2011 Proceedings IEEE INFOCOM 2011
DOI: 10.1109/infcom.2011.5934874
|View full text |Cite
|
Sign up to set email alerts
|

SigSag: Iterative detection through soft message-passing

Abstract: The multiple-access framework of ZigZag decoding[1] is a useful technique for combating interference via multiple repeated transmissions, and is known to be compatible with distributed random access protocols. However, in the presence of noise this type of decoding can magnify errors, particularly when packet sizes are large. We present a simple soft-decoding version, called SigSag, that improves performance. We show that for two users, collisions result in a cycle-free factor graph that can be optimally decod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(27 citation statements)
references
References 25 publications
0
27
0
Order By: Relevance
“…We conjecture that this is due to effect of the joint cycles, i.e., this is due to the joint factor graph structure that makes the optimized 155 Tanner code perform worse. (10,20,2), and (20,40,1) with the ZigZag and collisionfree system followed by the sum-product decoder over the packets coded by the 155-Tanner code.…”
Section: B Joint Channel-collision Decodingmentioning
confidence: 99%
See 3 more Smart Citations
“…We conjecture that this is due to effect of the joint cycles, i.e., this is due to the joint factor graph structure that makes the optimized 155 Tanner code perform worse. (10,20,2), and (20,40,1) with the ZigZag and collisionfree system followed by the sum-product decoder over the packets coded by the 155-Tanner code.…”
Section: B Joint Channel-collision Decodingmentioning
confidence: 99%
“…Further, observe that there can be no cycle of length two since a bit cannot collide with itself. Here we use the same notation introduced in II-A1, where D (1) and D (2) are the time difference between user transmissions in first and second collisions. Arrange the variable nodes according to their order of appearance in the packets.…”
Section: Appendix: Proofs Of the Theoremsmentioning
confidence: 99%
See 2 more Smart Citations
“…The principal practical applications are i) satellite networks [5], [12]; ii) terrestrial wireless networks [6], [10] including cellular, ad-hoc, and sensor networks; iii) machine-to-machine communications [14]; iv) shared memories. In all cases, the main problem is the contention among the sources and the need to share the channel resource [1], [2], [15], [16].…”
Section: Introductionmentioning
confidence: 99%