Families of finite sets in which no set is covered by the union of \(r\) others

From MaRDI portal
Publication:1072559

DOI10.1007/BF02772959zbMath0587.05021OpenAlexW2164604747WikidataQ105487976 ScholiaQ105487976MaRDI QIDQ1072559

Paul Erdős, Peter Frankl, Zoltan Fueredi

Publication date: 1985

Published in: Israel Journal of Mathematics (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/bf02772959




Related Items (only showing first 100 items - show all)

On secret sharing, randomness, and random-less reductions for secret sharingParadigms for Unconditional Pseudorandom GeneratorsBounds and algorithms for generalized superimposed codesA New Design of Online/Offline Signatures Based on LatticeLattice-based programmable hash functions and applicationsImproved bounds for the dimension of divisibilityUnnamed ItemExplicit constructions of perfect hash families from algebraic curves over finite fieldsA new kind of selectors and their applications to conflict resolution in wireless multichannels networksBroadcast authentication for group communicationExtracting all the randomness and reducing the error in Trevisan's extractorsHardness of approximate two-level logic minimization and PAC learning with membership queriesOn the upper bound of the size of the \(r\)-cover-free families2-Cancellative Hypergraphs and CodesOn the structure of a class of sets useful in nonadaptive group testingA fast network-decomposition algorithm and its applications to constant-time distributed computationHash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message SecurityGeneralized framework for group testing: queries, feedbacks and adversariesError-correcting pooling designs associated with the dual space of unitary space and ratio efficiency comparisonOn the extremal combinatorics of the Hamming spaceProgrammable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public KeysTracing a single userA Fast Network-Decomposition Algorithm and Its Applications to Constant-Time Distributed ComputationGeneralised cumulative arrays in secret sharingSecret sharing schemes with partial broadcast channelsA simple construction of \(d\)-disjunct matrices with certain constant weightsOn key storage in secure networksConstraining the number of positive responses in adaptive, non-adaptive, and two-stage group testingFinding defective coinsStructure-aware combinatorial group testing: a new method for pandemic screeningStrongly separable matrices for nonadaptive combinatorial group testingExploring the missing link among \(d\)-separable, \(\overline d\)-separable and \(d\)-disjunct matricesHomomorphic signatures with sublinear public keys via asymmetric programmable hash functionsNew error-correcting pooling designs with vector spaces over finite fieldBroadcasting in an Unreliable SINR Model.Black-box Trace\&Revoke codesFaster deterministic wakeup in multiple access channelsModification tolerant signature schemes: location and correctionUniform hypergraphs containing no gridsInformation dissemination in unknown radio networks with large labelsConstructing error-correcting pooling designs with symplectic space$$\epsilon $$-Almost Selectors and Their ApplicationsLeader election in ad hoc radio networks: a keen ear helpsInformation gathering in ad-hoc radio networks with tree topologySeparating codes and a new combinatorial search modelA Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage ModelGeneralization of IPP codes and IPP set systemsTraceability codes and their generalizationsOn the complexity of neighbourhood learning in radio networksDistributed broadcast in radio networks of unknown topology.Locating and detecting arrays for interaction faultsNew combinatorial structures with applications to efficient group testing with inhibitorsSpanoids---An Abstraction of Spanning Structures, and a Barrier for LCCsOn non-binary traceability set systemsA note on the uniqueness of \((w, r)\) cover-free codesForbidden configurations and repeated inductionRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreConstructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels.Generalized cover-free families.New Turán Exponents for Two Extremal Hypergraph ProblemsSome intriguing upper bounds for separating hash familiesExistence and construction of complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noiseSome new bounds for cover-free familiesFaster information gathering in ad-hoc radio tree networksGeneral theory of information transfer: UpdatedCoding for a multiple access OR channel: A surveyEfficiently Decodable Error-Correcting List Disjunct Matrices and ApplicationsTransport schemes for topology-transparent schedulingNew Construction of Error-Tolerant Pooling DesignsCombinatorial algorithms for distributed graph coloringPseudo-random graphs and bit probe schemes with one-sided errorSome new bounds for cover-free families through biclique coversFamilies of finite sets in which no intersection of \(\ell\) sets is covered by the union of \(s\) othersPredicate signatures from pair encodings via dual system proof techniqueTime complexity of radio broadcasting: adaptiveness vs. obliviousness and randomization vs. determinismA novel use of \(t\)-packings to construct \(d\)-disjunct matricesPooling designs associated with unitary space and ratio efficiency comparisonA classification of the structures of some Sperner families and superimposed codesUnion-intersection-bounded families and their applicationsSublogarithmic distributed MIS algorithm for sparse graphs using Nash-Williams decompositionDeterministic M2M multicast in radio networksLow-weight superimposed codes and related combinatorial structures: bounds and applicationsMore on pooling spacesOn the construction of \((w,r)\) cover-free codesA Fixed-Depth Size-Hierarchy Theorem for $\mathrm{AC}^0[\oplus$ via the Coin Problem] ⋮ Transforming an error-tolerant separable matrix to an error-tolerant disjunct matrixAdaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymitySeparable collusion-secure multimedia codesUpper bounds for parent-identifying set systemsVerifiable random functions: relations to identity-based key encapsulation and new constructionsMatchings and covers in hypergraphsSpanoids - An Abstraction of Spanning Structures, and a Barrier for LCCsOn the upper bounds of the minimum number of rows of disjunct matricesCombinatorial Algorithms for Distributed Graph ColoringGroup testing with geometry of classical groups over finite fieldsProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesNon-adaptive group testing in the presence of errorsSecure frameproof codes, key distribution patterns, group testing algorithms and related structuresOn Efficient Gossiping in Radio NetworksRESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES



Cites Work


This page was built for publication: Families of finite sets in which no set is covered by the union of \(r\) others