Correction to "An asymptotically nonadaptive algorithm for conflict resolution i
IEEE Transactions on Information Theory
Data networks
American Mathematical Monthly
Locality in distributed graph algorithms
SIAM Journal on Computing
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
On the upper bound of the size of the r-cover-free families
Journal of Combinatorial Theory Series A
Exploiting storage redundancy to speed up randomized shared memory simulations
Theoretical Computer Science
Deterministic restrictions in circuit complexity
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Randomized group testing for mutually obscuring defectives
Information Processing Letters
Improved algorithms for group testing with inhibitors
Information Processing Letters
Selective families, superimposed codes, and broadcasting on unknown radio networks
SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
MFCS '94 Proceedings of the 19th International Symposium on Mathematical Foundations of Computer Science 1994
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Reconstructing strings from substrings in rounds
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Deterministic Superimposed Coding with Applications to Pattern Matching
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Group Testing Problems with Sequences in Experimental Molecular Biology
SEQUENCES '97 Proceedings of the Compression and Complexity of Sequences 1997
Modulation and coding for the Gaussian collision channel
IEEE Transactions on Information Theory
Generalized framework for selectors with applications in optimal group testing
ICALP'03 Proceedings of the 30th international conference on Automata, languages and programming
Hi-index | 0.00 |
In this paper we introduce a parameterized generalization of the well known superimposed codes. We give algorithms for their constructions and we provide non-existential results. We apply our new combinatorial structures to the efficient solution of new group testing problems and access coordination issues in multiple access channels.