Adaptive demodulation using rateless erasure codes
نویسندگان
چکیده
منابع مشابه
Study of the Decoding Complexity for Rateless Erasure Codes
Over the Internet, bit errors within the data packets translate into packet losses at the higher layers of the OSI model, yielding a packet erasure channel. Modern erasure correcting codes promise to offer a very simple and efficient solution to data transfers over these channels, opening up also other interesting applications. Amongst them one can enumerate reliable large scale content distrib...
متن کاملCan Basic ML Techniques Illuminate Rateless Erasure Codes?
The recently developed rateless erasure codes are a near-optimal channel coding technique that guarantees low overhead and fast decoding. The underlying theory, and current implementations, of these codes assume that a network transmitter encodes according to a pre-specified probability distribution. In this report, we use basic Machine Learning techniques to try to understand what happens when...
متن کاملAdaptive Security And Reliability Using Linear Erasure Correction Codes
This study introduces a novel scientific foundation to manage security and reliability in resource scarce environments such as wireless edge networks. We present encryption techniques based on erasure correction codes. The scheme provides adaptive security and reliability depending on the resource availability, channel error conditions, threat levels, and the application requirements. To increa...
متن کاملRateless spinal codes Citation
A fundamental problem in wireless networks is to develop communication protocols that achieve high throughput in the face of noise, interference, and fading, all of which vary with time. An ideal solution is a rateless wireless system, in which the sender encodes data without any explicit estimation or adaptation, implicitly adapting to the level of noise or interference. In this paper, we pres...
متن کاملReliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs
Code dissemination is very useful to remotely fix bugs or add now functions in wireless sensor networks (WSNs) after sensors deployed. Hostile environments keep the secure code dissemination a major concern. The Delugebased protocols are the widely used code disseminations, however, which have to take much energy and memory to deal with the problem caused by out of order delivery of packets in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Communications
سال: 2006
ISSN: 0090-6778
DOI: 10.1109/tcomm.2006.881236