Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Error Correction Coding: Mathematical Methods and AlgorithmsMay 2005
Publisher:
  • Wiley-Interscience
  • 605 Third Avenue New York, NY
  • United States
ISBN:978-0-471-64800-0
Published:01 May 2005
Skip Bibliometrics Section
Reflects downloads up to 15 Oct 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Ji X, Zhang J, Zou S, Chen Y, Qu G and Xu W (2024). MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding, IEEE Transactions on Mobile Computing, 23:3, (2486-2503), Online publication date: 1-Mar-2024.
  2. Lajam O and Mohammed S (2024). Optimizing efficiency of P2P content distribution with network coding, Journal of Network and Computer Applications, 223:C, Online publication date: 1-Mar-2024.
  3. Liu Y, Cai H and Tang X (2023). A New Cooperative Repair Scheme With k + 1 Helper Nodes for (n, k) Hadamard MSR Codes With Small Sub-Packetization, IEEE Transactions on Information Theory, 69:5, (2820-2829), Online publication date: 1-May-2023.
  4. Teeti M (2023). On capacity and performance of noncoherent OFDM-IM systems with binary codes, Digital Signal Processing, 133:C, Online publication date: 1-Mar-2023.
  5. Abdullahi S, Sun S, Wang Y, Yang P, Wang H and Wang B (2023). A hybrid BTP approach with filtered BCH codes for improved performance and security, Journal of Information Security and Applications, 71:C, Online publication date: 1-Dec-2022.
  6. Miao S, Rapp L and Schmalen L Error-and-erasure Decoding of Product and Staircase Codes with Simplified Extrinsic Message Passing 2022 IEEE International Symposium on Information Theory (ISIT), (1205-1210)
  7. ACM
    Patel M, de Oliveira G and Mutlu O HARP: Practically and Effectively Identifying Uncorrectable Errors in Memory Chips That Use On-Die Error-Correcting Codes MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture, (623-640)
  8. Dong G, Qing T, Tian L, Du R, Li J and Volchenkov D (2021). Optimization of Crude Oil Trade Structure, Complexity, 2021, Online publication date: 1-Jan-2021.
  9. Chen Y, Wang S, Li Z and He T (2020). Reliable Physical-Layer Cross-Technology Communication With Emulation Error Correction, IEEE/ACM Transactions on Networking, 28:2, (612-624), Online publication date: 1-Apr-2020.
  10. Meng P, Tian C and Cheng X (2019). Publicly verifiable and efficiency/security-adjustable outsourcing scheme for solving large-scale modular system of linear equations, Journal of Cloud Computing: Advances, Systems and Applications, 8:1, Online publication date: 27-Dec-2019.
  11. Cayrel P, Gueye C, Khan J, Klamti J and Persichetti E Improvement of Binary and Non Binary Statistical Decoding Algorithm Information Security and Cryptology – ICISC 2019, (194-207)
  12. Paul D and Stevanović D (2019). Eigenvector-based identification of bipartite subgraphs, Discrete Applied Mathematics, 269:C, (146-158), Online publication date: 30-Sep-2019.
  13. Harrison W, Fernandes T, Gomes M and Vilela J (2019). Generating a Binary Symmetric Channel for Wiretap Codes, IEEE Transactions on Information Forensics and Security, 14:8, (2128-2138), Online publication date: 1-Aug-2019.
  14. Chang L, Chen P, Tan V, Wang C and Han Y (2019). On the Maximum Size of Block Codes Subject to a Distance Criterion, IEEE Transactions on Information Theory, 65:6, (3751-3757), Online publication date: 1-Jun-2019.
  15. Nahiyan A, Farahmandi F, Mishra P, Forte D and Tehranipoor M (2019). Security-Aware FSM Design Flow for Identifying and Mitigating Vulnerabilities to Fault Attacks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 38:6, (1003-1016), Online publication date: 1-Jun-2019.
  16. Mohebbi H (2019). Parallel SIMD CPU and GPU Implementations of Berlekamp---Massey Algorithm and Its Error Correction Application, International Journal of Parallel Programming, 47:1, (137-160), Online publication date: 1-Feb-2019.
