… to erasurecodes to enhance their error correction capability, and new codes named as temporally enhanced erasurecodes (… In addition, to show its advantages, a reliableprotocol was …
JJ Lei, GI Kwon - KSII Transactions on Internet and Information …, 2010 - koreascience.kr
… reliably to a monitor center through sensor network nodes. While other types of reliability in WSN, such as event-driven reliability, … provision of packet-driven reliability (all packets sent by …
C Pavan Kumar, R Selvakumar - … Computing for Big Data Systems Over …, 2018 - Springer
… adoption of error correcting codes and erasurecodes plays a significant role… erasurecodes required for reliablecommunication with emphasis on Internet of Things (IoT) communication …
M Mutschlechner, B Li, R Kapitza… - … on-demand network …, 2014 - ieeexplore.ieee.org
… overall sensor network lifetime [6]. In this paper, we investigate the use … ErasureCodes (ECs) to improve the communicationreliability between the mobile nodes and the ground network…
… of sensor network … protocol based on the principles of modern erasurecodes. We show that our approach provides high reliability, often considered critical for disseminating codes. In …
P Ostovari, J Wu - 2015 IEEE 12th International Conference on …, 2015 - ieeexplore.ieee.org
… In this paper, we consider a wireless network which faces both random bit errors and packet … reliable transmissions, we benefit from joint forward error correction and erasurecodes, and …
T De Cola, M Marchese - IEEE Wireless Communications, 2010 - ieeexplore.ieee.org
… coding and has also been extensively considered within CCSDS as a focus of the Long ErasureCodes … The above considerations on ARQ strategies and erasurecoding schemes are …
X Zhang, Q Du - IEEE Transactions on Vehicular Technology, 2006 - ieeexplore.ieee.org
… ARQ–FEC protocol for mobile multicast services with diverse reliability QoS requirements. … with those using nonadaptive graph codes, Reed–Solomon erasurecodes (RSE), and the …
XH Peng - IEE Proceedings-Communications, 2005 - IET
… , according to (1), when it is employed as the erasurecode for reliable end-to-end communication in a distributed network. In this scenario, the transport layer of the source node …