基于级联稀疏二部图的右边正则纠删码精确阈值
摘要
提出了确定删除恢复算法下右边正则纠删码阈值的一个简单方法.证明了计算右边正则纠删码阈值的一个精确公式.这个新方法可避免求度分布函数的微分和逆这些复杂的运算。数值结果表明所提出新方法的有效性.
基金
国家自然科学基金资助项目(批准号
60573034
60572149)
参考文献15
-
1Elias P. Coding for two noisy channels. In: Proceedings of Information Theory, Third London Symp, London, Butterworths, September, New York: Academic Press, 1955, 61-74.
-
2Luby M. , Mitzenmacher M, Shokrollahi MA, et al. Practical loss-resilient codes. Proc of the 29th ACM Symposium on Theory of Computing, El Paso, Texas, United States, May, New York, USA: ACM, 1997, 150-159.
-
3Luby M, Mitzenmacher M, Shokrollahi MA, et al. Efficient erasure correcting codes. IEEE Trans Inform. Theory, 2001, 47(2) : 569-584.
-
4Shokrollahi MA. New sequences of linear time erasure codes approaching the channel capacity. In: Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes, Berlin, Germany: SpringerVerlag, 1999, 1719: 65-76.
-
5Oswald P, Shokrollahi MA. Capacity-achieving sequences for the erasure channel. IEEE Trans Inform Theory, 2002, 48(12) : 3017-3028.
-
6Di C, Proietti D, Telatar IE, et al. Finite length analysis of lowdensity parity-check codes on the binary erasure channel. IEEE Trans Inform Theory, 2002, 48(6): 1570-1579.
-
7Pishro-Nik H, Fekri F. On decoding of low-density parity-check codes over the binary erasure channel. IEEE Trans Inform Theory, 2004, 50(3) : 439-454.
-
8Gallager RG. Low Density Parity Check Codes. Cambridge, Massachusetts: MIT Press, 1963.
-
9Byers JW, Luby M, Mitzenmacher M, et al. A digital fountain approach to reliable distribution of bulk data. ACM SIGCOMM Computer Communication Review, 1998, 28(4): 56-67.
-
10Maymounkov P, Mazoeres D. Rateless codes and big downloads. In: Proceedings of the 2nd Int Workshop Peer-to-Peer Systems (IPTPS'03), Berkeley, USA, February, Germany: SpringerVerlag, USA, 2003, 1-6.
-
1慕建君,路成业,王新梅.关于纠删码的研究与进展[J].电子与信息学报,2002,24(9):1276-1281. 被引量:15
-
2冯秀芳,阴成军,徐占伟.无线传感器网络能量平衡融合算法[J].电脑开发与应用,2011,24(3):15-17.
-
3勒索软件将继续蔓延[J].网络安全和信息化,2017,0(4):5-5.
-
4刘刚,李永树.复杂网络空间模式下的网络演化过程及特性研究[J].计算机应用研究,2015,32(12):3657-3659. 被引量:6
-
5刘国柱,杜春晖.动态环境下TFRC协议改进及其仿真[J].计算机工程与设计,2009,30(5):1101-1103. 被引量:3
-
62007年12月BEC中级考试成绩开始接受考生网上查询[J].中国考试,2008(3):60-60.
-
7黄文庆.WSN中一种基于过采样的数据可靠收集方案[J].计算机应用与软件,2014,31(7):116-120.
-
8黄忠亿.“The Gross-Pitaevskii Equation and Its Application for BEC in Optical Lattices”国际研讨会[J].国际学术动态,2009(1).
-
9NEC启动印度生物识别技术中心[J].A&S(安全&自动化),2010(6):38-38.
-
10欧阳书馨,邱文杰,李辰宇.Raptor译码算法在Android平台上的移植技术研究[J].网络新媒体技术,2013,2(2):5-11.