  17. Sohn J, Choi B, Yoon S and Moon J (2018). Capacity of Clustered Distributed Storage, IEEE Transactions on Information Theory, 65:1, (81-107), Online publication date: 1-Jan-2019.
  18. ACM
    Gupta A, Yang J and Balakrishnan R Asterisk and Obelisk Proceedings of the 31st Annual ACM Symposium on User Interface Software and Technology, (725-736)
  19. Liu Z, Mao M, Liu T, Wang X, Wen W, Chen Y, Li H, Wang D, Pei Y and Ge N (2018). TriZone, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37:10, (1985-1998), Online publication date: 1-Oct-2018.
  20. ACM
    Sella O, Moore A and Zilberman N FEC Killed The Cut-Through Switch Proceedings of the 2018 Workshop on Networking for Emerging Applications and Technologies, (15-20)
  21. ACM
    Zhang Y, Feng D, Tong W, Hua Y, Liu J, Tan Z, Wang C, Wu B, Li Z and Xu G (2018). CACF, ACM Transactions on Architecture and Code Optimization, 15:2, (1-26), Online publication date: 30-Jun-2018.
  22. Kadampot I, Tahmasbi M and Bloch M Multilevel-Coded Pulse-Position Modulation for Covert Communications 2018 IEEE International Symposium on Information Theory (ISIT), (1864-1868)
  23. ACM
    Kolditz T, Habich D, Lehner W, Werner M and de Bruijn S AHEAD Proceedings of the 2018 International Conference on Management of Data, (1619-1634)
  24. Hukerikar S, Teranishi K, Diniz P and Lucas R (2018). RedThreads, International Journal of Parallel Programming, 46:2, (225-251), Online publication date: 1-Apr-2018.
  25. C P and R S (2017). Performance of Concatenated Kernel Code in Cognitive Radio Networks, Procedia Computer Science, 115:C, (330-337), Online publication date: 1-Nov-2017.
  26. Cohen R, Cassuto Y, Cohen R and Cassuto Y (2017). Coding for Improved Throughput Performance in Network Switches, IEEE/ACM Transactions on Networking, 25:5, (2802-2814), Online publication date: 1-Oct-2017.
  27. Hukerikar and Engelmann (2017). Resilience Design Patterns, Supercomputing Frontiers and Innovations: an International Journal, 4:3, (4-42), Online publication date: 15-Sep-2017.
  28. ACM
    Chen R and Prasanna V Optimal Circuits for Parallel Bit Reversal Proceedings of the 54th Annual Design Automation Conference 2017, (1-6)
  29. Yudin O, Ziatdinov Y, Voronin A and Ilyenko A (2016). Basic Concepts and Mathematical Aspects in Channel Coding, Cybernetics and Systems Analysis, 52:6, (878-883), Online publication date: 1-Nov-2016.
  30. Bala Krishna M and Dugar A (2016). Product Authentication Using QR Codes, Wireless Personal Communications: An International Journal, 90:1, (381-398), Online publication date: 1-Sep-2016.
  31. Farsad N, Yilmaz H, Eckford A, Chae C and Guo W (2016). A Comprehensive Survey of Recent Advancements in Molecular Communication, IEEE Communications Surveys & Tutorials, 18:3, (1887-1919), Online publication date: 1-Jul-2016.
  32. Blawat M, Gaedke K, Htter I, Chen X, Turczyk B, Inverso S, Pruitt B and Church G (2016). Forward Error Correction for DNA Data Storage, Procedia Computer Science, 80:C, (1011-1022), Online publication date: 1-Jun-2016.
  33. Berend D, Dolev S, Frenkel S and Hanemann A (2016). Towards holographic "brain" memory based on randomization and Walsh-Hadamard transformation, Neural Networks, 77:C, (87-94), Online publication date: 1-May-2016.
  34. Abuadbba A, Khalil I, Ibaida A and Atiquzzaman M (2016). Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach, Ad Hoc Networks, 41:C, (30-46), Online publication date: 1-May-2016.
  35. Ruan Z, Luo H and Chen Z (2016). Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks, International Journal of Communication Systems, 29:5, (992-1011), Online publication date: 25-Mar-2016.
