TY - GEN
T1 - Adaptive single-trial error/erasure decoding of binary codes
AU - Senger, Christian
AU - Sidorenko, Vladimir R.
AU - Schober, Steffen
AU - Bossert, Martin
AU - Zyablov, Victor V.
PY - 2010
Y1 - 2010
N2 - We investigate adaptive single-trial error/erasure decoding of binary codes whose decoder is able to correct ? errors and τ erasures if λε + τ ≤ dmin - 1. Thereby, dmin is the minimum Hamming distance and λ ∈ R, 1 < λ ≤ 2, is the tradeoff parameter between errors and erasures. The error/erasure decoder allows to exploit soft information by treating a set of most unreliable received symbols as erasures. The obvious question here is, how this erasing should be performed, i.e. how the unreliable symbols that must be erased in order to obtain the smallest possible residual codeword error probability can be determined. This was answered before [1] for the case of fixed erasing, where only the channel state and not the individual symbol reliabilities of each received vector are taken into consideration. In this paper, we address the adaptive case, where the optimal erasing strategy is determined for every given received vector.
AB - We investigate adaptive single-trial error/erasure decoding of binary codes whose decoder is able to correct ? errors and τ erasures if λε + τ ≤ dmin - 1. Thereby, dmin is the minimum Hamming distance and λ ∈ R, 1 < λ ≤ 2, is the tradeoff parameter between errors and erasures. The error/erasure decoder allows to exploit soft information by treating a set of most unreliable received symbols as erasures. The obvious question here is, how this erasing should be performed, i.e. how the unreliable symbols that must be erased in order to obtain the smallest possible residual codeword error probability can be determined. This was answered before [1] for the case of fixed erasing, where only the channel state and not the individual symbol reliabilities of each received vector are taken into consideration. In this paper, we address the adaptive case, where the optimal erasing strategy is determined for every given received vector.
UR - http://www.scopus.com/inward/record.url?scp=78651334940&partnerID=8YFLogxK
U2 - 10.1109/ISITA.2010.5648959
DO - 10.1109/ISITA.2010.5648959
M3 - Conference contribution
AN - SCOPUS:78651334940
SN - 9781424460175
T3 - ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications
SP - 267
EP - 272
BT - ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications
T2 - 2010 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010
Y2 - 17 October 2010 through 20 October 2010
ER -