Explicit construction of exponential sized families of k-independent sets

From MaRDI portal
Publication:1073031

DOI10.1016/0012-365X(86)90161-5zbMath0588.05003MaRDI QIDQ1073031

Noga Alon

Publication date: 1986

Published in: Discrete Mathematics (Search for Journal in Brave)




Related Items

On the upper bound of the size of the \(r\)-cover-free familiesPerfect Hash Families: Constructions and ExistenceDeterministic constructions of high-dimensional sets with small dispersionGeneralised cumulative arrays in secret sharingRoux-type constructions for covering arrays of strengths three and fourSecret sharing schemes with partial broadcast channelsOn the maximum number of qualitative independent partitionsLinear Time Constructions of Some $$d$$-Restriction ProblemsStrengthening hash families and compressive sensingA hierarchical framework for recovery in compressive sensingExplicit constructions of centrally symmetric \(k\)-neighborly polytopes and large strictly antipodal setsUnnamed ItemApplications of coding theory to communication combinatorial problemsStrong qualitative independence.A polynomial algorithm for constructing families of k-independent setsColoring chains for compression with uncertain priorsRényi 100, quantitative and qualitative (in)dependenceOrientations making \(k\)-cycles cyclic\(t\)-CIS codes over \(\mathrm{GF}(p)\) and orthogonal arraysA Graham-Sloane type construction for \(s\)-surjective matricesApplication of coding theory to interconnection networksSome baby-step giant-step algorithms for the low hamming weight discrete logarithm problemExplicit constructions of perfect hash families from algebraic curves over finite fieldsNew constructions for IPP codesOn the contact dimensions of graphsSeparable collusion-secure multimedia codesExplicit constructions for perfect hash familiesOn the capacity of Boolean graph formulæArrays for combinatorial interaction testing: a review on constructive approachesOptimal linear perfect hash familiesTropical Complexity, Sidon Sets, and Dynamic ProgrammingImproving two recursive constructions for covering arraysRESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMESPerfect hash families: Probabilistic methods and explicit constructions



Cites Work