[1] LUBY M.LT codes[A].Proc of the 43rd Annual IEEE Symposium on Foundations of Computer Science[C].Vancouver,Canada:IEEE,2002.271-280.
[2] MacKay D J C.Fountain codes[J].IEE Proceedings-Communications,2005,152(6):1062-1068.
[3] 慕建君,焦晓鹏,曹训志.数字喷泉码及其应用的研究进展与展望[J].电子学报,2009,37(7):1571-1577. MU Jian-jun,JIAO Xiao-peng,CAO Xun-zhi.A survey of digital fountain codes and its application[J].Acta Electronica Sinica,2009,37(7):1571-1577.(in Chinese)
[4] SUN L,REN P,DU Q,et al.Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks[J].IEEE Transactions on Industrial Informatics,2016,12(1):291-300.
[5] CHEN X,CHEN H H,MENG W.Cooperative communications for cognitive radio networks-From theory to applications[J].IEEE Communications surveys & tutorials,2014,16(3):1180-1192.
[6] KHOUEIRY B W,SOLEYMANI M R.A Novel Machine to Machine Communication Strategy Using Rateless Coding for the Internet of Things[M].Beyond the Internet of Things.Springer International Publishing,2017.85-118.
[7] KABORE A W,MEGHDADI V,CANCES J P.Cooperative relaying in narrow-band PLC networks using fountain codes[A].Proc of Power Line Communications and its Applications(ISPLC),201418th IEEE International Symposium on[C].Glasgow,United Kingdom:IEEE,2014.306-310.
[8] YEN K K,et al.Modified robust soliton distribution(MRSD)with improved ripple size for lt codes[J].Communications Letters,IEEE,2013,17(5):976-979.
[9] 黄诚.喷泉码理论与若干关键技术研究[D].武汉大学,2010. HUANG Cheng.Research on theory and key technique of Fountain codes[D].Wuhan University,2010.(in Chinese)
[10] 黄诚,等.短码长LT码的蚁群算法度分布优化[J].北京邮电大学学报,2010,33(6):129-133. HUANG Cheng,et al.The degree distribution optimization of short code length LT codes using ant colony algorithm[J].Journal of Beijing University of Posts and Telecommunications,2010,33(6):129-133.(in Chinese)
[11] ZHANG M,LEI W,XIE X.Combined degree distribution:A simple method to design the degree distribution of fountain codes[A].Proc of Information Science and Technology(ICIST),2013 International Conference on[C].Yangzhou,China:IEEE,2013.1089-1092.
[12] YAO W Q,YI B S,HUANG T Q,et al.Poisson robust soliton distribution for LT codes[J].IEEE Communications Letters,2016,20(8):1499-1502.
[13] 李晓磊,等.一种基于动物自治体的寻优模式:鱼群算法[J].系统工程理论与实践,2002,22(11):32-38. LI Xiao-lei,et al.An optimization mode based on Autonomous:fish-swarm algorithm[J].Systems Engineering Theory and Practice,2002,22(11):32-38.(in Chinese)
[14] AGHA A K,KADI N,STOJMENOVIC I.Fountain codes with XOR of encoded packets for broadcasting and source independent backbone in Multi-hop networks using network coding[A].Proc of Vehicular Technology Conference[C].2009.VTC Spring 2009.IEEE 69th.Barcelona,Spain:IEEE,2009.1-5.
[15] KARP R,LUBY M,SHOKROLLAHI A.Finite length analysis of LT codes[A].Proc of Information Theory,2004.ISIT 2004.Proceedings.International Symposium on[C].Chicago,USA:IEEE,2004.39.
[16] MAATOUK G,SHOKROLLAHI A.Analysis of the second moment of the LT decoder[J].IEEE Transactions on Information Theory,2012,58(5):2558-2569.
[17] ETESAMI O,SHOKROLLAHI A.Raptor codes on binary memoryless symmetric channels[J].Information Theory,IEEE Transactions on,2006,52(5):2033-2051.
[18] HYYTIÄ E,TIRRONEN T,VIRTAMO J.Optimizing the degree distribution of LT codes with an importance sampling approach[A].RESIM 2006,6th International Workshop on Rare Event Simulation[C].2006. |