Decentralised distributed fountain coding: asymptotic analysis and design

D Sejdinovic, RJ Piechocki, A Doufexi, M Ismail

Research output: Contribution to journalArticle (Academic Journal)peer-review

18 Citations (Scopus)
452 Downloads (Pure)

Abstract

A class of generic decentralised distributed fountain coding schemes is introduced and the tools of analysis of the performance of such schemes are presented. It is demonstrated that the developed approach can be used to formulate a robust code design methodology in a number of instances. We show that two non-standard applications of fountain codes, fountain codes for distributed source coding and fountain codes for unequal error protection lie within this decentralised distributed fountain coding framework.
Translated title of the contributionDecentralised distributed fountain coding: asymptotic analysis and design
Original languageEnglish
Pages (from-to)42 - 44
Number of pages3
JournalIEEE Communications Letters
Volume14
Issue number1
DOIs
Publication statusPublished - Jan 2010

Bibliographical note

Publisher: IEEE
Rose publication type: Journal article

Sponsorship: This work was supported by Toshiba TRL Ltd.

Terms of use: Copyright © 2010 IEEE. Reprinted from IEEE Communications Letters.

This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bristol's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected].

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Keywords

  • asymptotic analysis
  • rateless codes
  • decentralised code design

Fingerprint

Dive into the research topics of 'Decentralised distributed fountain coding: asymptotic analysis and design'. Together they form a unique fingerprint.

Cite this