This application claims the benefit, under 35 U.S.C. §365 of International Application PCT/US2006/47699, filed on Dec. 14, 2006, which was published in accordance with PCT Article 21(2) on Jun. 19, 2008, in English.
Field of the Technology
The present principles relate to communication systems.
Description of Related Art
Layered coding systems are commonly known and used throughout the communication industry. An example of such layered coding system is a MIMO (Multiple Input, Multiple Output) architecture. These multi-antenna systems have increased spectral efficiency through the use of spatial multiplexing.
A MIMO system is a system in which multiple transmit antennas and multiple receive antennas are employed. MIMO systems can generally achieve higher capacity in a rich-scattering environment compared to SISO (single input single output) systems. Different approaches can be used to achieve the MIMO capacity: a space-time code can be applied to multiple transmit antennas over multiple channel uses; a layered structure can also be applied where only a one-dimensional code is applied to each layer. Examples of layered structures are V-BLAST and D-BLAST structures proposed by Bell Labs. In V-BLAST, independently encoded data streams are sent through different transmit antennas. Hence, a layer represents one antenna in V-BLAST. In D-BLAST, the data-stream/antenna association is periodically cycled.
In general, a layered architecture means any interleaving method such that, at any time, different antennas belong to different layers and each antenna index belongs to one and only one layer at any time. A layer is the indexes of the antenna as a function of time. For purpose of illustration, a layered structure is shown in
In accordance with one general aspect of the present principles, the method includes transmitting a codeword encoded with a rateless code, monitoring a predetermined time interval, and transmitting a subsequent codeword encoded with a rateless code based upon expiration of the time interval.
According to another aspect of the present principles, the apparatus includes a timer for monitoring a predetermined time interval, and a controller for enabling transmission of a codeword encoded with a rateless code and forcing transmission of a subsequent codeword encoded with the rateless code based upon expiration of said predetermined time interval.
In accordance with another aspect, the method includes receiving a codeword encoded with a rateless code, and sending an indication signal in response to one of successful receipt of the received codeword or expiration of a predetermined time interval, whichever occurs first.
In yet another aspect, the apparatus includes a timer for monitoring predetermined time intervals, and a controller for sending an indication signal indicating one of the expiration of a predetermined time interval or successful receipt of a codeword encoded with a rateless code.
The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features will be apparent from the description and drawings, and from the claims.
In the drawings wherein like reference numerals denote similar components throughout the views:
In a layered MIMO system, such as, for example, V-BLAST or D-BLAST architectures, rateless codes can be used across sub-channels to provide error correction. In such a system, codewords can be decoded when enough information has been received. In order to determine when enough information has been received, the channel conditions, for example, the instantaneous signal-to-noise ratio (SNR), are monitored. The mutual information is a function of the SNR. By averaging the mutual information over time, the maximum transmission rate can be determined. One problem is that, under poor conditions, the time required to accumulate enough mutual information in order to decode a codeword may be long, and systems having real-time constraints, for example, streaming video, will suffer undue delay and error.
According to an implementation of the present principles, the sending of subsequent codewords encoded with a rateless code can be based on timing, or alternatively, can use the SNR information and correspondingly stored look up tables to obtain capacity values of the communication layer to avoid over-estimation of the received mutual information.
Referring to
During the time interval, the transmitter determines whether an indication signal in the form of an acknowledgement signal (ACK) has been received (406). When the indication signal ACK has been received during the time interval, the next codeword is transmitted 410.
If the indication signal ACK is not received during the time interval, the system proceeds as if an erasure flag has been received 408 and forces the subsequent transmission of the next codeword 410. Although an erasure flag may not necessarily be received by the transmitter, by forcing the transmitter to comply with the time intervals for codeword transmission, the real time constraints or requirements of the system can still be met.
According to various implementations, the positive acknowledgement ACK can be an indication that the transmitted codeword was received successfully, or an indication of successful receipt and successful decoding. The negative acknowledgement NACK can be an indication that the transmitted codeword may be unreliable or unable to be fully decoded. When a NACK is identified, the transmitter modifies a subsequent modulation scheme 508 used to transmit the next codeword 510. In one implementation, the NACK functions to notify the transmitter that the current modulation scheme is not working on the decoder side and the transmitter responds by modifying the modulation scheme for subsequent transmissions.
In accordance with another implementation shown in
Conversely, as shown in
When the time interval at step 704 expires and the successful receipt and decoding of the codeword is not confirmed (step 706), the receiver forces the sending of the indication signal 708 to enable the receipt of the subsequent codeword 710. As described above, the indication signal in this instance may include an erasure flag or have the same embodied in a negative acknowledgement (NACK) that is used to inform the source of the received data to modify the modulation scheme used for subsequent transmitting.
In accordance with one implementation, the indication signal sent 708, can include a modulation modification index or other modulation scheme modification instruction to the source of the encoded codewords. This is particularly applicable when the encoded codeword is not successfully received and/or cannot be successfully decoded (e.g., when the NACK signal is generated and returned to the source of the received data). As mentioned above, the modulation modification index or other modulation scheme modification instruction can be a positive increase in the modulation order when successful receipt and/or decoding is confirmed multiple times within a predetermined time interval.
As mentioned above, it is possible that during communication in a layered MIMO system, the computed mutual information (using an unconstrained channel capacity formula) may be much higher than the actual mutual information obtained in the receiver, especially when common modulation schemes such as, for example QPSK or 16-QAM are used in the system. This is an over-estimation of the mutual information which has an adverse effect on subsequent transmissions.
In order to overcome this problem and avoid over-estimation of the mutual information acquired in the receiver the actual capacity formula for the modulation is used in each layer. For example, when the SNR=5 db, the capacity for QPSK modulation is 1.7 bits/symbol. In the event there is no closed form capacity formula (for example, there is no close-form capacity formula for 16-QAM modulation) or the capacity computation is complicated (for example, would take too much processing time), a look-up table (LUT) can be used to obtain the received mutual information based on a determined quality metric for the layer/channel in the communication system and the type of modulation being used. In accordance with one implementation, the quality metric is the signal-to-noise ratio (SNR) in the layer. Furthermore, look-up tables (LUTs) can also be used to obtain the optimum modulation format supported by the communication channels based on the determined quality metric for the layer/channel in the communication system.
Referring to
The computed quality metric is used to determine, using for example the processor 902, the optimum modulation format supported by the communication medium 1006. Once determined, the controller of the decoder is configured to receive subsequent codewords based on the modified modulation scheme. The modified modulation scheme was derived from the determined optimum modulation format capable of being supported by, and used for sending data over, the communication medium 1008.
In accordance with a further implementation 1100, shown in
Referring to
The method 115 further includes determining an estimate, based on the identified modulation scheme/format and the determined quality metric, an estimate of an amount of mutual information being received per unit of received encoded data. Determining the estimate may be performed in various ways, such as, by example using a closed-form capacity equation. The method 1115 illustrates another implementation that may provide increased speed, and that will also accommodate capacity equations that are not closed-form.
The method 1115 further includes accessing a particular LUT based on the identified modulation scheme/format and the determined quality metric 1120, and accessing an entry in the particular LUT that provides an estimate of an amount of mutual information being received per unit of received encoded data 1130. The method 1115 further includes determining an amount of mutual information received based on the accessed entry 1140. In one implementation, the LUT is a one-dimensional table (for example, a list) including mutual information for a given modulation format, with each entry corresponding to a different SNR. In another implementation, the LUT is a two-dimensional table (for example, a matrix), with rows corresponding to modulation format and columns corresponding to SNR, and entries corresponding to mutual information indicators for a particular row (modulation format) and column (SNR). The mutual information indicators (the entries in the LUTs) may be determined, for example, based on a capacity formula corresponding to the identified modulation scheme and SNR. This use of LUTs may be performed without using other concepts and aspects described in this application, or may be used in conjunction with one or more other concepts and aspects.
In MIMO and other communication systems, although the capacity calculation is performed to compute the received mutual information, unfortunately, it is typically only an approximation and accurate in the limit over time. Thus, even when the overall received mutual information is declared to be sufficient for decoding by the receiver, it may, in fact, still be insufficient to decode a codeword.
