Design of efficiently encodable moderate-length high-rate irregular LDPC codes

M Yang, WE Ryan, Y Li - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
This paper presents a new class of irregular low-density parity-check (LDPC) codes of
moderate length (10/sup 3//spl les/n/spl les/10/sup 4/) and high rate (R/spl ges/3/4). Codes …

LDPC codes: An introduction

A Shokrollahi - Coding, cryptography and combinatorics, 2004 - Springer
LDPC codes are one of the hottest topics in coding theory today. Originally invented in the
early 1960's, they have experienced an amazing comeback in the last few years. Unlike …

Capacity-approaching bandwidth-efficient coded modulation schemes based on low-density parity-check codes

J Hou, PH Siegel, LB Milstein… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
We design multilevel coding (MLC) and bit-interleaved coded modulation (BICM) schemes
based on low-density parity-check (LDPC) codes. The analysis and optimization of the …

[PDF][PDF] A class of group-structured LDPC codes

RM Tanner, D Sridhara, T Fuja - Proc. ISTA, 2001 - Citeseer
A Class of Group-Structured LDPC Codes Page 1 A Class of Group-Structured LDPC Codes
R. Michael Tanner Deepak Sridhara and Tom Fuja1 Computer Science Department Dept. of …

A survey of results for deletion channels and related synchronization channels

M Mitzenmacher - 2009 - projecteuclid.org
The purpose of this survey is to describe recent progress in the study of the binary deletion
channel and related channels with synchronization errors, including a clear description of …

FMTCP: A fountain code-based multipath transmission control protocol

Y Cui, L Wang, X Wang, H Wang… - IEEE/ACM Transactions …, 2014 - ieeexplore.ieee.org
Ideally, the throughput of a Multipath TCP (MPTCP) connection should be as high as that of
multiple disjoint single-path TCP flows. In reality, the throughput of MPTCP is far lower than …

Topics in multi-user information theory

G Kramer - … and Trends® in Communications and Information …, 2008 - nowpublishers.com
This survey reviews fundamental concepts of multi-user information theory. Starting with
typical sequences, the survey builds up knowledge on random coding, binning …

Multidimensional reconciliation for a continuous-variable quantum key distribution

A Leverrier, R Alléaume, J Boutros, G Zémor… - Physical Review A …, 2008 - APS
We propose a method for extracting an errorless secret key in a continuous-variable
quantum key distribution protocol, which is based on Gaussian modulation of coherent …

Integer-forcing linear receivers

J Zhan, B Nazer, U Erez… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Linear receivers are often used to reduce the implementation complexity of multiple-antenna
systems. In a traditional linear receiver architecture, the receive antennas are used to …

Efficient reversible data hiding in encrypted images

X Zhang, Z Qian, G Feng, Y Ren - Journal of Visual Communication and …, 2014 - Elsevier
This paper proposes a novel scheme of reversible data hiding in encrypted images based
on lossless compression of encrypted data. In encryption phase, a stream cipher is used to …