Alfred Wassermann

Alfred Wassermann
  • University of Bayreuth

About

132
Publications
25,032
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,676
Citations
Current institution
University of Bayreuth

Publications

Publications (132)
Preprint
The celebrated Kramer-Mesner method for the construction of designs with a prescribed automorphism group $G$ has been proven effective many times. In the special case of Steiner designs, the task reduces to solving an exact cover problem, with the advantage that fast backtracking solvers like Donald Knuth's dancing links and dancing cells can be ut...
Article
Full-text available
Combinatorial designs have been studied for nearly 200 years. 50 years ago, Cameron, Delsarte, and Ray-Chaudhury started investigating their q -analogs, also known as subspace designs or designs over finite fields. Designs can be defined analogously in finite classical polar spaces, too. The definition includes the m -regular systems from projectiv...
Article
In 1985, Janko and Tran Van Trung published an algorithm for constructing symmetric designs with prescribed automorphisms. This algorithm is based on the equations by Dembowski (1958) for tactical decompositions of point-block incidence matrices. In the sequel, the algorithm has been generalized and improved in many articles. In parallel, higher in...
Preprint
Full-text available
In 1985, Janko and Tran Van Trung published an algorithm for constructing symmetric designs with prescribed automorphisms. This algorithm is based on the equations by Dembowski (1958) for tactical decompositions of point-block incidence matrices. In the sequel, the algorithm has been generalized and improved in many articles. In parallel, higher in...
Article
Full-text available
Strongly walk regular graphs (SWRGs or s-SWRGs) form a natural generalization of strongly regular graphs (SRGs) where paths of length 2 are replaced by paths of length s. They can be constructed as coset graphs of the duals of projective three-weight codes whose weights satisfy a certain equation. We provide classifications of the feasible paramete...
Article
Full-text available
The classification of unitals with parameters 2-(28, 4, 1) according to the 2-rank of their incidence matrices was initiated by McGuire, Tonchev and Ward, who proved that the 2-rank of any unital on 28 points is greater than or equal to 19, and up to isomorphism, there is a unique unital with 2-rank equal to 19. Jaffe and Tonchev investigated the n...
Article
The classification of unitals with parameters 2-(28, 4, 1) according to the 2-rank of their incidence matrices was initiated by McGuire, Tonchev and Ward, who proved that the 2-rank of any unital on 28 points is greater than or equal to 19, and up to isomorphism, there is a unique unital with 2-rank equal to 19. Jaffe and Tonchev investigated the n...
Chapter
In 1986, Kreher and Radziszowski were the first who used the famous LLL algorithm to construct combinatorial designs. Subsequently, lattice algorithms have been applied to construct a large variety of objects in design theory, coding theory and finite geometry. Unfortunately, the use of lattice algorithms in combinatorial search is still not well e...
Article
A recent article in this Journal (J. Chem. Educ. 2020, 97, 1715-1730) contains erroneous isomer numbers of certain sets of organic compounds. We show that correct numbers are produced by constructive enumeration of isomers using a recent molecular structure generator.
Preprint
Full-text available
Strongly walk regular graphs (SWRGs or $s$-SWRGs) form a natural generalization of strongly regular graphs (SRGs) where paths of length~2 are replaced by paths of length~$s$. They can be constructed as coset graphs of the duals of projective three-weight codes whose weights satisfy a certain equation. We provide classifications of the feasible para...
Article
Let PG ( F q v ) be the ( v − 1 ) ‐dimensional projective space over F q and let Γ be a simple graph of order q k − 1 q − 1 for some k . A 2 − ( v , Γ , λ ) design over F q is a collection ℬ of graphs (blocks) isomorphic to Γ with the following properties: the vertex set of every block is a subspace of PG ( F q v ) ; every two distinct points of PG...
Article
Rudolph (1967) introduced one-step majority logic decoding for linear codes derived from combinatorial designs. The decoder is easily realizable in hardware and requires that the dual code has to contain the blocks of so called geometric designs as codewords. Peterson and Weldon (1972) extended Rudolph’s algorithm to a two-step majority logic decod...
Preprint
Full-text available
We study the minimum number of minimal codewords in linear codes from the point of view of projective geometry. We derive bounds and in some cases determine the exact values. We also present an extension to minimal subcode supports.
Preprint
Full-text available
A projective linear code over $\mathbb{F}_q$ is called $\Delta$-divisible if all weights of its codewords are divisible by $\Delta$. Especially, $q^r$-divisible projective linear codes, where $r$ is some integer, arise in many applications of collections of subspaces in $\mathbb{F}_q^v$. One example are upper bounds on the cardinality of partial sp...
Article
Full-text available
It is shown that there does not exist a projective triply-even binary code of length 59. This settles the last open length for projective triply-even binary codes, which therefore exist precisely for the lengths 15, 16, 30, 31, 32, 45–51, and ≥60.
Chapter
Full-text available
A well-known class of objects in combinatorial design theory are group divisible designs. Here, we introduce the q-analogs of group divisible designs. It turns out that there are interesting connections to scattered subspaces, q-Steiner systems, packing designs and qr-divisible projective sets. We give necessary conditions for the existence of q-an...
Preprint
Rudoph (1967) introduced one-step majority logic decoding for linear codes derived from combinatorial designs. The decoder is easily realizable in hardware and requires that the dual code has to contain the blocks of so called geometric designs as codewords. Here, we study the codes from subspace designs. It turns out that these codes have the same...
Preprint
Let PG$(\mathbb{F}_q^v)$ be the $(v-1)$-dimensional projective space over $\mathbb{F}_q$ and let $\Gamma$ be a simple graph of order ${q^k-1\over q-1}$ for some $k$. A 2$-(v,\Gamma,\lambda)$ design over $\mathbb{F}_q$ is a collection $\cal B$ of graphs (blocks) isomorphic to $\Gamma$ with the following properties: the vertex-set of every block is a...
Article
Full-text available
The maximum size $A_2(8,6;4)$ of a binary subspace code of packet length $v=8$, minimum subspace distance $d=6$, and constant dimension $k=4$ is $257$, where the $2$ isomorphism types are extended lifted maximum rank distance codes. In Finite Geometry terms the maximum number of solids in $\operatorname{PG}(7,2)$, mutually intersecting in at most a...
Preprint
Full-text available
It is shown that there does not exist a binary projective triply-even code of length $59$. This settles the last open length for projective triply-even binary codes. Therefore, projective triply-even binary codes exist precisely for lengths $15$, $16$, $30$, $31$, $32$, $45$--$51$, and $\ge 60$.
Preprint
Full-text available
A well known class of objects in combinatorial design theory are {group divisible designs}. Here, we introduce the $q$-analogs of group divisible designs. It turns out that there are interesting connections to scattered subspaces, $q$-Steiner systems, design packings and $q^r$-divisible projective sets. We give necessary conditions for the existenc...
Article
We report the computer construction of 1316 mutually disjoint 2-(13, 3, 1)2 subspace designs. By combining disjoint designs and using supplementary subspace designs we conclude that subspace designs exist for 1≤λ≤2047.
Article
Full-text available
In this article, we show the existence of large sets $\operatorname{LS}_2[3](2,k,v)$ for infinitely many values of $k$ and $v$. The exact condition is $v \geq 8$ and $0 \leq k \leq v$ such that for the remainders $\bar{v}$ and $\bar{k}$ of $v$ and $k$ modulo $6$ we have $2 \leq \bar{v} < \bar{k} \leq 5$. The proof is constructive and consists of tw...
Chapter
For discrete structures which are based on a finite ambient set and its subsets there exists the notion of a “q-analog”: For this, the ambient set is replaced by a finite vector space and the subsets are replaced by subspaces. Consequently, cardinalities of subsets become dimensions of subspaces. Subspace designs are the q-analogs of combinatorial...
Chapter
Subspace designs are the q-analogs of combinatorial designs. Introduced in the 1970s, these structures gained a lot of interest recently because of their application to random network coding. Compared to combinatorial designs, the number of blocks of subspace designs are huge even for the smallest instances. Thus, for a computational approach, soph...
Preprint
The maximum size $A_2(8,6;4)$ of a binary subspace code of packet length $v=8$, minimum subspace distance $d=6$, and constant dimension $k=4$ is $257$, where the $2$ isomorphism types are extended lifted maximum rank distance codes. In finite geometry terms the maximum number of solids in $\operatorname{PG}(7,2)$, mutually intersecting in at most a...
Article
Full-text available
We show that there is a binary subspace code of constant dimension 3 in ambient dimension 7, having minimum distance 4 and cardinality 333, i.e., $333 \le A_2(7,4;3)$, which improves the previous best known lower bound of 329. Moreover, if a code with these parameters has at least 333 elements, its automorphism group is in one of $31$ conjugacy cla...
Article
Full-text available
For which positive integers $n,k,r$ does there exist a linear $[n,k]$ code $C$ over $\mathbb{F}_q$ with all codeword weights divisible by $q^r$ and such that the columns of a generating matrix of $C$ are projectively distinct? The motivation for studying this problem comes from the theory of partial spreads, or subspace codes with the highest possi...
Article
Let denote the maximum cardinality of a set of k-dimensional subspaces of an n-dimensional vector space over the finite field of order q, , such that any two different subspaces have a distance of at least d. Lower bounds on can be obtained by explicitly constructing corresponding sets . When searching for such sets with a prescribed group of auto...
Article
Using integer linear programming and table-lookups, we prove that there is no binary linear [1988, 12, 992] code. As a by-product, the non-existence of binary linear codes with the parameters [324, 10, 160], [356, 10, 176], [772, 11, 384], and [836, 11, 416] is shown. Our work is motivated by the recent construction of the extended dualized Kerdock...
Article
Full-text available
The question if there exists a q-analog of the Fano plane is open since it was first posed in 1972. For a putative binary q-analog of the Fano plane all automorphisms of order greater than 4 had been excluded previously. Here, it is shown with theoretical and computational methods that the order of the automorphism group of a binary q-analog of the...
Preprint
Full-text available
It is shown that the automorphism group of a binary $q$-analog of the Fano plane is either trivial or of order $2$.
Preprint
In this article, we show the existence of large sets $\operatorname{LS}_2[3](2,k,v)$ for infinitely many values of $k$ and $v$. The exact condition is $v \geq 8$ and $0 \leq k \leq v$ such that for the remainders $\bar{v}$ and $\bar{k}$ of $v$ and $k$ modulo $6$ we have $2 \leq \bar{v} < \bar{k} \leq 5$. The proof is constructive and consists of tw...
Article
Full-text available
We discuss dual hyperovals of rank 4 over (Formula presented.). In particular, we classify all such dual hyperovals if the ambient space has dimension 7 or 8. We also determine the bilinear dual hyperovals in the case of an ambient space of dimension 9 or 10. A classification of all dual hyperovals in dimension 9 seems possible in the near future.
Article
We prove that the automorphism group of an extremal binary self-dual code does not contain elements of order . Combining this with the known results in the literature, one obtains that divides for a non-negative integer a.
Article
Full-text available
The main problem of subspace coding asks for the maximum possible cardinality of a subspace code with minimum distance at least $d$ over $\mathbb{F}_q^n$, where the dimensions of the codewords, which are vector spaces, are contained in $K\subseteq\{0,1,\dots,n\}$. In the special case of $K=\{k\}$ one speaks of constant dimension codes. Since this e...
Chapter
MOLGEN 5.x combines the efficiency of the molecular generator MOLGEN 3.5 and the flexibility of MOLGEN 4.x. To achieve this, the software was reimplemented based on a totally new concept. The most visible new features are fuzzy molecular formula input and explicit use of atom state patterns. We describe the version MOLGEN 5.0 of this new series. ©...
Article
Using integer linear programming and table-lookups we prove that there is no binary linear [1988,12,992] code. As a byproduct, the non-existence of binary linear [324,10,160], [356,10,176], [772,11,384], and [836,11,416] codes is shown. On the other hand, there exists a linear (994,4^6,992) code over Z_4. Its Gray image is a binary non-linear (1988...
Article
Full-text available
In this paper we investigate codes over finite commutative rings R, whose generator matrices are built from \$\alpha\$-circulant matrices. For a non-trivial ideal I<R we give a method to lift such codes over R/I to codes over R, such that some isomorphic copies are avoided. For the case where I is the minimal ideal of a finite chain ring we refine...