According to one aspect of the present principles, this insufficiency is addressed by enabling the accumulation of additional mutual information in the receiver beyond that which is considered an ordinary amount to enable accurate decoding of the received codeword. The accumulation of additional mutual information provides a higher probability of successful decoding.
Thus, referring to
Once the “initial predetermined amount” of mutual information has been received, additional encoded data for the data block is received 1204, and another determination is made as to whether an extra predetermined amount of mutual information for the data block has been received beyond the initial predetermined amount 1205. One the additional amount or “extra predetermined amount” of mutual information has been accumulated, the receiver decodes the received codeword (1206) and then continues to receive MI and encoded codewords for the next received transmission. The decoding of the codeword 1206, in this implementation is performed using only the initial predetermined amount of encoded data. As shown in
Those of skill in the art will recognize that the actual amount of the “extra predetermined amount” can vary from communication system to communication system without departing from the spirit of the present principles.
In accordance with another implementation, the amount of initial mutual information and extra mutual information that is accumulated can be based on timing. For example, and referring to
As mentioned above, the first predetermined time interval is of a length that is considered sufficient to enable or allow the decoder to successfully receive and decode the encoded codeword. This first predetermined time interval may be different for different communications systems and different modulation techniques employed by such systems. Implementations may combine the two timers into a single timer.
In accordance with the present principles, the accumulation of extra or additional mutual information may provide increased reliability, however this typically comes with a trade-off of slower data rates due to the added information. In addition, the accumulation of additional or extra mutual information leads to longer codewords for the decoder to decode and therefore generally results in a higher decoding complexity. These trade-offs are acceptable for many applications. However, in view of the increased complexity in decoding and/or the slower data rates resulting from the accumulation of additional mutual information, some implementations use concatenated coding for the codewords, in which the outer code is, for example, a block code, such as a Reed Solomon or BCH code, and the inner code is a rateless code.
In one such implementation, K information bits are first encoded into a codeword of length N bits using an (N, K) outer block code. Each codeword is broken up into sub-blocks of smaller size. For example, an N-bit codeword can be broken into four sub-blocks, each having a length of N/4 bits. An inner rateless code is applied to each sub-block of the codeword. By breaking up the block codeword into sub-blocks prior to encoding with an inner rateless code, the decoding complexity of the rateless codewords can be reduced because the size of the rateless codeword required for successful decoding is expected to be smaller. Alternatively, by breaking up the codeword into sub-blocks prior to encoding with the rateless code, the outer block codes can be larger and may thereby provide more error correction for a given number of parity bits than would be achieved with several smaller block codes used serially. Additionally, larger block codes provide better burst error correction, compared to smaller block codes, by, for example, correcting bursts that a smaller block code would not be able to correct. Further, at least some of the advantages of a larger block code and a smaller rateless code may be achieved together in the same implementation.
According to a further implementation, a method 1700 generates an outer block codeword for an input block of data 1710, and an inner rateless codeword is determined for a sub-block of the outer block codeword 1720. The method 1700 then begins sending a predetermined amount of the rateless codeword 1730. After a first time interval expires 1740, the predetermined amount is presumed to have been sent, and the method 1700 begins sending a second predetermined amount of the rateless codeword 1750. After a second time interval expires 1750, the second predetermined amount is presumed to have been sent. The method 1700 can be repeated for sending a rateless codeword for each sub-block. Further, the timers may be combined in an implementation.
Those of skill in the art will recognize that the controller and processor can be configured separately to function together, or alternatively could be embodied in a single device having corresponding program and logic to function as described herein.
The use of acknowledgement signals in layered communication systems employing rateless codes has its advantages, as discussed above. Particularly, an acknowledgement can be sent as soon as enough mutual information has been deemed received. However, although valuable, the sending of such acknowledgements may not take full advantage of the communication channel (for example, may not utilize the full capacity of the channel to increase data rates).
By way of example, when the modulation on each channel is BPSK or QPSK, the channel may support a higher order of modulation (e.g., 16-QAM), which will, in turn, support higher data rates.
There are several ways to determine whether such modulation scheme modifications are possible. The implementations shown and described with reference to
Referring to
By way of example, processor 2304 has been shown with a clock 2306. Those of skill in the art will recognize that the clock 2306 can be implemented in many different ways without departing from the spirit of the present principles. For purposes of this example, clock 2306 can be used to establish a predetermined time interval, during which, the controller 2302 accesses the information relating to the quality of the communication channel 2310. In this manner, the monitoring of the communication quality over the channel 2310 can be limited to a pre-set or predetermined time period, which assists in meeting any of the real time constraints of the communication system.
According to several exemplary implementations, the form of the indication signals can be acknowledgement signals (e.g., ACK), negative acknowledgement signals (NACK), or any other designated signal whose generation or receipt can be used to determine the communication channel quality. Examples of the use of ACKs and NACKs have been described earlier.
The modulation index can be any type of signal that the transmitter/encoder can recognize and act upon. For example, the modulation index can be a control signal provided in a header of other data being fed back from the receiver to the transmitter. In other implementations, it can be part of the indication signal (either ACK or NACK). Those of skill in the art will recognize that the form of the modulation index can be any suitable form.
In accordance with this implementation, the quality metric is a tangible determination as to the level of quality that can be obtained on the communication channel 3012. One example of such quality metric would be the Signal to Noise (SNR) ratio of the channel 3012. Using the SNR of the channel, along with other known information, such as, for example, the current modulation scheme, a new or modified modulation scheme can be identified for maximizing the use of the channel. In systems, such as a layered communication system where there are multiple communication channels for transmitting the modulated data, an average SNR for all the channels can be used as the quality metric or an average SNR for each channel can be used as the quality metric of each channel. The average could be an average over the layers, an average over time, etc. In other alternative implementations, a block wise SNR may also be used without departing from the spirit of the present principles. Other implementations may include a peak SNR determination for use as the quality metric.
Referring to
According to another implementation, shown in
Using the computed quality metric, the decoder instructs the source of the received data to modify the modulation scheme used to transmit subsequent data over the at least one communication channel 3306.
As should be clear, many implementations described in this application may be performed by a receiver, a transmitter, or both.
The various aspects, implementations, and features may be implemented in one or more of a variety of manners, even if described above without reference to a particular manner or using only one manner. For example, the various aspects, implementations, and features may be implemented using, for example, one or more of a method, an apparatus, an apparatus or processing device for performing a method, a program or other set of instructions, an apparatus that includes a program or a set of instructions, and a computer readable medium.
An apparatus may include, for example, discrete or integrated hardware, firmware, and software. As an example, an apparatus may include, for example, a processor, which refers to processing devices in general, including, for example, a microprocessor, an integrated circuit, or a programmable logic device. As another example, an apparatus may include one or more computer readable media having instructions for carrying out one or more processes.
A computer readable medium may include, for example, a software carrier or other storage device such as, for example, a hard disk, a compact diskette, a random access memory (“RAM”), or a read-only memory (“ROM”). A computer readable medium also may include, for example, formatted electromagnetic waves encoding or transmitting instructions. Instructions may be, for example, in hardware, firmware, software, or in an electromagnetic wave. Instructions may be found in, for example, an operating system, a separate application, or a combination of the two. A processor may be characterized, therefore, as, for example, both a device configured to carry out a process and a device that includes a computer readable medium having instructions for carrying out a process.
