메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Finite-length analysis of BATS codes

Author keywords

BATS codes; belief propagation; finite length analysis; inactivation decoding

Indexed keywords

ANALYTICAL TOOL; BATS CODES; BELIEF PROPAGATION; BELIEF PROPAGATION DECODING; EXTRA COMPUTATIONS; FINITE-LENGTH ANALYSIS; INACTIVATION DECODING; RECURSIVE FORMULA;

EID: 84883430928     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NetCod.2013.6570815     Document Type: Conference Paper
Times cited : (26)

References (10)
  • 1
    • 80054822109 scopus 로고    scopus 로고
    • Coding for a network coded fountain
    • Saint Petersburg, Russia, Aug
    • S. Yang and R. W. Yeung, "Coding for a network coded fountain, " in Proc. IEEE ISIT '11, Saint Petersburg, Russia, Aug. 2011.
    • (2011) Proc. IEEE ISIT '11
    • Yang, S.1    Yeung, R.W.2
  • 8
    • 39049128937 scopus 로고    scopus 로고
    • New model for rigorous analysis of LT-codes
    • Jul
    • E. Maneva and A. Shokrollahi, "New model for rigorous analysis of LT-codes, " in Proc. IEEE ISIT '06, Jul. 2006, pp. 2677-2679.
    • (2006) Proc. IEEE ISIT '06 , pp. 2677-2679
    • Maneva, E.1    Shokrollahi, A.2
  • 10
    • 79957617196 scopus 로고    scopus 로고
    • Computing the action of the matrix exponential, with an application to exponential integrators
    • A. H. Al-Mohy and N. J. Higham, "Computing the action of the matrix exponential, with an application to exponential integrators, " SIAM Journal on Scientific Computing, vol. 33, no. 2, pp. 488-511, 2011.
    • (2011) SIAM Journal on Scientific Computing , vol.33 , Issue.2 , pp. 488-511
    • Al-Mohy, A.H.1    Higham, N.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.