2008
DOI: 10.1109/dcc.2008.49
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Video Transmission: A Distortion-Optimal Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…According to [13], the probability of symbol error for the GE chain depends on the average received signal-to-noise ratio, the modulation scheme, the number of signal points in the modulation constellation M, the number of transmit/receive antennas, and the utilized coding technique. The details of calculating the probability of symbol error in each state can be found in [11].…”
Section: Channel Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…According to [13], the probability of symbol error for the GE chain depends on the average received signal-to-noise ratio, the modulation scheme, the number of signal points in the modulation constellation M, the number of transmit/receive antennas, and the utilized coding technique. The details of calculating the probability of symbol error in each state can be found in [11].…”
Section: Channel Modelmentioning
confidence: 99%
“…Both [9] and [10] used RCPC/CRC and RS product codes for scalable multimedia transmission over wireless channels identified by bit errors and packet erasures. In [11], we propose a low complexity UEP technique to optimally protect a progressive FGS bitstream against both bit errors and packet erasures under the assumption that base layer is received error free.…”
Section: Introductionmentioning
confidence: 99%
“…A typical JSCC coder is designed to apply FEC to source coded data and provide unequal error protection (UEP) of data streams [9][10][11][12][13][14][15][16][17]. Unequal importance streams can be formed using available coding tools or different packetization schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Scalability was used in [15,16], while different packetization schemes were used in [13,14,17]. The FEC is accomplished by employing either block codes or convolution codes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation