600 Hits in 5.6 sec

Fountain Codes With Nonuniform Selection Distributions Through Feedback

Morteza Hashemi, Yuval Cassuto, Ari Trachtenberg
2016 IEEE Transactions on Information Theory  
We provide an analysis of our codes, including bounds on computational complexity and failure probability for a maximum likelihood decoder; the latter are tighter than bounds known for classical rateless  ...  One key requirement for fountain (rateless) coding schemes is to achieve a high intermediate symbol recovery rate.  ...  Shroff from the Ohio State University for his insightful comments and supporting this work.  ... 
doi:10.1109/tit.2016.2570232 fatcat:w76smg6lyfbghnzqtx6qhtx5s4

Growth Codes: Intermediate Performance Analysis and Application to Video

Nikolaos Thomos, Rethnakaran Pulikkoonattu, Pascal Frossard
2013 IEEE Transactions on Communications  
Our analysis based on Wormald method applies to any class of Rateless codes that does not include a precoding step.  ...  Compared to other Rateless and conventional channel codes, Growth codes show improved intermediate performance which is particularly useful in applications where performance increases with the number of  ...  In this paper, we propose a new and complete decoding performance analysis for Growth codes based on the Wormald method [8] that is typically used for the analysis of graph stochastic processes.  ... 
doi:10.1109/tcomm.2013.092813.120865 fatcat:sipv64h7bbcyvc3rdvf43u4w7q

Intermediate Performance Analysis of Growth Codes [article]

Nikolaos Thomos, Rethnakaran Pulikkoonattu, Pascal Frossard
2012 arXiv   pre-print
Our analysis based on Wormald method applies to any class of Rateless codes that does not include a precoding step.  ...  Compared to other Rateless and conventional channel codes, Growth codes show improved intermediate performance which is particularly useful in applications where performance increases with the number of  ...  In this paper, we propose a new and complete decoding performance analysis for Growth codes based on the Wormald method [8] that is typically used for the analysis of graph stochastic processes.  ... 
arXiv:1211.4014v1 fatcat:zxtumkt3xrfpfalrxavodixi5m

Three Schemes for Wireless Coded Broadcast to Heterogeneous Users [article]

Yao Li, Emina Soljanin, Predrag Spasojevic
2012 arXiv   pre-print
The three coded schemes are based on the LT codes, growth codes, and randomized chunked codes.  ...  We design the degree distributions of LT codes by solving suitably defined linear optimization problems, and numerically characterize the achievable delivery time for different coding schemes.  ...  In [14] , Sujay Sanghavi pointed out the inadequacy of the original LT codes for partial data recovery, and demonstrated the possibility of redesigning the LT codes.  ... 
arXiv:1205.4233v1 fatcat:oe2j7j2fjbdw5hwjovjlvkldym

Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

Ahmed Douik, Sameh Sorour, Tareq Y. Al-Naffouri, Mohamed-Slim Alouini
2017 IEEE Communications Surveys and Tutorials  
With the shift toward distributed computing on mobile devices, performance and complexity become both critical factors that affect the efficiency of a coding strategy.  ...  From its introduction to its quindecennial, network coding has built a strong reputation for enhancing packet recovery and achieving maximum information flow in both wired and wireless networks.  ...  ACKNOWLEDGEMENT The authors wish to thank Professor Parastoo Sadeghi for her helpful comments and suggestions.  ... 
doi:10.1109/comst.2017.2665587 fatcat:mobyvizrd5exhgovnvsbfb667a

Media Coding for Streaming in Networks with Source and Path Diversity [chapter]

Nikolaos Thomos, Pascal Frossard
2010 Studies in Computational Intelligence  
Finally, we show that hybrid systems based on both rateless coding and network coding can deliver high quality media streams with low computational complexity, as they permit to benefit from both server  ...  In particular, fountain codes offer interesting benefits for streaming with server diversity.  ...  MBMS systems based on 3GPP Raptor codes [4] benefit from the partial recovery of packets corrupted by errors at the body of a packet as well as at the overhead.  ... 
doi:10.1007/978-3-642-11686-5_9 fatcat:psqstixkjjhazctih57rt4o534

Coding Performance with Imperfect Erasures

Charles J. Boardman
1985 MILCOM 1985 - IEEE Military Communications Conference  
Since then, many digital Fountain coding methods have been invented such as Tornado codes, Luby transforms (LT) codes and Raptor codes.  ...  In the wireless communication system, various coding methods are employed on the data transferred to induce high bit error rates.  ...  This is done by utilizing an erasure correcting pre-code working in linear time. The degree distribution, which is used for Raptor Codes, should be completely different from the one that of LT codes.  ... 
doi:10.1109/milcom.1985.4794968 fatcat:nfor4ga3l5en5mtvs5vpo33vae

Distributed Raptor Coding for Erasure Channels: Partially and Fully Coded Cooperation

Mahyar Shirvanimoghaddam, Yonghui Li, Shuang Tian, Branka Vucetic
2013 IEEE Transactions on Communications  
We develop cooperation methods based on Raptor codes with the assumption that the channels face erasure with specific erasure probabilities and transmitters have no channel state information.  ...  A fully coded cooperation (FCC) and a partially coded cooperation (PCC) strategy are developed to maximize the average system throughput.  ...  Although Growth codes [25, 28] achieves both good full and partial decoding performance, they require a large number of feedback from the destination; thus not appropriate for the PCC scheme.  ... 
doi:10.1109/tcomm.2013.072913.120724 fatcat:up3aspxclvex7d7o77ops42r4a

Secure network coding for multi-resolution wireless video streaming

Luisa Lima, Steluta Gheorghiu, Joao Barros, Muriel Medard, Alberto Toledo
2010 IEEE Journal on Selected Areas in Communications  
Our contributions include an information-theoretic security analysis of the proposed scheme, a basic system architecture for hierarchical wireless video with network coding and simulation results.  ...  However, concerns with the security of wireless video, in particular when only some of the users are entitled to the highest quality, have uncovered the need for a network coding scheme capable of ensuring  ...  Vinhoza (Universidade do Porto) in the mathematical proofs presented in the paper, and insightful discussions with Manuel Barbosa (Universidade do Minho), Matthieu Bloch and Demijan Klinc (Georgia Institute  ... 
doi:10.1109/jsac.2010.100409 fatcat:x3mwzlbdevcydjctjjnxwcu47e

A Tutorial and Review on Inter-Layer FEC Coded Layered Video Streaming

Yongkai Huo, Cornelius Hellge, Thomas Wiegand, Lajos Hanzo
2015 IEEE Communications Surveys and Tutorials  
This tutorial aims for inspiring further research on IL-FEC/LA-FEC techniques, with special emphasis on the family of soft-decoded bit-level IL-FEC schemes. 2 VIII, respectively.  ...  Layered video coding creates multiple layers of unequal importance, which enables us to progressively refine the reconstructed video quality.  ...  LSSTC Layered Steered Space-time Codes. LT Luby Transform. LUT LookUp Table. LW-EZEP Layer-Weighted Expected Zone of Error Propagation. M-UEP Multistream Unequal Error Protection.  ... 
doi:10.1109/comst.2015.2392378 fatcat:klyytcham5dt5by24t7crr3r6i

Optimizing Selective ARQ for H.264 Live Streaming: A Novel Method for Predicting Loss-Impact in Real Time

Michael Schier, Michael Welzl
2012 IEEE transactions on multimedia  
It is demonstrated how the prioritization scheme can be beneficially integrated into live streaming systems which are characterized by tight timing constraints, with the focus on content-aware selective  ...  This work proposes a quality-oriented, real-time capable prioritization technique for media units of H.264/AVC video streams.  ...  Additionally, applications can still make use of all received packets in times of severe loss whereas with FEC, a large number of packets (e.g., LT codes) or even all packets (e.g., Reed-Solomon codes)  ... 
doi:10.1109/tmm.2011.2178235 fatcat:i3q2rdb27nexzdfslnqdny2fpa

Dynamic Code Selection Method for Content Transfer in Deep Space Network

Rojina Adhikary, John N. Daigle, Lei Cao
2019 IEEE Transactions on Aerospace and Electronic Systems  
Space communications feature large round-trip time delays (for example, between 6.5 and 44 minutes for Mars to Earth and return, depending on the actual distance between the two planets) and highly variable  ...  data error rates, for example, bit error rate (BER) of 10 −5 is very common and even higher BERs on the order of 10 −1 is observed in the deep-space environment.  ...  In [10] , authors proposed a modification in the structure of rateless codes to provide UEP and unequal recovery time (URT) properties by encoding message symbols by non-uniform selection of source symbols  ... 
doi:10.1109/taes.2019.2921212 fatcat:qdkz3c5h25dnteuyttscapegxq

A cross-layer design framework for robust IPTV services over IEEE 802.16 networks

James She, Xiang Yu, Pin-Han Ho, En-Hui Yang
2009 IEEE Journal on Selected Areas in Communications  
In the framework, multiple description coding (MDC) on scalable video bitstreams at the source for achieving multi-resolution robustness is jointly designed with superposition coding (SCM) on multicast  ...  The coded multicast signals under the proposed framework can cope with multi-user channel diversity and mitigate the impact due to short-term channel fluctuations, which are the two most challenging issues  ...  ACKNOWLEDGEMENT This study is conducted under the "Wireless Broadband Communications Technology and Application Project" of the Institute for Information Industry which is subsidized by the Ministry of  ... 
doi:10.1109/jsac.2009.090214 fatcat:riw2hmkw7raytlrcdue4oamn5i

Nebula: Reliable Low-latency Video Transmission for Mobile Cloud Gaming [article]

Ahmad Alhilal
2022 arXiv   pre-print
We fully implement Nebula and evaluate its performance against the state of the art techniques and latest research in real-time mobile cloud gaming transmission on a physical testbed over emulated and  ...  A user experiment confirms that Nebula maximizes the user experience with high perceived video quality, playability, and low user load.  ...  Depending on the compression scheme, a packet and sends the network parameters to the server so as to control the loss may result into partial or complete frame loss.  ... 
arXiv:2201.07738v1 fatcat:cjysjbadb5dazmhs6a5ivv42ee

PET Protection Optimization for Streaming Scalable Videos With Multiple Transmissions

Ruiqin Xiong, David S. Taubman, Vijay Sivaraman
2013 IEEE Transactions on Image Processing  
This significantly accelerates the protection assignment procedure in the original LR-PET with only two transmissions, and also makes a quick and optimal protection assignment feasible for scenarios where  ...  This paper also gives a concrete proof to the redundancy embedding property of the channel codes formed by LR-PET, which allows for a decoupled optimization for sequentially dependent source elements with  ...  An important idea among these works is to utilize rateless (or fountain) codes, such as the LT codes [36] and Raptor codes [37] , to cope with channel uncertainties. In Ahmad et. al.  ... 
doi:10.1109/tip.2013.2272516 pmid:23864205 fatcat:2qs4kkfwk5eynjngnhoortvrtm
« Previous Showing results 1 — 15 out of 600 results