Journal articles on the topic 'Fountain codes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Fountain codes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
MacKay, D. J. C. "Fountain codes." IEE Proceedings - Communications 152, no. 6 (2005): 1062. http://dx.doi.org/10.1049/ip-com:20050237.
Full textMirrezaei, Seyed Masoud, Karim Faez, and Shahram Yousefi. "Towards Fountain Codes." Wireless Personal Communications 77, no. 2 (January 9, 2014): 1533–62. http://dx.doi.org/10.1007/s11277-013-1597-7.
Full textAsteris, Megasthenis, and Alexandros G. Dimakis. "Repairable Fountain Codes." IEEE Journal on Selected Areas in Communications 32, no. 5 (May 2014): 1037–47. http://dx.doi.org/10.1109/jsac.2014.140522.
Full textKIRIAN, M. L., G. MEREGILLANO, D. GENNETTE, and J. M. WEINTRAUB. "Multi-jurisdictional investigation of interactive fountain-associated cryptosporidiosis and salmonellosis outbreaks." Epidemiology and Infection 136, no. 11 (January 16, 2008): 1547–51. http://dx.doi.org/10.1017/s0950268807000222.
Full textNOZAKI, Takayuki. "Zigzag Decodable Fountain Codes." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E100.A, no. 8 (2017): 1693–704. http://dx.doi.org/10.1587/transfun.e100.a.1693.
Full textNOZAKI, Takayuki. "Zigzag Decodable Fountain Codes." IEICE ESS Fundamentals Review 13, no. 1 (July 1, 2019): 7–19. http://dx.doi.org/10.1587/essfr.13.1_7.
Full textKumar, Siddhartha, Eirik Rosnes, and Alexandre Graell i Amat. "Secure Repairable Fountain Codes." IEEE Communications Letters 20, no. 8 (August 2016): 1491–94. http://dx.doi.org/10.1109/lcomm.2016.2574355.
Full textZhao, Yuli, Yin Zhang, Francis C. M. Lau, Hai Yu, and Zhiliang Zhu. "Improved online fountain codes." IET Communications 12, no. 18 (November 20, 2018): 2297–304. http://dx.doi.org/10.1049/iet-com.2018.5486.
Full textHarb, Ali Bazzi, Hiba, Zahraa Younes, Majd Ghareeb, and Samih Abdulnabi. "Fountain Codes: LT And Raptor Codes Implementation." International Journal of Engineering Research and Applications 07, no. 01 (January 2017): 97–102. http://dx.doi.org/10.9790/9622-07010197102.
Full textPeng, Xiao Feng, Yi Yang, Chuan Yang, and Kai Li Wang. "Research on Data Transmission Technology Based on Raptor Code in Wireless Sensor Networks." Applied Mechanics and Materials 442 (October 2013): 538–43. http://dx.doi.org/10.4028/www.scientific.net/amm.442.538.
Full textOrozco, Vivian Lucia, and Shahram Yousefi. "Trapping Sets of Fountain Codes." IEEE Communications Letters 14, no. 8 (August 2010): 755–57. http://dx.doi.org/10.1109/lcomm.2010.08.100548.
Full textAbbas, Waqas Bin, Paolo Casari, and Michele Zorzi. "Controlled Flooding of Fountain Codes." IEEE Transactions on Wireless Communications 16, no. 7 (July 2017): 4698–710. http://dx.doi.org/10.1109/twc.2017.2701822.
Full textWang, Zheng, and Jie Luo. "Fountain Communication using Concatenated Codes." IEEE Transactions on Communications 61, no. 2 (February 2013): 443–54. http://dx.doi.org/10.1109/tcomm.2012.09.110674.
Full textShang, Jin, Wenjun Xu, Chia-Han Lee, Xin Yuan, Ping Zhang, and Jiaru Lin. "REF Codes: Intermediate Performance Oriented Fountain Codes With Feedback." IEEE Transactions on Vehicular Technology 69, no. 11 (November 2020): 13148–64. http://dx.doi.org/10.1109/tvt.2020.3021086.
Full textCassuto, Yuval, and Amin Shokrollahi. "Online Fountain Codes With Low Overhead." IEEE Transactions on Information Theory 61, no. 6 (June 2015): 3137–49. http://dx.doi.org/10.1109/tit.2015.2422697.
Full textXi Liu and Teng Joon Lim. "Fountain codes over fading relay channels." IEEE Transactions on Wireless Communications 8, no. 6 (June 2009): 3278–87. http://dx.doi.org/10.1109/twc.2009.081102.
Full textShao, Hanqin, Hongbo Zhu, and Junwei Bao. "Analysis and Design of Enhanced Distributed Fountain Codes in Multiple Access Networks with Cooperative Relay." Symmetry 14, no. 10 (September 27, 2022): 2026. http://dx.doi.org/10.3390/sym14102026.
Full textQureshi, Jalaluddin, Chuan Heng Foh, and Jianfei Cai. "Primer and Recent Developments on Fountain Codes." Recent Advances in Communications and Networking Technology 2, no. 1 (March 18, 2014): 2–11. http://dx.doi.org/10.2174/22117407112019990001.
Full textLuus, F. P. S., A. McDonald, and B. T. Maharaj. "Universal Decremental Redundancy Compression with Fountain Codes." SAIEE Africa Research Journal 101, no. 2 (June 2010): 68–80. http://dx.doi.org/10.23919/saiee.2010.8532229.
Full textAbbas, Rana, Mahyar Shirvanimoghaddam, Tao Huang, Yonghui Li, and Branka Vucetic. "Novel Design for Short Analog Fountain Codes." IEEE Communications Letters 23, no. 8 (August 2019): 1306–9. http://dx.doi.org/10.1109/lcomm.2019.2910517.
Full textCai, Peixiang, Yu Zhang, Changyong Pan, and Jian Song. "Online Fountain Codes With Unequal Recovery Time." IEEE Communications Letters 23, no. 7 (July 2019): 1136–40. http://dx.doi.org/10.1109/lcomm.2019.2915670.
Full textBadarla, Venkataramana, Vijay Subramanian, and Douglas Leith. "Low-delay dynamic routing using fountain codes." IEEE Communications Letters 13, no. 7 (July 2009): 552–54. http://dx.doi.org/10.1109/lcomm.2009.081997.
Full textNiu, Hao, Masayuki Iwai, Kaoru Sezaki, Li Sun, and Qinghe Du. "Exploiting Fountain Codes for Secure Wireless Delivery." IEEE Communications Letters 18, no. 5 (May 2014): 777–80. http://dx.doi.org/10.1109/lcomm.2014.030914.140030.
Full textSpencer, James, Khaled F. Hayajneh, and Shahram Yousefi. "Robust quaternary fountain codes in AWGN interference." IET Communications 12, no. 20 (December 20, 2018): 2561–67. http://dx.doi.org/10.1049/iet-com.2018.5491.
Full textCohen, Asaf, Shlomi Dolev, and Nir Tzachar. "Efficient and Universal Corruption Resilient Fountain Codes." IEEE Transactions on Communications 61, no. 10 (October 2013): 4058–66. http://dx.doi.org/10.1109/tcomm.2013.082813.110754.
Full textZhang, Haojie, Weimin Bao, Min Yang, Xiaoping Li, and Yanming Liu. "Adaptive Classification Fountain Codes for Reentry Communication." IEEE Access 7 (2019): 62911–19. http://dx.doi.org/10.1109/access.2019.2915926.
Full textAbdulkhaleq, Nadhir Ibrahim, Nahla Abdul Jalil Salih, Rajaa Salih Mohammed Hasan, and Ihsan Jabbar Hasan. "A Simulink model for modified fountain codes." TELKOMNIKA (Telecommunication Computing Electronics and Control) 21, no. 1 (February 1, 2023): 18. http://dx.doi.org/10.12928/telkomnika.v21i1.23274.
Full textShao, Han Qin, Da Zhuan Xu, and Xiao Fei Zhang. "The Design and Analysis of Distributed Fountain Codes in Three-Source Single-Relay Networks." Applied Mechanics and Materials 556-562 (May 2014): 6042–45. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6042.
Full textAhmed, Safiyo M., NIU Fang-lin, H. Hasnain Imtiaz, and Asim Zaman. "ANTI EAVESDROPPING CODE SYSTEM BASED ON FOUNTAIN CODES." International Journal of Engineering Applied Sciences and Technology 04, no. 08 (December 31, 2019): 255–59. http://dx.doi.org/10.33564/ijeast.2019.v04i08.044.
Full textHuang, Jingxuan, Zesong Fei, Congzhe Cao, Ming Xiao, and Dai Jia. "On-Line Fountain Codes With Unequal Error Protection." IEEE Communications Letters 21, no. 6 (June 2017): 1225–28. http://dx.doi.org/10.1109/lcomm.2017.2669319.
Full textHuang, Jingxuan, Zesong Fei, Congzhe Cao, Ming Xiao, and Dai Jia. "Performance Analysis and Improvement of Online Fountain Codes." IEEE Transactions on Communications 66, no. 12 (December 2018): 5916–26. http://dx.doi.org/10.1109/tcomm.2018.2867436.
Full textLiva, Gianluigi, Enrico Paolini, and Marco Chiani. "Performance versus overhead for fountain codes over Fq." IEEE Communications Letters 14, no. 2 (February 2010): 178–80. http://dx.doi.org/10.1109/lcomm.2010.02.092080.
Full textDeng, Zaihui, Xiaojun Tong, Benshun Yi, and Liangcai Gan. "Fountain codes based on modulo and neural network." International Journal of Information and Communication Technology 9, no. 4 (2016): 463. http://dx.doi.org/10.1504/ijict.2016.079960.
Full textDeng, Zaihui, Xiaojun Tong, Benshun Yi, and Liangcai Gan. "Fountain codes based on modulo and neural network." International Journal of Information and Communication Technology 9, no. 4 (2016): 463. http://dx.doi.org/10.1504/ijict.2016.10000498.
Full textHashemi, Morteza, Yuval Cassuto, and Ari Trachtenberg. "Fountain Codes With Nonuniform Selection Distributions Through Feedback." IEEE Transactions on Information Theory 62, no. 7 (July 2016): 4054–70. http://dx.doi.org/10.1109/tit.2016.2570232.
Full textSejdinovic, D., D. Vukobratovic, A. Doufexi, V. Senk, and R. Piechocki. "Expanding window fountain codes for unequal error protection." IEEE Transactions on Communications 57, no. 9 (September 2009): 2510–16. http://dx.doi.org/10.1109/tcomm.2009.09.070616.
Full textMolisch, Andreas, Neelesh Mehta, Jonathan Yedidia, and Jin Zhang. "Performance of Fountain Codes in Collaborative Relay Networks." IEEE Transactions on Wireless Communications 6, no. 11 (November 2007): 4108–19. http://dx.doi.org/10.1109/twc.2007.060232.
Full textLee, Shih-Kai, Yen-Ching Liu, Hsin-Liang Chiu, and Yung-Chih Tsai. "Fountain Codes With PAPR Constraint for Multicast Communications." IEEE Transactions on Broadcasting 57, no. 2 (June 2011): 319–25. http://dx.doi.org/10.1109/tbc.2011.2104690.
Full textMirrezaei, Seyed Masoud, Karim Faez, and Shahram Yousefi. "Towards Fountain Codes. Part II: Belief Propagation Decoding." Wireless Personal Communications 77, no. 2 (June 6, 2014): 1563–84. http://dx.doi.org/10.1007/s11277-014-1646-x.
Full textVukobratovic, Dejan, Vladimir Stankovic, Dino Sejdinovic, Lina Stankovic, and Zixiang Xiong. "Scalable Video Multicast Using Expanding Window Fountain Codes." IEEE Transactions on Multimedia 11, no. 6 (October 2009): 1094–104. http://dx.doi.org/10.1109/tmm.2009.2026087.
Full textAltman, Eitan, and Francesco De Pellegrini. "Forward Correction and Fountain Codes in Delay-Tolerant Networks." IEEE/ACM Transactions on Networking 19, no. 1 (February 2011): 1–13. http://dx.doi.org/10.1109/tnet.2010.2091968.
Full textCai, Peixiang, Yu Zhang, Yichen Wu, Xiaohua Chang, and Changyong Pan. "Feedback Strategies for Online Fountain Codes With Limited Feedback." IEEE Communications Letters 24, no. 9 (September 2020): 1870–74. http://dx.doi.org/10.1109/lcomm.2020.2997683.
Full textHanqin Shao, Dazhuan Xu, and Xiaofei Zhang. "Asymptotic Analysis and Optimization for Generalized Distributed Fountain Codes." IEEE Communications Letters 17, no. 5 (May 2013): 988–91. http://dx.doi.org/10.1109/lcomm.2013.040913.130187.
Full textShirvanimoghaddam, Mahyar, Yonghui Li, and Branka Vucetic. "Near-Capacity Adaptive Analog Fountain Codes for Wireless Channels." IEEE Communications Letters 17, no. 12 (December 2013): 2241–44. http://dx.doi.org/10.1109/lcomm.2013.101813.131972.
Full textYildiz, Huseyin Ugur. "Maximization of Underwater Sensor Networks Lifetime via Fountain Codes." IEEE Transactions on Industrial Informatics 15, no. 8 (August 2019): 4602–13. http://dx.doi.org/10.1109/tii.2019.2892866.
Full textDai, Jingke, Xiao Chen, Fenggan Zhang, and Kai Kang. "Optimisation design of systematic fountain codes on fading channels." IET Communications 13, no. 20 (December 19, 2019): 3369–76. http://dx.doi.org/10.1049/iet-com.2019.0426.
Full textKasai, Kenta, David Declercq, and Kohichi Sakaniwa. "Fountain Coding via Multiplicatively Repeated Non-Binary LDPC Codes." IEEE Transactions on Communications 60, no. 8 (August 2012): 2077–83. http://dx.doi.org/10.1109/tcomm.2012.061112.110177.
Full textJames, Ashish, A. S. Madhukumar, Ernest Kurniawan, and Fumiyuki Adachi. "Performance Analysis of Fountain Codes in Multihop Relay Networks." IEEE Transactions on Vehicular Technology 62, no. 9 (November 2013): 4379–91. http://dx.doi.org/10.1109/tvt.2013.2265279.
Full textHayajneh, Khaled F. "Memory-Based LT Codes for Efficient 5G Networks and Beyond." Electronics 10, no. 24 (December 20, 2021): 3169. http://dx.doi.org/10.3390/electronics10243169.
Full textBlasco, Francisco Lazaro, Giuliano Garrammone, and Gianluigi Liva. "Parallel Concatenation of Non-Binary Linear Random Fountain Codes with Maximum Distance Separable Codes." IEEE Transactions on Communications 61, no. 10 (October 2013): 4067–75. http://dx.doi.org/10.1109/tcomm.2013.090513.120834.
Full text