Skip to main content

Showing 1–8 of 8 results for author: Praeger, C E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2110.01277  [pdf, ps, other

    cs.IT math.CO

    Sequences of linear codes where the rate times distance grows rapidly

    Authors: Faezeh Alizadeh, S. P. Glasby, Cheryl E. Praeger

    Abstract: For a linear code $C$ of length $n$ with dimension $k$ and minimum distance $d$, it is desirable that the quantity $kd/n$ is large. Given an arbitrary field $\mathbb{F}$, we introduce a novel, but elementary, construction that produces a recursively defined sequence of $\mathbb{F}$-linear codes $C_1,C_2, C_3, \dots$ with parameters $[n_i, k_i, d_i]$ such that $k_id_i/n_i$ grows quickly in the sens… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

    Comments: 13 pages

    MSC Class: 94B65; 94B05; 94B15

  2. arXiv:1608.04079  [pdf, ps, other

    math.CO cs.IT math.AC

    Twisted Centralizer Codes

    Authors: Adel Alahmadi, S. P. Glasby, Cheryl E. Praeger, Patrick Solé, Bahattin Yildiz

    Abstract: Given an $n\times n$ matrix $A$ over a field $F$ and a scalar $a\in F$, we consider the linear codes $C(A,a):=\{B\in F^{n\times n}\mid \,AB=aBA\}$ of length $n^2$. We call $C(A,a)$ a twisted centralizer code. We investigate properties of these codes including their dimensions, minimum distances, parity-check matrices, syndromes, and automorphism groups. The minimal distance of a centralizer code (… ▽ More

    Submitted 12 March, 2017; v1 submitted 14 August, 2016; originally announced August 2016.

    Comments: 14 pages. Proof of Proposition 2.6 corrected (see last 3 lines). Email address of last author changed

    MSC Class: 94B05; 13M05

  3. arXiv:1607.05838  [pdf, ps, other

    math.CO cs.IT math.AC

    On the dimension of twisted centralizer codes

    Authors: S. P. Glasby, Cheryl E. Praeger, Adel Alahmadi

    Abstract: Given a field $F$, a scalar $λ\in F$ and a matrix $A\in F^{n\times n}$, the twisted centralizer code $C_F(A,λ):=\{B\in F^{n\times n}\mid AB-λBA=0\}$ is a linear code of length $n^2$. When $A$ is cyclic and $λ\ne0$ we prove that $\dim C_F(A,λ)=\mathrm{deg}(\gcd(c_A(t),λ^n c_A(λ^{-1}t)))$ where $c_A(t)$ denotes the characteristic polynomial of $A$. We also show how $C_F(A,λ)$ decomposes, and we esti… ▽ More

    Submitted 14 July, 2017; v1 submitted 20 July, 2016; originally announced July 2016.

    Comments: 17 pages, 2 figures Proof of Theorem 2.8 altered: last line and third last line changed

    MSC Class: 94B65; 60C05

  4. arXiv:1305.5617  [pdf, ps, other

    cs.DS math.GR

    Showcasing straight-line programs with memory via matrix Bruhat decomposition

    Authors: Alice C. Niemeyer, Tomasz Popiel, Cheryl E. Praeger, Daniel Rademacher

    Abstract: We suggest that straight-line programs designed for algebraic computations should be accompanied by a comprehensive complexity analysis that takes into account both the number of fundamental algebraic operations needed, as well as memory requirements arising during evaluation. We introduce an approach for formalising this idea and, as illustration, construct and analyse straight-line programs for… ▽ More

    Submitted 23 April, 2024; v1 submitted 24 May, 2013; originally announced May 2013.

  5. arXiv:1208.4455  [pdf, ps, other

    math.CO cs.IT

    Elusive Codes in Hamming Graphs

    Authors: Daniel R. Hawtin, Neil I. Gillespie, Cheryl E. Praeger

    Abstract: We consider a code to be a subset of the vertex set of a Hamming graph. We examine elusive pairs, code-group pairs where the code is not determined by knowledge of its set of neighbours. We construct a new infinite family of elusive pairs, where the group in question acts transitively on the set of neighbours of the code. In our examples, we find that the alphabet size always divides the length of… ▽ More

    Submitted 8 May, 2014; v1 submitted 22 August, 2012; originally announced August 2012.

    MSC Class: 94B60; 05E18

  6. arXiv:1208.0393  [pdf, ps, other

    math.CO cs.IT

    Classification of a family of completely transitive codes

    Authors: Neil I. Gillespie, Michael Giudici, Cheryl E. Praeger

    Abstract: The completely regular codes in Hamming graphs have a high degree of combinatorial symmetry and have attracted a lot of interest since their introduction in 1973 by Delsarte. This paper studies the subfamily of completely transitive codes, those in which an automorphism group is transitive on each part of the distance partition. This family is a natural generalisation of the binary completely tran… ▽ More

    Submitted 26 October, 2012; v1 submitted 1 August, 2012; originally announced August 2012.

    Comments: 16 pages

    MSC Class: 05C25; 20B25; 94B05

  7. arXiv:1205.6586  [pdf, ps, other

    math.GR cs.DM

    Identifying long cycles in finite alternating and symmetric groups acting on subsets

    Authors: Steve Linton, Alice C. Niemeyer, Cheryl E. Praeger

    Abstract: Let $H$ be a permutation group on a set $Λ$, which is permutationally isomorphic to a finite alternating or symmetric group $A_n$ or $S_n$ acting on the $k$-element subsets of points from $\{1,\ldots,n\}$, for some arbitrary but fixed $k$. Suppose moreover that no isomorphism with this action is known. We show that key elements of $H$ needed to construct such an isomorphism $\varphi$, such as thos… ▽ More

    Submitted 24 April, 2015; v1 submitted 30 May, 2012; originally announced May 2012.

    Comments: 45 pages

    MSC Class: 20B30; 60C05; 20P05; 05A05

    Journal ref: Journal of Algebra Combinatorics Discrete Structures and Applications, Volume: 2, Issue: 2, pp:117-149, 2015

  8. arXiv:0705.0933  [pdf, ps, other

    math.RA cs.DS

    Computing Minimal Polynomials of Matrices

    Authors: Max Neunhoeffer, Cheryl E. Praeger

    Abstract: We present and analyse a Monte-Carlo algorithm to compute the minimal polynomial of an $n\times n$ matrix over a finite field that requires $O(n^3)$ field operations and O(n) random vectors, and is well suited for successful practical implementation. The algorithm, and its complexity analysis, use standard algorithms for polynomial and matrix operations. We compare features of the algorithm with… ▽ More

    Submitted 7 April, 2008; v1 submitted 7 May, 2007; originally announced May 2007.

    MSC Class: 15A21;15A15