2007 4th IEEE Consumer Communications and Networking Conference 2007
DOI: 10.1109/ccnc.2007.205
|View full text |Cite
|
Sign up to set email alerts
|

Secondary Spectrum Access with LT Codes for Delay-Constrained Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…We now give a short example to show how the An(i, j) can be used in a realistic case. Erasure correcting codes for opportunistic spectrum access were introduced in [10,11,12] as a solution to recover packets lost in collisions, especially LT codes [13]. Their main property is to allow the recovery of a complete length n codeword provided a sufficient number of bits are correctly (i.e.…”
Section: Applicationmentioning
confidence: 99%
“…We now give a short example to show how the An(i, j) can be used in a realistic case. Erasure correcting codes for opportunistic spectrum access were introduced in [10,11,12] as a solution to recover packets lost in collisions, especially LT codes [13]. Their main property is to allow the recovery of a complete length n codeword provided a sufficient number of bits are correctly (i.e.…”
Section: Applicationmentioning
confidence: 99%
“…One state is influenced by channel fading and noise but the other is like erasure channel. Thus, erasure code is a good choice for cognitive radio [12]. On the other hand, in cognitive radio network, it is normal to assume that there are no network attackers and the participants involved in the protocols are honest.…”
Section: Introductionmentioning
confidence: 99%