Article
Full-text available
Based on results in finite geometry we prove the existence of MRD codes in (F_q)_(n,n) with minimum distance $n$ which are essentially different from Gabidulin codes. The construction results from algebraic structures which are closely related to those of finite fields. Furthermore we show that an analogue of MacWilliams' extension theorem does not...
Book
Full-text available
In this eBook we introduce our readers to one of the most comprehensive and thematically diverse treatise on the emerging discipline of mathematical chemistry, or, more accurately, discrete mathematical chemistry. Although mathematical representation and characterization of chemical objects were known for a long time, the incursion of discrete math...
Article
A $t\text{-}(n,k,\lambda;q)$-design is a set of $k$-subspaces, called blocks, of an $n$-dimensional vector space $V$ over the finite field with $q$ elements such that each $t$-subspace is contained in exactly $\lambda$ blocks. A partition of the complete set of $k$-subspaces of $V$ into disjoint $t\text{-}(n,k,\lambda;q)$ designs is called a large...
Article
Full-text available
Using computer, we classify the unitals in the Desarguesian projective plane of order 16. We use computational methods based on analysis involving tactical decompositions to break symmetry, making a computer search feasible. We prove that all unitals in PG(2,16)PG(2,16) are known, namely, up to isomorphism, there are exactly two Buekenhout–Metz uni...
Chapter
Full-text available
MOLGEN 5.x combines the efficiency of the molecular generator MOLGEN 3.5 and the flexibility of MOLGEN 4.x. To achieve this, the software was reimplemented based on a totally new concept. The most visible new features are fuzzy molecular formula input and explicit use of atom state patterns. We here describe the first version MOLGEN 5.0 of this new...
Article
Full-text available
In this paper, we classify quadratic and cubic self-dual bent functions in eight variables with the help of computers. There are exactly four and 45 non-equivalent self-dual bent functions of degree two and three, respectively. This result is achieved by enumerating all eigenvectors with ± 1 entries of the Sylvester Hadamard matrix with an integer...
Article
Full-text available
Let $\F_q^n$ be a vector space of dimension $n$ over the finite field $\F_q$. A $q$-analog of a Steiner system (briefly, a $q$-Steiner system), denoted $S_q[t,k,n]$, is a set $S$ of $k$-dimensional subspaces of $\F_q^n$ such that each $t$-dimensional subspace of $\F_q^n$ is contained in exactly one element of $S$. Presently, $q$-Steiner systems are...
Article
Full-text available
In this paper we give the first construction of a q-analog of a Steiner system. Using a computer search we found at least 26 q-Steiner Systems S_2[2,3,13] admitting the normalizer of a singer cycle as a group of automorphisms.
Article
A fast method to compute the minimum Lee weight and the symmetrized weight enumerator of extended quadratic residue codes (XQR-codes) over the ring $\BBZ_{4}$ is developed. Our approach is based on the classical Brouwer–Zimmermann algorithm and additionally takes advantage of the large group of automorphisms and the self-duality of the $\BBZ_{4}$ -...
Article
Full-text available
We construct linear codes over finite fields with prescribed minimum distance by selectiong columns of the generator matrix. This selection problem can be formulated as an integer programming problem. In order to reduce the search space we prescribe a group of automorphisms. Then, in many cases the resulting integer programming problem can be solve...
Article
Full-text available
Since ancient times mathematicians consider geometrical objects with integral side lengths. We consider plane integral point sets $\mathcal{P}$, which are sets of $n$ points in the plane with pairwise integral distances where not all the points are collinear. The largest occurring distance is called its diameter. Naturally the question about the mi...
Conference Paper
We describe the integration of a well known algorithm for computing and displaying plane loci based on ideal elimination using Gröbner bases in the dynamic geometry software JSXGraph. With our approach it is not only possible to determine loci depending on other loci but it is also possible to extend JSXGraph to deal with loci depending on arbitrar...