A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made. For example, elements of different implementations may be combined, supplemented, modified, or removed to produce other implementations. Accordingly, other implementations are within the scope of the following claims.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US2006/047699 | 12/14/2006 | WO | 00 | 6/9/2009 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2008/073093 | 6/19/2008 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5428637 | Oliva et al. | Jun 1995 | A |
7017104 | Chen et al. | Mar 2006 | B1 |
7124343 | Moulsley et al. | Oct 2006 | B2 |
7155170 | Miyoshi et al. | Dec 2006 | B2 |
7386277 | Cho et al. | Jun 2008 | B2 |
7408913 | Khan | Aug 2008 | B2 |
7434137 | Itoh et al. | Oct 2008 | B2 |
7472200 | Taylor et al. | Dec 2008 | B1 |
7508748 | Kadous | Mar 2009 | B2 |
7508791 | Kalhan et al. | Mar 2009 | B2 |
7720504 | Murata et al. | May 2010 | B2 |
7924761 | Stevens | Apr 2011 | B1 |
7953428 | Shimizu et al. | May 2011 | B2 |
8149810 | Narasimhan | Apr 2012 | B1 |
8428042 | Chion | Apr 2013 | B1 |
20010025361 | Kim | Sep 2001 | A1 |
20010051530 | Shiotsu et al. | Dec 2001 | A1 |
20020013922 | Gueguen | Jan 2002 | A1 |
20020106989 | Aizawa et al. | Aug 2002 | A1 |
20030022629 | Miyoshi et al. | Jan 2003 | A1 |
20030039218 | Kwak | Feb 2003 | A1 |
20030048857 | Onggosanusi et al. | Mar 2003 | A1 |
20030063587 | Cho et al. | Apr 2003 | A1 |
20030095506 | Jalali et al. | May 2003 | A1 |
20030165120 | Uesugi et al. | Sep 2003 | A1 |
20030210668 | Malladi et al. | Nov 2003 | A1 |
20040002309 | Ashikhmin et al. | Jan 2004 | A1 |
20040004998 | Fitton et al. | Jan 2004 | A1 |
20040022213 | Choi et al. | Feb 2004 | A1 |
20040218899 | Oyama et al. | Nov 2004 | A1 |
20050047514 | Bolinth et al. | Mar 2005 | A1 |
20050075103 | Hikokubo | Apr 2005 | A1 |
20050088959 | Kadous | Apr 2005 | A1 |
20050094659 | Watson | May 2005 | A1 |
20050102598 | Shokrollahi | May 2005 | A1 |
20050105494 | Kim | May 2005 | A1 |
20050136844 | Giesberts et al. | Jun 2005 | A1 |
20050210355 | Itoh et al. | Sep 2005 | A1 |
20050219999 | Kim et al. | Oct 2005 | A1 |
20050220047 | Baey et al. | Oct 2005 | A1 |
20050255807 | Araki et al. | Nov 2005 | A1 |
20050270978 | Haines | Dec 2005 | A1 |
20050276266 | Terry | Dec 2005 | A1 |
20050276317 | Jeong | Dec 2005 | A1 |
20050288062 | Hammerschmidt et al. | Dec 2005 | A1 |
20060019602 | Ionescu et al. | Jan 2006 | A1 |
20060056380 | Mitsugi | Mar 2006 | A1 |
20060087456 | Luby | Apr 2006 | A1 |
20060093058 | Skraparlis | May 2006 | A1 |
20060107165 | Murata | May 2006 | A1 |
20060235895 | Rodriguez et al. | Oct 2006 | A1 |
20070041461 | Lu et al. | Feb 2007 | A1 |
20070133691 | Kozat | Jun 2007 | A1 |
20070173206 | Furukawa et al. | Jul 2007 | A1 |
20070195894 | Shokrollahi et al. | Aug 2007 | A1 |
20070201536 | Nicolas et al. | Aug 2007 | A1 |
20070217432 | Molisch et al. | Sep 2007 | A1 |
20070223620 | Kalhan et al. | Sep 2007 | A1 |
20070260957 | Soljanin et al. | Nov 2007 | A1 |
20080090517 | Cheng | Apr 2008 | A1 |
20080144512 | Molisch et al. | Jun 2008 | A1 |
20080144562 | Draper et al. | Jun 2008 | A1 |
20080152010 | Youn | Jun 2008 | A1 |
20080199021 | Park | Aug 2008 | A1 |
20090270028 | Khojastepour et al. | Oct 2009 | A1 |
20090304117 | Koslov | Dec 2009 | A1 |
20100020782 | Koslov et al. | Jan 2010 | A1 |
20100067568 | Koslov | Mar 2010 | A1 |
20100067614 | Koslov | Mar 2010 | A1 |
20110200088 | Koslov | Aug 2011 | A1 |
20120182914 | Hariharan et al. | Jul 2012 | A1 |
20130265494 | Mourad et al. | Oct 2013 | A1 |
20130265960 | Wang et al. | Oct 2013 | A1 |
20150138999 | Avudainayagam et al. | May 2015 | A1 |
20160099790 | Balachandran et al. | Apr 2016 | A1 |
20160345202 | Bharadwaj et al. | Nov 2016 | A1 |
20160359653 | Lee et al. | Dec 2016 | A1 |
20170063498 | Venkatsuresh et al. | Mar 2017 | A1 |
Number | Date | Country |
---|---|---|
1238075 | Dec 1909 | CN |
1433228 | Jul 2003 | CN |
10059490 | Nov 2000 | DE |
1492263 | Dec 2004 | EP |
1528832 | May 2005 | EP |
1542385 | Jun 2005 | EP |
1580917 | Sep 2005 | EP |
1662688 | May 2006 | EP |
2361608 | Oct 2001 | GB |
08088620 | Apr 1996 | JP |
2001-333051 | Nov 2001 | JP |
200264424 | Feb 2002 | JP |
2003319458 | Nov 2003 | JP |
2004-40314 | Feb 2004 | JP |
2004-343754 | Dec 2004 | JP |
2005-20530 | Jan 2005 | JP |
2005-501455 | Jan 2005 | JP |
200564947 | Mar 2005 | JP |
2005-167780 | Jun 2005 | JP |
2005269480 | Sep 2005 | JP |
2005-277570 | Oct 2005 | JP |
2006-129277 | May 2006 | JP |
2006157133 | Jun 2006 | JP |
2006-211017 | Aug 2006 | JP |
2006217663 | Aug 2006 | JP |
2006340113 | Dec 2006 | JP |
2007510363 | Apr 2007 | JP |
2008-503183 | Jan 2008 | JP |
2008503183 | Jan 2008 | JP |
2009501483 | Jan 2009 | JP |
WO-9813940 | Apr 1998 | WO |
WO0018056 | Mar 2000 | WO |
WO 03019376 | Mar 2003 | WO |
WO03019817 | Mar 2003 | WO |
WO2004034589 | Apr 2004 | WO |
WO2004075023 | Sep 2004 | WO |
WO2005036753 | Apr 2005 | WO |
WO-2005046125 | May 2005 | WO |
2005125109 | Dec 2005 | WO |
2006013459 | Feb 2006 | WO |
WO2007111563 | Oct 2007 | WO |
WO2008073102 | Jun 2008 | WO |
WO2008073103 | Jun 2008 | WO |
WO2008073104 | Jun 2008 | WO |
WO2008073144 | Jun 2008 | WO |
Entry |
---|
Ashikhmin et al., “Algebraic Coding Theory and Information Theory”, DIMACS Workshop, Dec. 15-18, 2003, vol. 68, Piscataway, NJ. |
Castura et al., “Rateless Coding Over Fading Channels”, IEEE Communications Letters, vol. 10, No. 1, Jan. 2006. |
Caire et al., “Universal Variable-Length Data Compression of Binary Sources Using Fountain Codes”, ITW 2004, San Antonio, TX, Oct. 24-29, 2004, IEEE, pp. 123-128. |
Chung et al., “Reliable Wireless Multicast Using Fast Low-Density Erasure Codes”, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003, Apr. 22-25, 2003, vol. 2, pp. 1218-1222. |
Dekorsy et al., “Low-Rate Channel Coding With Complex-Valued Block Codes”, IEEE Transactions on Communications, vol. 51, No. 5, May 2003, pp. 800-809. |
Delsarte et al., “Algebraic Constructions of Shannon Codes for Regular Channels”, IEEE Transactions on Information Theory, vol. IT-28, No. 4, Jul. 1982, pp. 593-599. |
Eckford et al., “Rateless Slepian-Wolf Codes,” Conference Record of the Thirty-Ninth Asilomar Conference on Signals, Systems and Computers, Oct. 28-Nov. 1, 2005, pp. 1757-1761. |
Erez et al., “Rateless Space-Time Coding,” Proceedings 2005 Int'l. Symposium Information Theory, ISIT 2005, in Adelaide, Australia, Sep. 4-9, 2005, published in Piscataway, NJ, USA, pp. 1937-1941, XP010845889. |
