搜索结果: 76-90 共查到“知识库 代数编码理论”相关记录103条 . 查询时间(1.281 秒)
An Efficient Retransmission Based on Network Coding with Unicast Flows
Wireless Network Network Coding Unicast Retransmission
2010/11/30
Recently, network coding technique has emerged as a promising approach that supports reliable transmission over wireless loss channels. In existing protocols where users have no interest in considerin...
Distributed STBCs with Partial Interference Cancellation Decoding
Distributed STBCs Partial Interference Cancellation Decoding
2010/12/8
Recently, Guo and Xia introduced low complexity decoders called Partial Interference ancellation (PIC) and PIC with Successive Interference Cancellation (PIC-SIC), which include the Zero Forcing (ZF) ...
Rebuilding for Array Codes in Distributed Storage Systems
Rebuilding Array Codes Distributed Storage Systems
2010/12/8
In distributed storage systems that use coding,the issue of minimizing the communication required to rebuild a storage node after a failure arises. We consider the problem of repairing an erased node ...
Channel Coding over Multiple Coherence Blocks with Queueing Constraints
Channel Coding Multiple Coherence Blocks Queueing Constraints
2010/12/15
This paper investigates the performance of wireless systems that employ finite-blocklength channel codes for transmission and operate under queueing constraints in the form of limitations on buffer ov...
Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel
Secret Sharing LDPC Codes Constrained Gaussian Wiretap Channel
2010/12/7
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a
destination intend to share secret information over a Gaussian channel in the presence of a wiretapper wh...
Secure Lossy Source Coding with Side Information at the Decoders
Secure Lossy Source Coding Side Information Decoders
2010/12/9
This paper investigates the problem of secure lossy source coding in the presence of an eavesdropper with arbitrary correlated side informations at the legitimate decoder (referred to as Bob) and the ...
Optimized IR-HARQ Schemes Based on Punctured LDPC Codes over the BEC
Optimized IR-HARQ Schemes Based Punctured LDPC Codes BEC
2010/12/6
We study incremental redundancy hybrid ARQ (IR-HARQ) schemes based on punctured, finite-length, LDPC codes. The transmission is assumed to take place over time varying binary erasure channels, such as...
Unitals in $PG(2,q^2)$ with a large $2$-point stabiliser
Unitals $PG(2,q^2)$ large $2$-point stabiliser
2010/12/15
Let U be a unital embedded in the Desarguesian projective plane PG(2, q2). Write M for the subgroup of PGL(3, q2) which preserves U. We show that U is classical if and only if U has
two distinct poin...
Braided Symmetric Algebras of Simple $U_q(sl_2)$-Modules and Their Geometry
Braided Symmetric Algebras Simple $U_q(sl_2)$-Modules Their Geometry
2010/12/7
In the present paper we prove decomposition formulae for the braided symmetric powers of simple U q(sl2)-modules, natural quantum analogues of the classical symmetric powers of a module over a complex...
The Golden Code is a full-rate full-diversity space-time code, which achieves maximum coding gain for Multiple-InputMultiple-Output (MIMO) systems with two transmit and two receive antennas. Since fou...
Rank Bounds for Design Matrices with Applications to Combinatorial Geometry and Locally Correctable Codes
Design Matrices Applications Combinatorial Geometry Locally Correctable Codes
2010/12/10
A (q, k, t)-design matrix is an m×n matrix whose pattern of zeros/non-zeros satisfies the
following design-like condition: each row has at most q non-zeros, each column has at least
k non-zeros and ...
This paper introduces a random multiple access method for satellite communications, named Network Codingbased Slotted Aloha (NCSA). The goal is to improve diversity of data bursts on a slotted-ALOHA-l...
Quantifying Information Leakage in Finite Order Deterministic Programs
Quantifying Information Finite Order Deterministic Programs
2010/12/16
Information ow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution.
Joint Source-Channel Coding with Correlated Interference
Joint Source-Channel Correlated Interference
2010/11/29
In this paper, we study the joint source-channel coding problem of transmitting a discrete-time analog source over an AWGN channel with interference known at transmitter.
Coarse Network Coding: A Simple Relay Strategy to Resolve Interference
Coarse Network Coding Simple Relay Strategy Interference
2010/12/1
Reminiscent of the parity function in network coding for the butterfly network, it is shown that forwarding an even/odd indicator bit for a scalar quantization of a relay observation recovers 1 bit of...