2010
DOI: 10.1109/jsac.2010.100913
|View full text |Cite
|
Sign up to set email alerts
|

Joint identity-message coding

Abstract: Abstract-In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as small as a single bit-for instance, in many cases, sensors are used to detect whether and where a certain interesting condition occurred, or to track incremental environmental changes at fixed locations. In such scenarios, the traditional network-protocol paradigm of separately specifying the source identity and the message in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Formally, we rewrite the channel defined in (4) as 5 (13) where is a diagonal random matrix whose elements on its diagonal are either 1 or 0. We also assume that is large, and as a result the transfer matrix is full rank with high probability.…”
Section: B Extension To the Packet Erasure Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Formally, we rewrite the channel defined in (4) as 5 (13) where is a diagonal random matrix whose elements on its diagonal are either 1 or 0. We also assume that is large, and as a result the transfer matrix is full rank with high probability.…”
Section: B Extension To the Packet Erasure Networkmentioning
confidence: 99%
“…This results in a loss of information rate that can be significant with respect to the min-cut value. In particular, for wireless sensor networks, where communication is restricted to short packet lengths, the coding vector overhead can be a significant fraction of the overall packet length [27], [13].…”
mentioning
confidence: 99%
“…Note that in equation (13) all of the erasure events are captured by the erasure matrix E[t]. Moreover, the erasure pattern is important only up to determining the number of packets that the destination receives, since the transfer matrix G[t] is unknown and distributed uniformly at random over all full rank matrices.…”
Section: B Extension To the Packet Erasure Networkmentioning
confidence: 99%
“…This results in a loss of information rate that can be significant with respect to the min-cut value. In particular, in wireless networks such as sensor networks where communication is restricted to short packet lengths, the coding vector overhead can be a significant fraction of the overall packet length [27], [13].…”
Section: Introductionmentioning
confidence: 99%