Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where van Hca Henk Tilborg is active.

Publication


Featured researches published by van Hca Henk Tilborg.


IEEE Transactions on Information Theory | 1978

On the inherent intractability of certain coding problems (Corresp.)

Er Berlekamp; Robert J. McEliece; van Hca Henk Tilborg

MEMBER, IEEE, AND HENK C. A. V~ TILBORG The fact that the general decoding problem for linear codes and the general problem of finding the weights of a linear code are both NP-complete is shown. This strongly suggests, but does not rigorously imply, that no algorithm for either of these problems which runs in polynomial time exists.


IEEE Transactions on Information Theory | 1978

On quasi-cyclic codes with rate l m (Corresp.)

van Hca Henk Tilborg

An integer linear programming problem and an additional divisibility condition are described such that they have a common solution if and only if there is a quasi-cyclic code with rate 1/m . A table of binary quasi-cyclic codes with dimensions seven and eight and rate 1/m for small m is included. In particular, there are binary linear codes with (length, dimension, minimum distance) =(35, 7,16), (42, 7,19), (80, 8, 37), (96, 8, 46) , and (112,8,54) .


IEEE Transactions on Information Theory | 1994

The Leech lattice and the Golay code: bounded-distance decoding and multilevel constructions

Ofer Amrani; Yair Be'ery; Alexander Vardy; Feng-Wen Sun; van Hca Henk Tilborg

Multilevel constructions of the binary Golay code and the Leech lattice are described. Both constructions are based upon the projection of the Golay code and the Leech lattice onto the (6,3,4) hexacode over GF(4). However, unlike the previously reported constructions, the new multilevel constructions make the three levels independent by way of using a different set of coset representatives for one of the quaternary coordinates. Based upon the multilevel structure of the Golay code and the Leech lattice, efficient bounded-distance decoding algorithms are devised. The bounded-distance decoder for the binary Golay code requires at most 431 operations. As compared to 651 operations for the best known maximum-likelihood decoder. Efficient bounded-distance decoding of the Leech lattice is achieved by means of partitioning it into four cosets of Q/sub 24/, beyond the conventional partition into two H/sub 24/ cosets. The complexity of the resulting decoder is only 953 real operations on the average and 1007 operations in the worst case, as compared to about 3600 operations for the best known in maximum-likelihood decoder. It is shown that the proposed algorithms decode correctly at least up to the guaranteed error-correction radius of the maximum-likelihood decoder. Thus, the loss in coding-gain is due primarily to an increase in the effective error-coefficient, which is calculated exactly for both algorithms. Furthermore, the performance of the Leech lattice decoder on the AWGN channel is evaluated experimentally by means of a comprehensive computer simulation. The results show a loss in coding-gain of less than 0.1 dB relative to the maximum-likelihood decoder for BER ranging from 10/sup -1/ to 10/sup -7/. >


IEEE Transactions on Information Theory | 1999

On the complexity of minimum distance decoding of long linear codes

Alexander Barg; E Krouk; van Hca Henk Tilborg

We suggest a decoding algorithm of q-ary linear codes, which we call supercode decoding. It ensures the error probability that approaches the error probability of minimum-distance decoding as the length of the code grows. For n/spl rarr//spl infin/ the algorithm has the maximum-likelihood performance. The asymptotic complexity of supercode decoding is exponentially smaller than the complexity of all other methods known. The algorithm develops the ideas of covering-set decoding and split syndrome decoding.


IEEE Transactions on Information Theory | 1986

On the existence of optimum cyclic burst- correcting codes

Kas Abdel-Ghaffar; Robert J. McEliece; Andrew M. Odlyzko; van Hca Henk Tilborg

It is shown that for each integer b \geq 1 infinitely many optimum cyclic b -burst-correcting codes exist, i.e., codes whose length n , redundancy r , and burst-correcting capability b , satisfy n = 2^{r-b+1} - 1 . Some optimum codes for b = 3, 4 , and 5 are also studied in detail.


IEEE Transactions on Information Theory | 1998

Some new binary, quasi-cyclic codes

Pw Petra Heijnen; van Hca Henk Tilborg; T Tom Verhoeff; S Sander Weijs

By means of local search techniques, five quasi-cyclic codes have been found that have a higher minimum distance than known binary linear codes. The new codes have parameters [102,17,37], [60,20,17], [84,21,27], [105,21,36], and [100,25,30]. Also, 39 other quasi-cyclic codes have been found that improve the parameter sets of previously known quasi-cyclic codes. Twenty-four of them give a new and easier description of binary linear codes with best known parameters.


IEEE Transactions on Information Theory | 1978

An upper bound for codes in a two-access binary erasure channel (Corresp.)

van Hca Henk Tilborg

A method for determining an upper bound for the size of a code for a two-access binary erasure channel is presented. For uniquely decodable codes, this bound gives a combinatorial proof of a result by Liao. Examples of the bound are given for codes with minimum distance 4.


IEEE Transactions on Information Theory | 1993

Error-correcting codes with bounded running digital sum

Mario Blaum; Simon Litsyn; Vincent Buskens; van Hca Henk Tilborg

A new approach for encoding any string of information bits into a sequence having bounded running digital sum is presented. The results improve previously known values of the running digital sum for the same rate. Also discussed are ways of incorporating an error-correcting capability into these codes. Some general constructions are given and tables are constructed for specific cases. >


IEEE Transactions on Information Theory | 1985

On the covering radius of binary, linear codes meeting the Griesmer bound

Pb Peter Busschbach; Mgl Michiel Gerretzen; van Hca Henk Tilborg

Let g(k, d) = \sum_{i=0}^{k-1} \lceil d / 2^{i} \rceil . By the Griesmer bound, n \geq g(k, d) for any binary, linear [n, k, d] code. Let s = \lceil d / 2^{k-1} \rceil . Then, s can be interpreted as the maximum number of occurrences of a column in the generator matrix of any code with parameters [g(k, d), k, d] . Let \rho be the covering radius of a [g(k, d), k, d] code. It will be shown that \rho \leq d - \lceil s / 2 \rceil . Moreover, the existence of a [g(k, d), k, d] code with \rho = d - \lceil s / 2 \rceil is equivalent to the existence of a [g(k + 1, d), k + 1, d] code. For s \leq 2 , all [g(k,d),k,d] codes with \rho = d - \lceil s / 2 \rceil are described, while for s > 2 a sufficient condition for their existence is formulated.


IEEE Transactions on Information Theory | 1979

Symbol synchronization in convolutionally coded systems (Corresp.)

L Baumert; Robert J. McEliece; van Hca Henk Tilborg

Alternate symbol inversion is sometimes applied to the output of convolutional encoders to guarantee sufficient richness of symbol transition for the receiver symbol synchronizer. A bound is given for the length of the transition-free symbol stream in such systems, and those convolutional codes are characterized in which arbitrarily long transition free runs occur.

Collaboration


Dive into the van Hca Henk Tilborg's collaboration.

Top Co-Authors

Avatar

Robert J. McEliece

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kas Abdel-Ghaffar

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Feng-Wen Sun

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar

Pw Petra Heijnen

Eindhoven University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge