2000
DOI: 10.1109/49.864005
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive nonuniform phase-shift-key modulation for multimedia traffic in wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(46 citation statements)
references
References 14 publications
0
46
0
Order By: Relevance
“…Due to this capability of providing different levels of protection to the bits in the same message symbol, this type of constellations received a great deal of attention for many applications. Examples of these applications include, multimedia transmission [7] and downlink multiplexing [6] and simultaneous voice and multi-class data transmission [8]. In our previous work [6], we proposed a hierarchical scheme for downlink multiplexing which multiplexes information bits for different users in each symbol transmitted from the adaptive hierarchical modulator.…”
Section: Introductionmentioning
confidence: 99%
“…Due to this capability of providing different levels of protection to the bits in the same message symbol, this type of constellations received a great deal of attention for many applications. Examples of these applications include, multimedia transmission [7] and downlink multiplexing [6] and simultaneous voice and multi-class data transmission [8]. In our previous work [6], we proposed a hierarchical scheme for downlink multiplexing which multiplexes information bits for different users in each symbol transmitted from the adaptive hierarchical modulator.…”
Section: Introductionmentioning
confidence: 99%
“…In [18], our co-author used the asymmetric PSK modulation to minimize the distortion in pulse-coded modulation signals. In [19][20], hierarchical modulations were investigated for multimedia applications. In [2][3], joint source-channel coding and hierarchical modulation techniques were employed to optimize the perceptual video quality.…”
Section: Related Researchmentioning
confidence: 99%
“…For example, in [21], the modulation asymmetry parameter α was chosen to be either 2 or 4 heuristically. In [19], the asymmetry parameter θ was chosen adaptively based on feedback from the receiver. This requires a real-time feedback channel from the receiver which may not always exist.…”
Section: Novelty Of the Proposed Approachmentioning
confidence: 99%
“…We define throughput as the number of payload bits per second received correctly as in [24]. We consider the contentionbased Distributed Coordination Function (DCF) for evaluating the throughput.…”
Section: Effect Of Payload Variation On Single-user Throughput In mentioning
confidence: 99%