2010 IEEE International Symposium on Information Theory 2010
DOI: 10.1109/isit.2010.5513593
|View full text |Cite
|
Sign up to set email alerts
|

Channels with both random errors and burst erasures: Capacities, LDPC code thresholds, and code performances

Abstract: Abstract-We derive the capacities of a class of channels, either memoryless or indecomposable finite-state, that also suffer from bursts of erasures. For such channels, we analyze the performances of low-density parity-check (LDPC) codes and code ensembles under belief propagation (BP) decoding, using density evolution (DE) techniques. Although known LDPC codes perform well in non-erasure-affected channels, their performances are far from the capacities when both random errors and erasures are present. We show… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…For example, when the trojan process is scheduled by the OS, it has no information on whether the spy process is running on another core or not. The temporal inactivity of the spy process leads to the loss of large amount of bits -this is known as burst erasure [34]. In a similar spirit, it is difficult for the spy to distinguish the absence of the signal (when the trojan is switched out) from a sequence of zeroes sent by the trojan.…”
Section: Detecting the Trojan And The Spymentioning
confidence: 99%
See 1 more Smart Citation
“…For example, when the trojan process is scheduled by the OS, it has no information on whether the spy process is running on another core or not. The temporal inactivity of the spy process leads to the loss of large amount of bits -this is known as burst erasure [34]. In a similar spirit, it is difficult for the spy to distinguish the absence of the signal (when the trojan is switched out) from a sequence of zeroes sent by the trojan.…”
Section: Detecting the Trojan And The Spymentioning
confidence: 99%
“…In a similar spirit, it is difficult for the spy to distinguish the absence of the signal (when the trojan is switched out) from a sequence of zeroes sent by the trojan. While it is possible to adopt error correcting codes [30] that can correct burst erasures [34], this significantly complicates the design and lowers the channel capacity. In any case, the ability to detect the presence of the other party needs to be added to both the trojan and the spy.…”
Section: Detecting the Trojan And The Spymentioning
confidence: 99%
“…In this paper, we focus on a special burst-erasure channel (BuEC) which incorporates both random noise (Gaussian noise) and erasures. Taking the magnetic (or optical) recording system as an example, we can regard its background noise as the white Gaussian noise, and designate the detected thermal asperities (or scratches) at the decoder as erasures [4], [5]. The noise in such channel is the combination of the background Gaussian noise and erasures, this is different from the classic erasure-burst channel (defined in [1]) that only considers erasures.…”
Section: Introductionmentioning
confidence: 99%
“…With respect to such channel model, outputs are randomly erased with a small erasure probability rather than dropped in a bursty fashion. K. Li et al presented a new type of BuECs-G in [5]. They regarded the channel as a concatenation of a memoryless channel (or an indecomposable finite-state channel) and a burst-erasure channel, and derived the non-feedback capacity of this channel.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation