{"id":"https://openalex.org/W3084446561","doi":"https://doi.org/10.1007/s10623-021-00931-2","title":"On sets of subspaces with two intersection dimensions and a geometrical junta bound","display_name":"On sets of subspaces with two intersection dimensions and a geometrical junta bound","publication_year":2021,"publication_date":"2021-10-19","ids":{"openalex":"https://openalex.org/W3084446561","doi":"https://doi.org/10.1007/s10623-021-00931-2","mag":"3084446561"},"language":"en","primary_location":{"id":"doi:10.1007/s10623-021-00931-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-021-00931-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-021-00931-2.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10623-021-00931-2.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026779694","display_name":"Giovanni Longobardi","orcid":"https://orcid.org/0000-0001-9323-2043"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Giovanni Longobardi","raw_affiliation_strings":["Department of Management and Engineering, University of Padua, Stradella S. Nicola, 3, 36100, Vicenza, Italy","Department of Management and Engineering , University of Padua , Vicenza , Italy"],"affiliations":[{"raw_affiliation_string":"Department of Management and Engineering, University of Padua, Stradella S. Nicola, 3, 36100, Vicenza, Italy","institution_ids":["https://openalex.org/I138689650"]},{"raw_affiliation_string":"Department of Management and Engineering , University of Padua , Vicenza , Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061433215","display_name":"Leo Storme","orcid":"https://orcid.org/0000-0001-6440-9225"},"institutions":[{"id":"https://openalex.org/I12607205","display_name":"University College Ghent","ror":"https://ror.org/00rs45z86","country_code":"BE","type":"education","lineage":["https://openalex.org/I12607205"]},{"id":"https://openalex.org/I32597200","display_name":"Ghent University","ror":"https://ror.org/00cv9y106","country_code":"BE","type":"education","lineage":["https://openalex.org/I32597200"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Leo Storme","raw_affiliation_strings":["Department of Mathematics: Analysis, Logic and Discrete Mathematics, Ghent University, Krijgslaan 281, Building S8, 9000, Ghent, Flanders, Belgium","Department of Mathematics: Analysis Logic and Discrete Mathematics, Ghent University, Ghent, Belgium"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics: Analysis, Logic and Discrete Mathematics, Ghent University, Krijgslaan 281, Building S8, 9000, Ghent, Flanders, Belgium","institution_ids":["https://openalex.org/I32597200","https://openalex.org/I12607205"]},{"raw_affiliation_string":"Department of Mathematics: Analysis Logic and Discrete Mathematics, Ghent University, Ghent, Belgium","institution_ids":["https://openalex.org/I32597200"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056002353","display_name":"Rocco Trombetti","orcid":"https://orcid.org/0000-0001-5915-8513"},"institutions":[{"id":"https://openalex.org/I71267560","display_name":"University of Naples Federico II","ror":"https://ror.org/05290cv24","country_code":"IT","type":"education","lineage":["https://openalex.org/I71267560"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Rocco Trombetti","raw_affiliation_strings":["Department of Mathematics and Applications \u201cR. Caccioppoli\u201d, University of Naples \u201cFederico II\u201d, via Vicinale Cupa Cintia, 80126, Naples, Italy","Department of Mathematics and Applications R. Caccioppoli University of Naples Federico II Naples Italy"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Applications \u201cR. Caccioppoli\u201d, University of Naples \u201cFederico II\u201d, via Vicinale Cupa Cintia, 80126, Naples, Italy","institution_ids":["https://openalex.org/I71267560"]},{"raw_affiliation_string":"Department of Mathematics and Applications R. Caccioppoli University of Naples Federico II Naples Italy","institution_ids":["https://openalex.org/I71267560"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026779694"],"corresponding_institution_ids":["https://openalex.org/I138689650"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01265711,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"90","issue":"9","first_page":"2081","last_page":"2099"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/linear-subspace","display_name":"Linear subspace","score":0.9127635955810547},{"id":"https://openalex.org/keywords/intersection","display_name":"Intersection (aeronautics)","score":0.8115335702896118},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.777747392654419},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.7120122313499451},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.7067880630493164},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.690863847732544},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5693410634994507},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.5536327958106995},{"id":"https://openalex.org/keywords/vector-space","display_name":"Vector space","score":0.5452272891998291},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5209066271781921},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.4912678599357605},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.46833088994026184},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.4527686834335327},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.2029440701007843},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.1505754292011261},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.08458667993545532}],"concepts":[{"id":"https://openalex.org/C12362212","wikidata":"https://www.wikidata.org/wiki/Q728435","display_name":"Linear subspace","level":2,"score":0.9127635955810547},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.8115335702896118},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.777747392654419},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.7120122313499451},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.7067880630493164},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.690863847732544},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5693410634994507},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.5536327958106995},{"id":"https://openalex.org/C13336665","wikidata":"https://www.wikidata.org/wiki/Q125977","display_name":"Vector space","level":2,"score":0.5452272891998291},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5209066271781921},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.4912678599357605},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.46833088994026184},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.4527686834335327},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.2029440701007843},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.1505754292011261},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.08458667993545532},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/s10623-021-00931-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-021-00931-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-021-00931-2.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:archive.ugent.be:01H3AFZT092DR117014T6BSMRS","is_oa":true,"landing_page_url":"https://biblio.ugent.be/publication/01H3AFZT092DR117014T6BSMRS","pdf_url":null,"source":{"id":"https://openalex.org/S4306400478","display_name":"Ghent University Academic Bibliography (Ghent University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32597200","host_organization_name":"Ghent University","host_organization_lineage":["https://openalex.org/I32597200"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSN: 1573-7586","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:arXiv.org:2009.06792","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2009.06792","pdf_url":"https://arxiv.org/pdf/2009.06792","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2009.06792","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2009.06792","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"mag:3084446561","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.1007/s10623-021-00931-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-021-00931-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-021-00931-2.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3084446561.pdf","grobid_xml":"https://content.openalex.org/works/W3084446561.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W105886966","https://openalex.org/W2026526689","https://openalex.org/W2060195250","https://openalex.org/W2080035314","https://openalex.org/W2114506516","https://openalex.org/W2138033161","https://openalex.org/W2139416652","https://openalex.org/W2771531586","https://openalex.org/W2912975828","https://openalex.org/W4298236575"],"related_works":["https://openalex.org/W2407660278","https://openalex.org/W2797213303","https://openalex.org/W2403144143","https://openalex.org/W2950768171","https://openalex.org/W3013960301","https://openalex.org/W2120157773","https://openalex.org/W2090860698","https://openalex.org/W2469868610","https://openalex.org/W1860681094","https://openalex.org/W3040303918","https://openalex.org/W1487682591","https://openalex.org/W2917842447","https://openalex.org/W1997634959","https://openalex.org/W3161925473","https://openalex.org/W2016962604","https://openalex.org/W2150322353","https://openalex.org/W2138241477","https://openalex.org/W2002645420","https://openalex.org/W3212703614","https://openalex.org/W2281101862"],"abstract_inverted_index":{"Abstract":[0],"In":[1,64,88],"this":[2],"article,":[3],"constant":[4],"dimension":[5,75,113],"subspace":[6,11,38],"codes":[7],"whose":[8],"codewords":[9,43],"have":[10],"distance":[12],"in":[13,40],"a":[14,29,37,46,66,85,101],"prescribed":[15],"set":[16],"of":[17,24,76,84,116],"integers,":[18],"are":[19,62,95],"considered.":[20],"The":[21],"easiest":[22],"example":[23],"such":[25,65,100],"an":[26,70],"object":[27],"is":[28,103],"junta":[30],"(Combin":[31],"Probab":[32],"Comput":[33],"18(1\u20132):107\u2013122,":[34],"2009);":[35],"i.e.":[36],"code":[39],"which":[41],"all":[42],"go":[44],"through":[45],"common":[47],"subspace.":[48],"We":[49],"focus":[50],"on":[51],"the":[52,60,74,77,82,91,107,110],"case":[53,67],"when":[54],"only":[55],"two":[56,92],"intersection":[57,93],"values":[58,94],"for":[59,73],"codewords,":[61],"assigned.":[63],"we":[68,97],"determine":[69],"upper":[71],"bound":[72,102],"vector":[78],"space":[79],"spanned":[80],"by":[81],"elements":[83],"non-junta":[86],"code.":[87],"addition,":[89],"if":[90],"consecutive,":[96],"prove":[98],"that":[99],"tight,":[104],"and":[105],"classify":[106],"examples":[108],"attaining":[109],"largest":[111],"possible":[112],"as":[114],"one":[115],"four":[117],"infinite":[118],"families.":[119]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
