[1] LUBY M,WATSON M,GASIBA T,STOCKHAMMER T.Mobile data broadcasting over MBMS trade offs in forward error correction[A].ACM International Conference Proceeding Series[C].New York:ACM,2006.10-20.
[2] MIRREZAEI S M,FAEZ K,YOUSEFI S.Analysis and design of a new fountain codec under belief propagation[J].IET Communications,2014,8(1):27-40.
[3] NESSA A,KADOCH M,BO Rong.Joint network channel fountain scheme for reliable communication in wireless networks[A].International Conference on Computing,Networking and Communications[C].Iguazu Falls:IEEE,2014.206-210.
[4] HAO Niu,IWAI M,SEZAKI K.Exploiting fountain codes for secure wireless delivery[J].IEEE Communications Letters,2014,18(5):777-780.
[5] HUANG Wei,LU Zhufei,DING Lianghui.Television broadcast using unequal fountain codes[A].IEEE International Symposium on Broadband Multimedia Systems and Broadcasting[C].Beijing:IEEE,2014.1-6.
[6] SHIRVANIMOGHADDAM,LI Yonghui,VUCETIC B.Sparse event detection in wireless sensor networks using analog fountain codes[A].IEEE Global Communications Conference[C].Austin:IEEE,2014.3520-3525.
[7] ALEXANDRE P,VIEIRA J,NAVARRO A.Data broadcasting over DAB/DMB with Fountain codes and auxilliary mobile data channels[A].The 16th International Telecommunications Network Strategy and Planning Symposium[C].Funchal:IEEE,2014.1-6.
[8] 慕建君,焦晓鹏,曹训志.数字喷泉码及其应用的研究进展与展望[J].电子学报,2009,37(7):1571-1577. MU Jian-jun,JIAO Xiao-peng,CAO Xun-zhi.A survey of digital fountain codes and its application[J].Acta Ecectronica Sinica,2009,37(7):1571-1577.(in Chinese)
[9] CHANG Shih-Ying,CHIAO Hsin-Ta,HUNG Yu-Hsiang.Ideal forward error correction codes for high-speed rail multimedia communications[J].IEEE Transactions on Vehicular Technology,2014,63(8):3517-3529.
[10] SHIH Pei-Yu,SU Wen-Ku,LIN Tsung-Ching,TRUONG Trieu-Kien.Modified decoding of binary quadratic residue codes by using euclidean algorithm[A].Proceedings of the 11th International Conference on Advanced Communication Technology[C].Gangwon-Do:IEEE,2009.1398-1402.
[11] DILIP V,YAN Sarwate Zhiyuan.Modified euclidean algorithms for decoding reed-solomon codes[J].Proceedings of IEEE International Symposium on Information Theory,Seoul,Korea:IEEE,2009.1398-1402.
[12] KAMPF Sabine,WACHTER Antonia,BOSSERT Martin.A method for soft-decision decoding of reed-solomon codes based on the extended Euclidean algorithm[A].Proceedings of International ITG Conference on Source and Channel Coding[C].Ulm:IEEE,2010.1-6.
[13] ZEH Alexander,LI Wenhui.Decoding reed-solomon codes up to the sudan radius with the euclidean algorithm[A].Proceedings of International Symposium on Information Theory and its Applications[C].Austin:IEEE,2010.986-990.
[14] 陈代梅,范希辉,朱静,汪玉美.基于同余方程和中国剩余定理的混淆算法[J].计算机应用研究,2015,32(2):485-488. CHEN Dai-mei,FAN Xi-hui,ZHU Jing,WANG Yu-mei.Obfuscation algorithms based on congruence equation and Chinese remainder theorem[J].Application Research of Computers,2015,32(2):485-488.(in Chinese)
[15] LUO Xiaofeng,XU Qiaozhi,ZHANG Junxing.A digital watermarking algorithm based on Chinese remainder theorem[A].The 10th International Conference on Communications[C].Bucharest:IEEE,2014.1-4.
[16] 杨阳,朱晓玲,丁凉.基于中国剩余定理的无可信中心可验证秘密共享研究[J].计算机工程,2015,41(2):122-128. YANG Yang,ZHU Xiaoling,DING Liang.Research on verifiable secret sharing without trusted center based on chinese remainder theorem[J].Computer Engineering,2015,41(2):122-128.(in Chinese)
[17] 陈泽文,张龙军,王育民,黄继武,黄达人.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):1062-1065. CHEN Ze-wen,ZHANG Long-jun,WANG Yu-min,HUANG Ji-wu,HUANG Da-ren.A group signature scheme based on chinese remainder theorem[J].Acta Ecectronica Sinica,2004,32(7):1062-1065.(in Chinese)
[18] MOSTAFA Mohamed,MARTIN H Bossert.A chase-like decoding algorithm for reed-solomon codes based on the extended euclidean algorithm[A].Proceedings of the 10th International ITG Conference on Systems,Communications and Coding[C].Hamburg:IEEE,2015.1-4.
[19] YANG Jun-jian,WANG Yun.An extended euclid algorithm for rational reconstruction[A].IEEE Symposium on Electrical & Electronics Engineering[C].Kuala Lumpur:IEEE,2012.422-424.
[20] ZENG Meng,CALDERBANK Robert,CUI Shuguang.On design of rateless codes over dying binary erasure channel[J].IEEE Transactions on Communications,2012,60(4):889-894.
[21] CHEN Guo-tai,CAO Lei,ZHAO Fei-long.Analysis of robust soliton distribution for LT code[A].Proceedings of the IEEE 11th International Conference on Signal Processing[C].Beijing:IEEE,2012.1546-1549.
[22] 祝开艳,王洪玉,孙文珠,牛芳琳.一种分布式喷泉码在协作通信中的应用[J].电子学报,2014,42(7):1249-1255. ZHU Kai-yan,WANG Hong-yu,SUN Wen-zhu,NIU Fang-lin.A distributed fountain code for cooperative Communications[J].Acta Ecectronica Sinica,2014,42(7):1249-1255.(in Chinese) |