International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.
DOI: 10.1109/isit.2004.1365137
|View full text |Cite
|
Sign up to set email alerts
|

On the effect of parity-check weights in iterative decoding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…The number of undecodable erasure patterns for a maximum-likelihood decoder and for the iterative decoders based on and is given in Table IV. (20) Proof: Assume to the contrary that there is a parity-check matrix for with and at most rows. As in Theorem 5, we say that a given set with is an -set, and that a row of covers an -set if the projection of on has weight one.…”
Section: Golay Codesmentioning
confidence: 99%
See 1 more Smart Citation
“…The number of undecodable erasure patterns for a maximum-likelihood decoder and for the iterative decoders based on and is given in Table IV. (20) Proof: Assume to the contrary that there is a parity-check matrix for with and at most rows. As in Theorem 5, we say that a given set with is an -set, and that a row of covers an -set if the projection of on has weight one.…”
Section: Golay Codesmentioning
confidence: 99%
“…In algebraic coding theory, a parity-check matrix for a linear code usually has linearly independent rows. However, in the context of iterative decoding, it has been already observed in [20], [24], and other papers that adding linearly dependent rows to can be advantageous. Certainly, this can increase the stopping distance .…”
Section: Introductionmentioning
confidence: 99%
“…Let us consider the case ℓ − 1 = λ n, for 0 < λ < 1. In this case, the logarithm in the numerator grows at most linearly with n, since 22) and the second sum under the logarithm never exceeds the first. As a result, the asymptotic behavior of the given upper bound is dominated by the expression in the denominator, which, for large n, takes the form…”
Section: Appendix II Asymptotic Behavior Of the Bound In Theorem 38mentioning
confidence: 99%
“…Similarly as for the Golay code, we only consider minimum-weight codewords of the dual code for the purpose of generating redundant parity-check matrices in cyclic form [22]. In particular, we focus on four We now compare the stopping distance properties of parity-check matrices of cyclic form with that of a novel construction of redundant parity-check matrices generalizing the method in [10].…”
Section: ) the Binary Golaymentioning
confidence: 99%
“…This is equivalent to adding redundant parity checks to the standard parity check matrix. The technique is also applied in soft decoding of some of the classical codes [26][27][28]. Fig.…”
Section: Graphical Models With Redundancymentioning
confidence: 99%