Results 61 to 70 of about 42,043 (174)

Fundamental Limits on Data Acquisition: Trade-offs between Sample Complexity and Query Difficulty

open access: yes, 2018
We consider query-based data acquisition and the corresponding information recovery problem, where the goal is to recover $k$ binary variables (information bits) from parity measurements of those variables.
Chung, Hye Won   +2 more
core   +1 more source

Near-Capacity Adaptive Analog Fountain Codes for Wireless Channels

open access: yes, 2013
In this paper, we propose a capacity-approaching analog fountain code (AFC) for wireless channels. In AFC, the number of generated coded symbols is potentially limitless.
Li, Yonghui   +2 more
core   +1 more source

Coding for Fast Content Download [PDF]

open access: yes, 2012
We study the fundamental trade-off between storage and content download time. We show that the download time can be significantly reduced by dividing the content into chunks, encoding it to add redundancy and then distributing it across multiple disks ...
Joshi, Gauri   +2 more
core   +1 more source

“Pitch the king”: Ben Fountain’s games

open access: yesTransatlantica, 2013
In his stories and his novel, Ben Fountain uses games as an epistemological tool. Games allow him to subvert the cultural codes, his satire becoming a political critique of the nation and of US foreign policy, and to operate a fusion of the characters ...
Françoise Palleau-Papin
doaj   +1 more source

Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design [PDF]

open access: yes, 2017
In this paper we analyze LT and Raptor codes under inactivation decoding. A first order analysis is introduced, which provides the expected number of inactivations for an LT code, as a function of the output distribution, the number of input symbols and ...
Bauch, Gerhard   +2 more
core   +2 more sources

Design and Analysis of Systematic Batched Network Codes

open access: yesEntropy, 2023
Systematic codes are of important practical interest for communications. Network coding, however, seems to conflict with systematic codes: although the source node can transmit message packets, network coding at the intermediate network nodes may ...
Licheng Mao   +3 more
doaj   +1 more source

Bounds on the Error Probability of Raptor Codes under Maximum Likelihood Decoding [PDF]

open access: yes, 2020
In this paper upper and lower bounds on the probability of decoding failure under maximum likelihood decoding are derived for different (nonbinary) Raptor code constructions.
Bauch, Gerhard   +3 more
core   +2 more sources

Research on Stepwise UEP-LT Code for Ultraviolet Communication in Helicopter Emergency Landing Guiding [PDF]

open access: yesJisuanji gongcheng, 2016
Ultraviolet communication data determines the security of helicopter emergency landing.In order to provide greater protection for More Important Bits(MIB),a novel approach to provide Unequal Error Protection(UEP) based on the block duplication method and
ZHAO Taifei,LIU Xue,LIU Yijie
doaj   +1 more source

On the transmission time of fountain code based parallel relay network

open access: yesTongxin xuebao, 2010
In order to reduce the complexity of transmission protocols and the number of feedback links,fountain code was applied to the multi-stage parallel relay network for open-loop error control.The fountain code based network trans-mission scheme and frame ...
WU Dan, TIAN Ya-fei, YANG Chen-yang
doaj   +2 more sources

Fountain-code Aided File Transfer in Vehicular Delay Tolerant Networks

open access: yesAdvances in Electrical and Computer Engineering, 2013
We propose a mechanism for facilitating file transferring in Vehicular Delay Tolerant Networks. The proposed architecture includes using Fountain coding in the application layer, UDP in the transport layer and a proposed DTN routing algorithm in the ...
YOUSEFI, S.   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy