A tight asymptotic bound on the size of constant-weight conflict-avoiding codes

被引:0
作者
Kenneth W. Shum
Wing Shing Wong
机构
[1] The Chinese University of Hong Kong,Department of Information Engineering
来源
Designs, Codes and Cryptography | 2010年 / 57卷
关键词
Conflict-avoiding codes; Protocol sequences; Collision channel without feedback; 94B65; 94B25; 11P99;
D O I
暂无
中图分类号
学科分类号
摘要
In the study of multiple-access in the collision channel, conflict-avoiding code is used to guarantee that each transmitting user can send at least one packet successfully in the worst case within a fixed period of time, provided that at most k users out of M potential users are active simultaneously. The number of codewords in a conflict-avoiding code determines the number of potential users that can be supported in a system. Previously, upper bound on the size of conflict-avoiding code is known only for Hamming weights three, four and five. The asymptotic upper in this paper extends the known results to all Hamming weights, and is proved to be tight by exhibiting infinite sequences of conflict-avoiding codes which meet this bound asymptotically for all Hamming weights.
引用
收藏
页码:1 / 14
页数:13
相关论文
共 31 条
  • [1] Chen C.S.(2008)Constructions of robust protocol sequences for wireless sensor and ad hoc networks IEEE Trans. Veh. Tech. 57 3053-3063
  • [2] Wong W.S.(2000)Protocol sequences for collision channel without feedback IEE Electron. Lett. 36 2010-2012
  • [3] Song Y.Q.(1993)Construction of protocol sequences for multiple-access collision channel without feedback IEEE Trans. Inform. Theory 39 1762-1765
  • [4] da Rocha V.C.(2007)On conflict-avoiding codes of length IEEE Trans. Inform. Theory 53 2732-2742
  • [5] Györfi L.(1953) = 4 Math. Zeit. 58 459-484
  • [6] Vajda I.(2007) for three active users Probl. Inform. Transm. 43 199-212
  • [7] Jimbo M.(1993)Abschätzungen der asymptotischen dichte von summenmengen IEEE Trans. Inform. Theory 39 656-662
  • [8] Mishima M.(1985)Conflict-avoiding codes for three active users and cyclic triple systems IEEE Trans. Inform. Theory 31 192-204
  • [9] Janiszewski S.(1990)Perfect ( IEEE Trans. Inform. Theory 36 1206-1219
  • [10] Teymorian A.Y.(2009), Des. Codes Cryptogr. 52 275-291