Jenkac et al., “The turbo-fountain,” Special Issue on Next Generation Wireless and Mobile Communications, European Transactions on Telecommunications, May 23, 2006, pp. 337-349, published online in Wiley InterScience, Chichester, GB, vol. 17, No. 3. |
Kamikura et al., “Video Coding Using Global Motion and Brightness-Variation Compensation with Complexity Reduction,” Article in Japanese, only English abstract provided, Apparent Publication Date: Oct. 16, 2002. |
Ko et al., “Serial Concatenation Schemes for Space-Time and Recursive Convolutional Codes,” Proceedings of the 57th IEEE Semi-Annual Vehicular Technology Conference, Jeju, Korea, Apr. 22-25, 2003, vol. 4 of 4, pp. 736-740, XP010862224. |
Lin et al, “Improved Space-Time Codes Using Serial Concatenation,” IEEE Communications Letters, IEEE Service Center, Piscataway, NJ, US, vol. 4, No. 7, Jul. 2000, pp. 221-223, XP000958655. |
Liu, “A Lossless Layered Coding Strategy for MIMO Systems”, Proceedings of Int'l. Symposium on Information Theory, ISIT 2005, Sep. 4-9, 2005, pp. 1947-1951. |
Luo et al., “On Rate Control of Wireless Multicasting,” IEIC Technical Report (Institute of Electronics, Information and Communication Engineers, May 18, 2006, vol. 106, No. 60, pp. 7-10. |
Ma et al., “Fountain Codes and Applications to Reliable Wireless Broadcast System,” Proceedings of 2006 IEEE Information Theory Workshop (ITW'06), Oct. 22-26, 2006, in Chengdu, China, published IEEE, Piscataway, NJ, USA, pp. 66-70, XP002448345. |
Maymounkov et al., “Rateless Codes and Big Downloads,” Int'l. Workshop on Peer-to-Peer Systems, PTPS 2003, No. 2, Berkeley, CA, ETATS-UNIS (Feb. 21, 2003), vol. 2735, pp. 247-255. |
Palanki et al., “Rateless Codes on Noisy Channels,” Mitsubishi Electric Research Laboratories, TR-2003-124, Apr. 2004, pp. 1-12. |
Richardson et al., “The Capacity of Low-Density Parity-Check Codes Under Message-Passing Decoding,” IEEE Transactions on Information Theory, vol. 57, No. 2, Feb. 2001, pp. 599-618. |
Wang et al., “Combined Speech and Channel Coding for Wireless Communications,” Wireless Personal Communications: an Int'l. Journal, vol. 17, Issue 1, Apr. 2001, pp. 21-43, Kluwer Academic Publishers, Netherlands. |
Wiesel et al., “Turbo Equalization and Demodulation of Multicode Space Time Codes,” 2003 IEEE International Conference on Communications, Anchorage, AK, May 11-15, 2003, New York, NY, vol. 1 of 5, pp. 2296-2300, XP010642856. |
Wikipedia, “Mutual Information,” The free encyclopedia, http://en.wikipedia.org/wiki/Mutual—information, Nov. 29, 2006, pp. 1-6. |
Wikipedia, “Online Codes,” The free encyclopedia, http://en.wikipedia.org/wiki/Online codes, Nov. 29, 2006, pp. 1-3. |
Zhang et al., “Impact of Feedback Channel on Measured MIMO Systems and Its Lower Bound,” Chinese Journal of Electronics, vol. 14, No. 2, Apr. 2005. |
International Search Report, dated Jul. 11, 2007. |
Castura, et al., “Rateless Coding for Wireless Relay Channels”, pp. 1-6, University of Ottawa, Canada. |
Shokrollahi, “Raptor Codes”, IEEE Trainsactions on Information Theory, vol. 52. No, 6, Jun. 2006, pp. 2551-2567. |
Shan et al., “Two-Stage FEC Scheme for Scalable Video Transmission over Wireless Networks,” Proceedings of the SPIE, vol. 8015, pp. 173-186, Oct. 2005. |
Number | Date | Country | |
---|---|---|---|
20100020782 A1 | Jan 2010 | US |