首页 | 本学科首页   官方微博 | 高级检索  
     


Linear hash families and forbidden configurations
Authors:Charles J. Colbourn  Alan C. H. Ling
Affiliation:(1) Computer Science and Engineering, Arizona State University, P.O. Box 878809, Tempe, AZ 85287, USA;(2) Computer Science, University of Vermont, Burlington, VT 05405, USA
Abstract:The classical orthogonal arrays over the finite field underlie a powerful construction of perfect hash families. By forbidding certain sets of configurations from arising in these orthogonal arrays, this construction yields previously unknown perfect, separating, and distributing hash families. When the strength s of the orthogonal array, the strength t of the hash family, and the number of its rows are all specified, the forbidden sets of configurations can be determined explicitly. Each forbidden set leads to a set of equations that must simultaneously hold. Hence computational techniques can be used to determine sufficient conditions for a perfect, separating, and distributing hash family to exist. In this paper the forbidden configurations, resulting equations, and existence results are determined when (s, t) ∈ {(2, 5), (2, 6), (3, 4), (4, 3)}. Applications to the existence of covering arrays of strength at most six are presented.
Keywords:Perfect hash family  Separating hash family  Orthogonal array  Covering array  Finite field
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号