2010 IEEE International Symposium on Information Theory 2010
DOI: 10.1109/isit.2010.5513253
|View full text |Cite
|
Sign up to set email alerts
|

Universal Slepian-Wolf source codes using low-density parity-check matrices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…Binary LDPC codes have been used for SW coding in [3], [7], [20], [22], [30] and references therein. In all of the above cases, the LDPC decoder consists of a message passing procedure referred to as the sum-product algorithm.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Binary LDPC codes have been used for SW coding in [3], [7], [20], [22], [30] and references therein. In all of the above cases, the LDPC decoder consists of a message passing procedure referred to as the sum-product algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…LDPC codes initially introduced for channel coding can also be used for SW coding, after adaptation of the coding process and of the decoding algorithm [20], [22]. The SW coding of a source vector x of length n is performed by producing a vector s = H T x of length m < n. The matrix H is sparse, with coefficients in GF(q).…”
Section: Ldpc Encoding and Decodingmentioning
confidence: 99%
See 1 more Smart Citation
“…We note that given encoders and a decoder are universal in the sense that they can encode and decode (asymptotically) correctly even if statistical parameters such as the delays and the PMF of DMSs are unknown. We used an analogous technique using a mixed source in [11] to prove the existence of a code. However, since we could not use Gallager's techniques to the mixed source in [11], we did not give an exponential bound in it.…”
Section: Introductionmentioning
confidence: 99%
“…We used an analogous technique using a mixed source in [11] to prove the existence of a code. However, since we could not use Gallager's techniques to the mixed source in [11], we did not give an exponential bound in it. We also give an extension of our coding scheme: If possible delays are bounded, our coding scheme can be extended to a scheme which does not require knowledge of the actual bound of delays.…”
Section: Introductionmentioning
confidence: 99%