Some constructions of conflict-avoiding codes

被引:0
|
作者
Tsybakov, B.S.
Rubinov, A.R.
机构
来源
Problemy Peredachi Informatsii | 2002年 / 38卷 / 04期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
17
引用
收藏
页码:24 / 36
相关论文
共 50 条
  • [11] Strongly Conflict-Avoiding Codes with Weight Three
    Yu, Zhihua
    Wang, Jinhua
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (01) : 153 - 165
  • [12] Strongly Conflict-Avoiding Codes with Weight Three
    Zhihua Yu
    Jinhua Wang
    Wireless Personal Communications, 2015, 84 : 153 - 165
  • [13] A new series of optimal tight conflict-avoiding codes
    Mishima, Miwako
    Momihara, Koji
    DISCRETE MATHEMATICS, 2017, 340 (04) : 617 - 629
  • [14] Optimal conflict-avoiding codes for three active users
    Levenshtein, VI
    Tonchev, VD
    2005 IEEE International Symposium on Information Theory (ISIT), Vols 1 and 2, 2005, : 535 - 537
  • [15] New Results on Optimal Multichannel Conflict-Avoiding Codes
    Lo, Yuan-Hsun
    Gu, Wen-Wen
    Zhang, Yijin
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 3086 - 3091
  • [16] Conflict-Avoiding Codes of Prime Lengths and Cyclotomic Numbers
    Hsia, Liang-Chung
    Li, Hua-Chieh
    Sun, Wei-Liang
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (10) : 6834 - 6841
  • [17] Multichannel Conflict-Avoiding Codes of Weights Three and Four
    Lo, Yuan-Hsun
    Shum, Kenneth W.
    Wong, Wing Shing
    Zhang, Yijin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (06) : 3557 - 3568
  • [18] A New Upper Bound and Optimal Constructions of Equi-Difference Conflict-Avoiding Codes on Constant Weight
    Zhao, Chun-E
    Sun, Yuhua
    International Journal of Network Security, 2022, 24 (01) : 62 - 67
  • [19] Certain diagonal equations and conflict-avoiding codes of prime lengths
    Hsia, Liang-Chung
    Li, Hua-Chieh
    Sun, Wei-Liang
    FINITE FIELDS AND THEIR APPLICATIONS, 2023, 92
  • [20] Optimal conflict-avoiding codes of odd length and weight three
    Hung-Lin Fu
    Yuan-Hsun Lo
    Kenneth W. Shum
    Designs, Codes and Cryptography, 2014, 72 : 289 - 309