Article
The article gives constructions of disjoint 5-designs obtained from permutation groups and extremal self-dual codes. Several new simple 5-designs are found with parameters that were left open in the table of 5-designs given in [G. B. Khosrovshahi and R. Laue, t-designs with t≥3, in: “Handbook of Combinatorial Designs”, 2nd edn., C. J. Colbourn and...
Article
Full-text available
Based on ideas of K\"otter and Kschischang we use constant dimension subspaces as codewords in a network. We show a connection to the theory of q-analogues of a combinatorial designs, which has been studied in Braun, Kerber and Laue as a purely combinatorial object. For the construction of network codes we successfully modified methods (constructio...
Article
In this paper, we construct new binary singly even self-dual codes with larger minimum weights than the previously known singly even self-dual codes for several lengths. Several known construction methods are used to construct the new self-dual codes.
Article
Although forbidden in democratic states a market for votes could improve efficiency. This paper examines the way trading votes will change the outcome of an election. A two-party model with two phases is presented. In the pre-trading phase the two parties set their agendas consisting of a direct subsidy and an income tax. In the trading phase voter...
Article
We construct new binary and ternary self-orthogonal linear codes. In order to do this we use an equivalence between the existence of a self-orthogonal linear code with a prescribed minimum distance and the existence of a solution of a certain system of Diophantine linear equations. To reduce the size of the system of equations we restrict the searc...
Research
Full-text available
The program system MOLGEN is devoted to the generation of all structural formulae (= connectivity isomers) that correspond to a given molecular formula, optionally under further constraints, e.g. the necessary presence or absence of substructures. It arose from the idea to provide an efficient and portable tool for molecular structure generation an...
Research
Full-text available
The program system MOLGEN is devoted to generating all structures (connectivity isomers, constitutions) that correspond to a given molecular formula, with optional further restrictions, e.g. presence or absence of particular substructures. MOLGEN arose from the idea to provide an efficient and portable tool for molecular structure elucidation in ch...
Article
Full-text available
The purpose of this study was to determine the effect of below-knee compression stockings on running performance in men runners. Using a within-group study design, 21 moderately trained athletes (39.3 +/- 10.9 years) without lower-leg abnormities were randomly assigned to perform a stepwise treadmill test up to a voluntary maximum with and without...
Article
The only example of a binary doubly-even self-dual [120,60,20] code was found in 2005 by P. Gaborit, C.-S. Nedeloaia and A. Wassermann [On the weight enumerators of duadic and quadratic residue codes. IEEE Trans. Inform. Theory 51, 402–407 (2005)]. In this work we present 25 new binary doubly-even self-dual [120,60,20] codes having an automorphism...
Article
The class of the quadratic residue codes (QR-codes) over the ring Zopf4 contains very good Zopf4-linear codes. It is well known that the Gray images of the QR-codes over Zopf4 of length 8, 32 and 48 are non-linear binary codes of higher minimum Hamming distance than comparable known linear codes. The QR-Code of length 48 is also the largest one who...
Article
We show the existence of simple 8-(31,12,3080), 8-(40,12,16200) and 8-(40,12,16520) designs and list for each parameter set one example in full detail. The designs are constructed with a prescribed group of automorphisms PSL(3,5) or PSL(4,3) using the method of E. S. Kramer and D. M. Mesner [Discrete Math. 15, 263–296 (1976; Zbl 0362.05049)].
Article
In this article, we investigate the existence of large sets of 3-designs of prime sizes with prescribed groups of automorphisms PSL(2,q) and PGL(2,q) for q < 60. We also construct some new interesting large sets by the use of the computer program DISCRETA. The results obtained through these direct methods along with known recursive constructions ar...
Article
Full-text available
The purpose of this study was to present an equation that accurately predicts 1 repetition maximum (RM) over a wide range of repetitions to fatigue (RTF) for 4 different machine resistance exercises in postmenopausal women. Seventy trained women (age = 57.4 +/- 3.1 years) performed maximal and submaximal repetitions on leg press, bench press, rowin...
Chapter
Full-text available
A parallel version of an algorithm for solving systems of integer linear equations with {0,1}-variables is presented. The algorithm is based on lattice basis reduction in combination with explicit enumeration.