  36. Wen W, Mao M, Li H, Chen Y, Pei Y and Ge N A holistic tri-region MLC STT-RAM design with combined performance, energy, and reliability optimizations Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1285-1290)
  37. Scholl S, Schläfer P and Wehn N Saturated min-sum decoding Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1219-1224)
  38. Zhou Q, Mow W, Zhang S and Toumpakaris D (2016). Two-Way Decode-and-Forward for Low-Complexity Wireless Relaying: Selective Forwarding Versus One-Bit Soft Forwarding, IEEE Transactions on Wireless Communications, 15:3, (1866-1880), Online publication date: 1-Mar-2016.
  39. Wang Y, Narayanan K and Huang Y (2016). Interleaved Concatenations of Polar Codes With BCH and Convolutional Codes, IEEE Journal on Selected Areas in Communications, 34:2, (267-277), Online publication date: 1-Feb-2016.
  40. Sampaio F, Shafique M, Zatt B, Bampi S and Henkel J Approximation-aware multi-level cells STT-RAM cache architecture Proceedings of the 2015 International Conference on Compilers, Architecture and Synthesis for Embedded Systems, (79-88)
  41. Miloslavskaya V (2015). Shortened Polar Codes, IEEE Transactions on Information Theory, 61:9, (4852-4865), Online publication date: 1-Sep-2015.
  42. Luque J, Morón M and Casilari E (2015). A characterization of the performance of Bluetooth 2.x + EDR technology in noisy environments, Wireless Networks, 21:6, (1969-1984), Online publication date: 1-Aug-2015.
  43. ACM
    Trifonov P (2015). Low-Complexity Implementation of RAID Based on Reed-Solomon Codes, ACM Transactions on Storage, 11:1, (1-25), Online publication date: 24-Feb-2015.
  44. ACM
    Kaltofen E and Pernet C Sparse polynomial interpolation codes and their decoding beyond half the minimum distance Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (272-279)
  45. ACM
    Feinerman O, Haeupler B and Korman A Breathe before speaking Proceedings of the 2014 ACM symposium on Principles of distributed computing, (114-123)
  46. ACM
    Kolditz T, Kissinger T, Schlegel B, Habich D and Lehner W Online bit flip detection for in-memory B-trees on unreliable hardware Proceedings of the Tenth International Workshop on Data Management on New Hardware, (1-9)
  47. ACM
    Kang H and Iwamura K Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, (9-17)
  48. ACM
    Wen W, Zhang Y, Mao M and Chen Y State-Restrict MLC STT-RAM Designs for High-Reliable High-Performance Memory System Proceedings of the 51st Annual Design Automation Conference, (1-6)
  49. Arbuckle T, Hogan D and Ryan C (2014). Learning predictors for flash memory endurance, International Journal of Computational Intelligence Studies, 3:1, (18-39), Online publication date: 1-Jan-2014.
  50. Wen W, Mao M, Zhu X, Kang S, Wang D and Chen Y CD-ECC Proceedings of the International Conference on Computer-Aided Design, (1-8)
  51. ACM
    Mandel T and Mache J Practical error correction for resource-constrained wireless networks Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, (1-14)
  52. Tomic R Optimal networks from error correcting codes Proceedings of the ninth ACM/IEEE symposium on Architectures for networking and communications systems, (169-180)
  53. ACM
    Olberding S, Gong N, Tiab J, Paradiso J and Steimle J A cuttable multi-touch sensor Proceedings of the 26th annual ACM symposium on User interface software and technology, (245-254)
  54. ACM
    Chang Y, Yang M, Kuo T and Hwang R (2013). A reliability enhancement design under the flash translation layer for MLC-based flash-memory storage systems, ACM Transactions on Embedded Computing Systems, 13:1, (1-28), Online publication date: 1-Aug-2013.
  55. ACM
    Huang F, Luo W, Huang J and Shi Y Distortion function designing for JPEG steganography with uncompressed side-image Proceedings of the first ACM workshop on Information hiding and multimedia security, (69-76)
  56. Imamverdiyev Y, Teoh A and Kim J (2013). Biometric cryptosystem based on discretized fingerprint texture descriptors, Expert Systems with Applications: An International Journal, 40:5, (1888-1901), Online publication date: 1-Apr-2013.
  57. Esposito C, Cotroneo D and Russo S (2013). Survey On reliability in publish/subscribe services, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:5, (1318-1343), Online publication date: 1-Apr-2013.
  58. Hwang Y, Choi B and Jeon M (2013). On the construction of stabilizer codes with an arbitrary binary matrix, Quantum Information Processing, 12:1, (467-479), Online publication date: 1-Jan-2013.
  59. Gill A, Bull T, Farmer A, Kimmell G and Komp E (2012). Types and associated type families for hardware simulation and synthesis, Higher-Order and Symbolic Computation, 25:2-4, (255-274), Online publication date: 1-Dec-2012.
  60. Cyganek B and Woźniak M Pixel-Based object detection and tracking with ensemble of support vector machines and extended structural tensor Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part I, (104-113)
  61. Nakazawa A and Nitschke C Point of Gaze Estimation through Corneal Surface Reflection in an Active Illumination Environment Proceedings, Part II, of the 12th European Conference on Computer Vision --- ECCV 2012 - Volume 7573, (159-172)
  62. ACM
    Liu B, Chen X and Teshome F (2012). Resilient and adaptive performance logic, ACM Journal on Emerging Technologies in Computing Systems, 8:3, (1-16), Online publication date: 1-Aug-2012.
  63. ACM
    Comer M, Kaltofen E and Pernet C Sparse polynomial interpolation and Berlekamp/Massey algorithms that correct outlier errors in input values Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (138-145)
  64. ACM
    Esposito C A tutorial on reliability in publish/subscribe services Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems, (399-406)
  65. Li P, Yang X, Qiao H, Cao K, Liu E and Tian J (2012). An effective biometric cryptosystem combining fingerprints with error correction codes, Expert Systems with Applications: An International Journal, 39:7, (6562-6574), Online publication date: 1-Jun-2012.
  66. Lee C, Lee C and Kim C (2012). An MMSE approach to nonlocal image denoising, Journal of Visual Communication and Image Representation, 23:3, (476-490), Online publication date: 1-Apr-2012.
  67. Yang L, Chen Q, Tian J and Wu D (2012). Robust track-and-trace video watermarking, Security and Communication Networks, 5:4, (353-363), Online publication date: 1-Apr-2012.
  68. ACM
    Vitkovskiy A, Soteriou V and Nicopoulos C A highly robust distributed fault-tolerant routing algorithm for NoCs with localized rerouting Proceedings of the 2012 Interconnection Network Architecture: On-Chip, Multi-Chip Workshop, (29-32)
  69. ACM
    Katiyar A and Jagannatham A Bayesian data and channel joint maximum-likelihood based error correction in wireless sensor networks Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, (141-146)
  70. García-Herrero F, Valls J and Meher P (2011). High-Speed RS(255, 239) Decoder Based on LCC Decoding, Circuits, Systems, and Signal Processing, 30:6, (1643-1669), Online publication date: 1-Dec-2011.
  71. Liu H, Chou Y, Lin C and Jiang J Towards completely automatic decoder synthesis Proceedings of the International Conference on Computer-Aided Design, (389-395)
  72. Little M Mathematical foundations of nonlinear, non-Gaussian, and time-varying digital speech signal processing Proceedings of the 5th international conference on Advances in nonlinear speech processing, (9-16)
  73. ACM
    Gill A and Farmer A Deriving an efficient FPGA implementation of a low density parity check forward error corrector Proceedings of the 16th ACM SIGPLAN international conference on Functional programming, (209-220)
  74. ACM
    Gill A and Farmer A (2011). Deriving an efficient FPGA implementation of a low density parity check forward error corrector, ACM SIGPLAN Notices, 46:9, (209-220), Online publication date: 18-Sep-2011.
  75. ACM
    Hsu P, Chang Y, Huang P, Kuo T and Du D A version-based strategy for reliability enhancement of flash file systems Proceedings of the 48th Design Automation Conference, (29-34)
  76. ACM
    Plank J, Buchsbaum A and Vander Zanden B (2011). Minimum density RAID-6 codes, ACM Transactions on Storage, 6:4, (1-22), Online publication date: 1-May-2011.
  77. Yu T, Wang H and Liu H Denoising of time domain responses in wireless sensor network for the structural health monitoring of transportation infrastructure Proceedings of the 44th Annual Simulation Symposium, (183-187)
  78. Liaskovitis P and Schurgers C (2011). Efficient Sensing Topology Management for Spatial Monitoring with Sensor Networks, Journal of Signal Processing Systems, 62:3, (415-426), Online publication date: 1-Mar-2011.
  79. Bastian M, Gunther J and Moon T (2011). A simplified natural gradient learning algorithm, Advances in Artificial Neural Systems, 2011, (1-9), Online publication date: 1-Jan-2011.
  80. Ruiz C FPGA prototyping of neuro-adaptive decoder Proceedings of the 9th WSEAS international conference on computational intelligence, man-machine systems and cybernetics, (99-104)
  81. Miller T, Thomas R, Dinan J, Adcock B and Teodorescu R Parichute Proceedings of the 2010 43rd Annual IEEE/ACM International Symposium on Microarchitecture, (351-362)
  82. Nergui M, Acharya U, Acharya U R and Yu W (2010). Reliable and Robust Transmission and Storage Techniques for Medical Images with Patient Information, Journal of Medical Systems, 34:6, (1129-1139), Online publication date: 1-Dec-2010.
  83. ACM
    Chang Y and Kuo T A reliable MTD design for MLC flash-memory storage systems Proceedings of the tenth ACM international conference on Embedded software, (179-188)
  84. Bulan O, Sharma G and Monga V (2010). Orientation modulation for data hiding in clustered-dot halftone prints, IEEE Transactions on Image Processing, 19:8, (2070-2084), Online publication date: 1-Aug-2010.
  85. Wang Q, Peng J, Kan H and Xue X (2010). Constructions of cryptographically significant boolean functions using primitive polynomials, IEEE Transactions on Information Theory, 56:6, (3048-3053), Online publication date: 1-Jun-2010.
  86. Addesso P, Bruno L and Restaino R Adaptive localization techniques in WiFi environments Proceedings of the 5th IEEE international conference on Wireless pervasive computing, (289-294)
  87. Rodrigues I and Sanches J Photoblinking/photobleaching differential equation model for intensity decay of fluorescence microscopy images Proceedings of the 2010 IEEE international conference on Biomedical imaging: from nano to Macro, (1265-1268)
  88. Sanches J, Sousa I and Figueiredo P Bayesian fisher information criterion for sampling optimization in ASL-MRI Proceedings of the 2010 IEEE international conference on Biomedical imaging: from nano to Macro, (880-883)
  89. Wrulich M, Mehlführer C and Rupp M (2010). Managing the interference structure of MIMO HSDPA, IEEE Transactions on Wireless Communications, 9:4, (1472-1482), Online publication date: 1-Apr-2010.
  90. Batista E, Tobias O and Seara R (2010). A sparse-interpolated scheme for implementing adaptive volterra filters, IEEE Transactions on Signal Processing, 58:4, (2022-2035), Online publication date: 1-Apr-2010.
  91. Han Y, Omiwade S and Zheng R Survivable distributed storage with progressive decoding Proceedings of the 29th conference on Information communications, (431-435)
  92. Simoens S, Muñoz-Medina O, Vidal J and Del Coso A (2010). Compress-and-forward cooperative MIMO relaying with full channel state information, IEEE Transactions on Signal Processing, 58:2, (781-791), Online publication date: 1-Feb-2010.
  93. Rodrigues I and Sanches J Fluorescence microscopy imaging denoising with log-Euclidean priors and photobleaching compensation Proceedings of the 16th IEEE international conference on Image processing, (809-812)
  94. Moon T, Monroe D, Orekhov A and Gunther J A soft-input adaptive equalizer algorithm Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (655-659)
  95. Lu H, Plataniotis K and Venetsanopoulos A (2009). Uncorrelated multilinear principal component analysis for unsupervised multilinear subspace learning, IEEE Transactions on Neural Networks, 20:11, (1820-1836), Online publication date: 1-Nov-2009.
  96. Liu J, Zakharov Y and Weaver B (2009). Architecture and FPGA design of dichotomous coordinate descent algorithms, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 56:11, (2425-2438), Online publication date: 1-Nov-2009.
  97. Zhou X, Ma J, Li G, Kwon Y and Soong A (2009). Probability-based optimization of inter-sensing duration and power control in cognitive radio, IEEE Transactions on Wireless Communications, 8:10, (4922-4927), Online publication date: 1-Oct-2009.
  98. Gill A, Bull T, Kimmell G, Perrins E, Komp E and Werling B Introducing Kansas lava Proceedings of the 21st international conference on Implementation and application of functional languages, (18-35)
  99. Wijnholds S and Van Der Veen A (2009). Multisource self-calibration for sensor arrays, IEEE Transactions on Signal Processing, 57:9, (3512-3522), Online publication date: 1-Sep-2009.
  100. Parakh A and Kak S (2009). Online data storage using implicit security, Information Sciences: an International Journal, 179:19, (3323-3331), Online publication date: 1-Sep-2009.
  101. Karapantazis S and Pavlidou F (2009). VoIP, Computer Networks: The International Journal of Computer and Telecommunications Networking, 53:12, (2050-2090), Online publication date: 1-Aug-2009.
  102. Kim S and Yoo C (2009). Underdetermined blind source separation based on subspace representation, IEEE Transactions on Signal Processing, 57:7, (2604-2614), Online publication date: 1-Jul-2009.
  103. Lunglmayr M, Berkmann J and Huemer M Vertex packing decoding Proceedings of the 2009 IEEE international conference on Communications, (1876-1881)
  104. Harrison W and McLaughlin S Physical-layer security Proceedings of the 2009 IEEE international conference on Communications, (1833-1837)
  105. Villien C and Ostertag E (2009). A polynomial approximation algorithm for real-time maximum-likelihood estimation, IEEE Transactions on Signal Processing, 57:6, (2085-2095), Online publication date: 1-Jun-2009.
  106. Ramkumar B (2009). Automatic modulation classification for cognitive radios using cyclic feature detection, IEEE Circuits and Systems Magazine, 09:2, (27-45), Online publication date: 1-Jun-2009.
  107. Ho C Analysis of threshold of regular and irregular LDPC codes using Gaussian approximation Proceedings of the 2009 conference on Wireless Telecommunications Symposium, (16-22)
  108. Liaskovitis P and Schurgers C Energy efficient min-max spatial monitoring with wireless sensor networks Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (2496-2501)
  109. Davies M, Lambotharan S, Foster J, Chambers J and McWhirter J Polynomial matrix QR decomposition and iterative decoding of frequency selective MIMO channels Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (128-133)
  110. ACM
    Cabuk S, Brodley C and Shields C (2009). IP Covert Channel Detection, ACM Transactions on Information and System Security, 12:4, (1-29), Online publication date: 1-Apr-2009.
  111. Lanuzza M, Zicari P, Frustaci F, Perri S and Corsonello P An Efficient and Low-Cost Design Methodology to Improve SRAM-Based FPGA Robustness in Space and Avionics Applications Proceedings of the 5th International Workshop on Reconfigurable Computing: Architectures, Tools and Applications, (74-84)
  112. Carrasco-Alvarez R, Parra-Michel R, Orozco-Lugo A and Tugnait J (2009). Enhanced channel estimation using superimposed training based on universal basis expansion, IEEE Transactions on Signal Processing, 57:3, (1217-1222), Online publication date: 1-Mar-2009.
  113. Bikhazi N, Jensen M and Anderson A (2009). MIMO signaling over the MMF optical broadcast channel with square-law detection, IEEE Transactions on Communications, 57:3, (614-617), Online publication date: 1-Mar-2009.
  114. Lu H, Plataniotis K and Venetsanopoulos A (2009). Uncorrelated multilinear discriminant analysis with regularization and aggregation for tensor object recognition, IEEE Transactions on Neural Networks, 20:1, (103-123), Online publication date: 1-Jan-2009.
  115. Chen H and Schober R (2009). Cyclic space-frequency filtering for BICM-OFDM systems with multiple co–located or distributed transmit antennas, IEEE Transactions on Wireless Communications, 8:1, (336-346), Online publication date: 1-Jan-2009.
