Abstract
Let R(r, m) be the rth order Reed-Muller code of length 2m, and let ρ(r, m) be its covering radius. We prove that if 2≤ k ≤ m - r - 1, then ρ(r + k, m + k) ≥ ρ(r, m + 2(k - 1). We also prove that if m - r ≥ 4, 2 ≤ k ≤ m - r - 1, and R(r, m) has a coset with minimal weight ρ(r, m) which does not contain any vector of weight ρ(r, m) + 2, then ρ(r + k, m + k) ≥ ρ(r, m) + 2k(. These inequalities improve repeated use of the known result ρ(r + 1, m + 1) ≥ ρ(r, m).
Similar content being viewed by others
References
G.D. Cohen, M.G. Karpovsky, H.F. Mattson Jr., and J.R. Schatz. Covering radius—survey and recent results, IEEE Trans. Inform. Theory, Vol. IT-31, No. 3, (1985), pp. 328–343.
T. Helleseth, T. Kløve, and J. Mykkeltveit, On the covering radius of binary codes, IEEE Trans. Inform. Theory, Vol. IT-24, No. 5, (1978), pp. 627–628.
X. Hou, Some results on the covering radii of the Reed-Muller code, submitted to IEEE Trans. Inform. Theory.
A. McLoughlin, The covering radius of the (m − 3)rd Reed-Muller codes and a lower bound on the (m − 4)th order Reed-Muller codes, SIAM J. Appl. Math., Vol. 37, (1979), pp. 419–422.
J. Mykkeltveit, The covering radius of the (128, 8) Reed-Muller code is 56, IEEE Trans. Inform. Theory, Vol. IT-26, No. 3, (1980), pp. 359–362.
N.J. Patterson and D.H. Wiedemann, The covering radius of the (215, 16) Reed-Muller code is at least 16276, IEEE Trans. Inform. Theory, Vol. IT-29, No. 3, (1983), pp. 354–356.
N.J. Patterson and D.H. Wiedemann, Correction to [6], IEEE Trans. Inform. Theory, Vol. IT-36, No. 2, (1990), p. 443.
J.R. Schatz, The second order Reed-Muller code of length 64 has covering radius 18, IEEE Trans. Inform. Theory, Vol. IT-27, No. 4, (1981), pp. 529–530.
Author information
Authors and Affiliations
Additional information
Communicated by R.C. Mullin
This work was supported by a grant from the Research Council of Wright State University.
Rights and permissions
About this article
Cite this article
Hou, XD. Some inequalities about the covering radius of Reed-Muller codes. Des Codes Crypt 2, 215–224 (1992). https://doi.org/10.1007/BF00141965
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF00141965