Book
This text offers a thorough introduction to the mathematical concepts behind the theory of error-correcting linear codes. Care is taken to introduce the necessary algebraic concepts, for instance the theory of finite fields, the polynomial rings over such fields and the ubiquitous concept of group actions that allows the classification of codes by...
Article
Full-text available
New linear codes (sometimes optimal) over the finite field with q elements are constructed. In order to do this, an equivalence between the existence of a linear code with a prescribed minimum distance and the existence of a solution of a certain system of Diophantine linear equations is used. To reduce the size of the system of equations, the sear...
Article
The minimal cardinality of a q-ary code of length n and covering radius at most R is denoted by Kq(n, R); if we have the additional requirement that the minimum distance be at least d, it is denoted by Kq(n, R, d). Obviously, Kq(n, R, d) = Kq(n, R). In this paper, we study instances for which Kq(n,1,2) > Kq(n, 1) and, in particular, determine K4(4,...
Article
This correspondence revisits the idea of constructing a binary [mn,mk] code from an [n,k] code over F<sub>2</sub><sup>m</sup> by concatenating the code with a suitable basis representation of F<sub>2</sub><sup>m</sup> over F<sub>2</sub>. We construct two nonequivalent examples of doubly even self-dual binary codes of length 160 which turn out to be...
Article
In this correspondence, we compute the weight enumerators of various quadratic residue codes over F<sub>2</sub> and F<sub>3</sub>, together with certain codes of related families like the duadic and the quadratic double circulant codes. We use a parallel algorithm to find the number of codewords of a given (not too high) weight, from which we deduc...
Article
We compute the weight enumerators of various quadratic residue (QR) codes over F2 and F3, together with certain codes of related families like the duadic codes. We use a parallel algorithm to find the number of codewords of a given (not too high) weight, from which we deduce by usual classical methods for selfdual and isodual codes over F2 and F3 t...
Article
Full-text available
For the purpose of error correcting linear codes over a finite field GF (q) and fixed dimension k we are interested in codes with high minimum distance d as these allow the correction of up to b(d-1)/2c errors. On the other hand we are in-terested in codes with minimum redundancy, i. e. codes of small length n. High minimum distance and small lengt...
Conference Paper
This paper discusses the construction of binary linear Golay [160, 80] (mn,mk) codes from an extended Reed Solomon [32, 16] (n, k) code over F<sub>32</sub> (F<sub>2</sub><sup>m</sup>) by concatenating the given code with a suitable basis symmetric representation of Frobenius automorphism F<sub>32</sub> over F<sub>2</sub> with a minimum distance 24.
Chapter
Full-text available
Short descriptions of computer algebra systems are presented in three sections: major systems, special purpose systems, and packages. However, the separation between special purpose systems and packages is not to be taken too literally. An older survey is the paper by Calmet and van Hulzen in [Buchberger et al. 1982]. There is now an excellent new...
Article
An attempt was made to construct binary [mn,mk] codes from an [n,k] code over F2m by concatenating the given code with a suitable basis representation of F2m over F2. It was found that regardless of the chosen symmetric representation, the resulting binary [160,80] code has a minimum distance 24, and that the resulting code is self-dual and doubly...
Article
In the football pool problem one wants to minimize the cardinality of a ternary code, C⊆F3n, with covering radius one, and the size of a minimum code is denoted by σn. The smallest unsettled case is 63⩽σ6⩽73. The lower bound is here improved to 65 in a coordinate-by-coordinate backtrack search using the LLL algorithm and complete equivalence checki...
Article
The market split problem was proposed by Cornuéjols and Dawande as benchmark problem for algorithms solving linear systems with 0/1 variables. Here, we present an algorithm for the more general problem A · x = b with arbitrary lower and upper bound on the variables. The algorithm consists of exhaustive enumeration of all points of a suitable lattic...
Article
Full-text available
There are 107 non-isomorphic coverings of the Aztec diamond of order 5 by the 25 one-sided tetrasticks. In [6] Donald Knuth describes how to attack certain types of puzzles by computer. One type of puzzle he tried to solve is the covering of patterns by tetrasticks. Tetrasticks | or more general polysticks | were introduced by Brian Barwell [1]: Pi...

Network

Cited By