  116. Chaari L, Fourati M, Masmoudi N and Kamoun L (2008). Image transmission quality analysis over adaptive BCH coding, WSEAS TRANSACTIONS on COMMUNICATIONS, 7:6, (584-593), Online publication date: 1-Jun-2008.
  117. Plank J The RAID-6 liberation codes Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-14)
  118. Wu W (2008). Two blind adaptive mobile receivers in time-hopping PAM UWB impulse radio system, EURASIP Journal on Wireless Communications and Networking, 2008, (1-9), Online publication date: 1-Jan-2008.
  119. Tartary C, Wang H and Pieprzyk J An hybrid approach for efficient multicast stream authentication over unsecured channels Proceedings of the 1st international conference on Provable security, (17-34)
  120. Han B and Keleher P Implementation and performance evaluation of fuzzy file block matching 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, (1-6)
  121. Alaiz-Rodríguez R, Guerrero-Curieses A and Cid-Sueiro J (2007). Minimax Regret Classifier for Imprecise Class Distributions, The Journal of Machine Learning Research, 8, (103-130), Online publication date: 1-May-2007.
  122. Lunglmayr M and Berkmann J Optimized mapping schemes for LDPC coded higher order modulated QAM transmission Proceedings of the 11th international conference on Computer aided systems theory, (952-959)
  123. Coon J and Sandell M (2007). Constrained optimization of MIMO training sequences, EURASIP Journal on Advances in Signal Processing, 2007:1, (47-47), Online publication date: 1-Jan-2007.
  124. Choi H and Bae H (2007). Subband affine projection algorithm for acoustic echo cancellation system, EURASIP Journal on Advances in Signal Processing, 2007:1, (146-146), Online publication date: 1-Jan-2007.
  125. Peters J, Vijayakumar S and Schaal S Natural actor-critic Proceedings of the 16th European conference on Machine Learning, (280-291)
  126. Yoon H, Yang K and Shahabi C (2005). Feature Subset Selection and Feature Ranking for Multivariate Time Series, IEEE Transactions on Knowledge and Data Engineering, 17:9, (1186-1198), Online publication date: 1-Sep-2005.
  127. ACM
    Yang K and Shahabi C A PCA-based similarity measure for multivariate time series Proceedings of the 2nd ACM international workshop on Multimedia databases, (65-74)
  128. ACM
    Cheng W, Chu W and Wu J Semantic context detection based on hierarchical audio models Proceedings of the 5th ACM SIGMM international workshop on Multimedia information retrieval, (109-115)
  129. Ben-Arie J, Wang Z, Pandit P and Rajaram S (2002). Human Activity Recognition Using Multidimensional Indexing, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:8, (1091-1104), Online publication date: 1-Aug-2002.
  130. Zhou L and Ohashi Y Hybrid precoding with data stream adaptation for high throughput mmWave MIMO systems 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  131. Tsimbalo E, Fafoutis X and Piechocki R CRC error correction for energy-constrained transmission 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (430-434)
  132. Yan K, Wu H, Zhou H and Xiao H Novel M-ary coded modulation scheme based on constellation subset selection 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (207-211)
  133. Ellingson S and Buehrer R Frequency channel delay modulation for interference-robust low data rate communication MILCOM 2016 - 2016 IEEE Military Communications Conference, (672-677)
  134. Pinyoanuntapong K, Goswami M, Habib A, Kwon H and Khanh Pham Boundaries of signal-to-noise ratio for adaptive code modulations MILCOM 2016 - 2016 IEEE Military Communications Conference, (132-137)
  135. Paludi F, Morera D, Goette T, Schnidrig M, Ramos F and Hueda M Low-complexity turbo product code for high-speed fiber-optic systems based on expurgated BCH codes 2016 IEEE International Symposium on Circuits and Systems (ISCAS), (429-432)
  136. Searle H, Gomes M, Vilela J and Harrison W Irregular Quadrature Amplitude Modulation for Adaptive Physical-Layer Security 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  137. Chou S, Chang Y, Yuan-Hung Kua , Huang P and Tsao C Multi-version checkpointing for flash file systems 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), (436-443)
Contributors

Reviews

Vladimir Botchev

Many books on error correction coding exist. Some have a more theoretical focus, and others focus on practical implementations. Rarely, however, do texts provide both theoretical depth and strong practical constructs. This is one of these rare texts; it would hardly be an overstatement to regard this book as one of the best, if not the best, of its kind. The book covers both classical methods, such as block and convolutional codes, and modern developments, such as turbo codes and low-density parity check (LDPC) codes (LDPC codes have been known for decades, but only recently, thanks to technological advances, have they started to be considered for practical implementations). The author provides detailed proofs for almost every theorem or lemma he introduces. This is in contrast with, for example, Lin and Costello's book [1] (the error correction coding bible), where the reader is shielded from some proofs and developments. A unique feature of the book is the way the relevant mathematical structures and developments are introduced. This is done in a distributed manner, which is to say that most of the mathematical derivations are not lumped together in a chapter or two, but are delivered throughout all of the chapters. This style of presentation is very helpful for self-study. Another unique feature is the collection of lab works, where, with the help of an impressive amount of MATLAB C/C++ code (all available on the book's Web site), the student can obtain real-world experience, and deal with the intricacies of programming for error control coding. The lab descriptions are very detailed, and require good programming skills. Numerous end-of-chapter problems also make this book quite attractive for self-study. These are very carefully crafted, and the attentive reader will undoubtedly discern the different levels of difficulty the exercises are designed with, and will thus test his or her current level of understanding by climbing this exercise ladder. The book consists of 17 chapters, grouped into five parts. Part 1 contains only the first introductory chapter. In this chapter, the motivation for designing and using error correcting codes is given, in the context of information theory and communications. The chapter ends with the first lab, consisting of a simulation of a communication channel. The ten chapters of Part 2 are devoted to block codes. In the first of these ten chapters, basic notions of abstract algebra are introduced. The next chapter continues with an introduction of the simplest linear block codes, namely, Hamming codes. A detailed chapter on rings, polynomials, and the principles of cyclic encoding follows. This chapter ends with two labs, for polynomial division and linear-feedback shift register (LFSR), and the ubiquitous cyclic redundancy check (CRC). A very good introduction to number theory is provided in chapter 5, which is also followed by two labs, on programming the Euclidean algorithm and on performing Galois field arithmetic. Chapter 6 is the cornerstone cyclic block code chapter, since it addresses Reed Solomon (RS) codes (and Bose-Chaudhuri-Hocquenghem (BCH) codes, of course). This chapter is an extremely well-written account of cyclic block codes, and almost no theorem introduced is left without a proof. Three labs end the chapter, one on programming the Berlekamp-Massey algorithm, and the remaining two on BCH and Reed Solomon decoding. Chapter 7 continues with Reed Solomon decoding, by revealing alternate approaches to decoding. Chapter 8 introduces other important block codes, such as Reed-Muller and Golay codes. Chapter 9 is more abstract, and is mostly information theory oriented; it addresses bounds on codes, for example the Varshamov bound. Chapter 10 briefly tackles the important question of burst error channel and interleavers for block codes. As an example, the compact disk interleaved RS decoder is presented. Part 2 ends by discussing some new methods for the soft decoding of block codes. Part 3 contains two chapters, and is entirely concerned with convolutional codes and trellis-coded modulation. The presentation is less detailed than for block codes, perhaps to limit the size of the book. There are three labs in this part: two on convolutional encoding and the Viterbi algorithm, and one on the trellis coder/decoder (codec). Part 4 is a thorough introduction to turbo and LDPC codes. Precious practical information is again provided in the two labs in this part, on programming a turbo decoder and an LDPC decoder. This part ends with a brief account of decoding algorithms on graphs. Part 5 consists of only the last chapter, and addresses the particular types of concepts and codes for fading radio frequency (RF) channels, the space-time codes. A short appendix on log-likelihood algebra ends the book. In conclusion, it must be said that this is not an easy book-no serious book on error coding is. The presentation and clarity of the explanations make this work one of the best error control coding books on the market. I highly recommended it for both academic study and practical reference. Even people not directly involved in designing error correction codecs will benefit from the book's style and clarity, and can use it to increase the breadth of their knowledge. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations