists a possibility to run $N$ non-adaptive group… ▽ More

    Submitted 2 July, 2016; originally announced July 2016.

    Comments: ACCT 2016, 6 pages

  33. arXiv:1605.06847  [pdf, ps, other

    cs.IT

    A simple construction of cover-free $(s,\ell)$-code with certain constant weight

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: We give a method of constructing a cover-free $(s, \ell)$-code. For $k > s$, our construction yields a $ {{n \choose s} \choose \ell}\times {n \choose k}$ cover-free $(s, \ell)$-code with a constant column weight.

    Submitted 22 May, 2016; originally announced May 2016.

    Comments: 2 pages

  34. arXiv:1605.05363  [pdf, ps, other

    cs.IT

    Bounds on the rate of disjunctive codes (in Russian)

    Authors: A. G. Dyachkov, N. Polyanskii, V. Shchukin, I. Vorobyev

    Abstract: A binary code is called a superimposed cover-free $(s,\ell)$-code if the code is identified by the incidence matrix of a family of finite sets in which no intersection of $\ell$ sets is covered by the union of $s$ others. A binary code is called a superimposed list-decoding $s_L$-code if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets ca… ▽ More

    Submitted 17 May, 2016; originally announced May 2016.

    Comments: 36 pages, Original Russian Text published in Problemy Peredachi Informatsii, 2014, Vol. 50, No. 1, pp. 31-63

  35. arXiv:1601.06709  [pdf, ps, other

    cs.IT

    Threshold Disjunctive Codes

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Let $1 \le s < t$, $N \ge 1$ be integers and a complex electronic circuit of size $t$ is said to be an $s$-active, $\; s \ll t$, and can work as a system block if not more than $s$ elements of the circuit are defective. Otherwise, the circuit is said to be an $s$-defective and should be substituted for the similar $s$-active circuit. Suppose that there exists a possibility to check the $s$-activit… ▽ More

    Submitted 25 January, 2016; originally announced January 2016.

    Comments: 9 pages, IEEE conference

  36. On Multistage Learning a Hidden Hypergraph

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Learning a hidden hypergraph is a natural generalization of the classical group testing problem that consists in detecting unknown hypergraph $H_{un}=H(V,E)$ by carrying out edge-detecting tests. In the given paper we focus our attention only on a specific family $F(t,s,\ell)$ of localized hypergraphs for which the total number of vertices $|V| = t$, the number of edges $|E|\le s$, $s\ll t$, and t… ▽ More

    Submitted 17 May, 2016; v1 submitted 25 January, 2016; originally announced January 2016.

    Comments: 5 pages, IEEE conference

  37. On a Hypergraph Approach to Multistage Group Testing Problems

    Authors: A. G. D'yachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: Group testing is a well known search problem that consists in detecting up to $s$ defective elements of the set $[t]=\{1,\ldots,t\}$ by carrying out tests on properly chosen subsets of $[t]$. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests. In this paper we consider multistage group testing. We propose a general idea how to use a… ▽ More

    Submitted 25 January, 2016; originally announced January 2016.

    Comments: 5 pages, IEEE conference

  38. arXiv:1410.8566  [pdf, ps, other

    cs.IT

    Almost Cover-Free Codes and Designs

    Authors: Arkadii D'yachkov, Ilya Vorobyev, Nikita Polyanskii, Vladislav Shchukin

    Abstract: An $s$-subset of codewords of a binary code $X$ is said to be an {\em $(s,\ell)$-bad} in $X$ if the code $X$ contains a subset of other $\ell$ codewords such that the conjunction of the $\ell$ codewords is covered by the disjunctive sum of the $s$ codewords. Otherwise, the $s$-subset of codewords of $X$ is said to be an {\em $(s,\ell)$-good} in~$X$.mA binary code $X$ is said to be a cover-free… ▽ More

    Submitted 25 March, 2015; v1 submitted 30 October, 2014; originally announced October 2014.

    Comments: 18 pages, conference paper

  39. arXiv:1410.8385  [pdf, other

    cs.IT

    Symmetric Disjunctive List-Decoding Codes

    Authors: Arkadii D'yachkov, Ilya Vorobyev, Nikita Polyanskii, Vladislav Shchukin

    Abstract: A binary code is said to be a disjunctive list-decoding $s_L$-code (LD $s_L$-code), $s \ge 2$, $L \ge 1$, if the code is identified by the incidence matrix of a family of finite sets in which the union (or disjunctive sum) of any $s$ sets can cover not more than $L-1$ other sets of the family. In this paper, we consider a similar class of binary codes which are based on a {\em symmetric disjunctiv… ▽ More

    Submitted 29 March, 2015; v1 submitted 30 October, 2014; originally announced October 2014.

    Comments: 18 pages, 1 figure, 1 table, conference paper

  40. arXiv:1407.2482  [pdf, ps, other

    cs.IT

    Almost Disjunctive List-Decoding Codes

    Authors: A. G. Dyachkov, I. V. Vorobyev, N. A. Polyanskii, V. Yu. Shchukin

    Abstract: A binary code is said to be a disjunctive list-decoding $s_L$-code, $s\ge1$, $L\ge1$, (briefly, LD $s_L$-code) if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets can cover not more than $L-1$ other sets of the family. In this paper, we introduce a natural {\em probabilistic} generalization of LD $s_L$-code when the code is said to be an… ▽ More

    Submitted 9 July, 2014; originally announced July 2014.

    Comments: 17 pages, 1 table

  41. Bounds on the rate of superimposed codes

    Authors: Arkady D'yachkov, Ilya Vorobyev, Nikita Polianskii, Vladislav Shchukin

    Abstract: A binary code is called a superimposed cover-free $(s,\ell)$-code if the code is identified by the incidence matrix of a family of finite sets in which no intersection of $\ell$ sets is covered by the union of $s$ others. A binary code is called a superimposed list-decoding $s_L$-code if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets ca… ▽ More

    Submitted 17 May, 2016; v1 submitted 30 December, 2013; originally announced January 2014.

    Comments: 32 pages, 3 tables. We have found a mistake in the article. More precisely, the proof of Theorem 4 is incorrect

  42. arXiv:hep-ex/0612064  [pdf

    hep-ex

    Search for Two-Particle Muon Decay to Positron and Goldstone Massless Boson (FAMILON)

    Authors: V. A. Andreev, V. S. Demidov, E. V. Demidova, V. N. Duginov, Yu. V. Elkin, V. A. Gordeev, K. I. Gritsai, S. A. Gustov, V. G. Ivochkin, E. M. Karasev, M. Yu. Khlopov, E. N. Komarov, S. V. Kosianenko, A. G. Krivshich, M. P. Levchenko, T. N. Mamedov, I. V. Mirokhin, V. G. Olshevsky, Yu. A. Scheglov, G. V. Scherbakov, A. Yu. Sokolov, Yu. P. Schkurenko, A. V. Stoykov, S. I. Vorobyev, A. A. Zhdanov , et al. (1 additional authors not shown)

    Abstract: The experimental test of possible expansion for the Higgs sector is proposed. The lepton family violation will be studied. To reach this goal we are going to carry out the search for the scalar Goldstone boson in the neutrinoless muon decay mu+ to e+ and alpha. The asymmetry of the muon decay near the high energy edge of Michel spectrum is to be measured. To examine previous TRIUMF data the expe… ▽ More

    Submitted 28 December, 2006; originally announced December 2006.

    Comments: 15 pages, 6 figures