Abstract—We analyze interleaved concatenation schemes of polar codes with outer binary BCH codes and convolutional codes. We show that both BCH-polar and Conv-polar codes can hav...
—A large number of geo-distributed data centers begin to surge in the era of data deluge and information explosion. To meet the growing demand in massive data processing, the inf...
Tianyi Chen, Yu Zhang 0005, Xin Wang, Georgios B. ...
—By enabling two adjacent mobile devices to establish a direct link, device-to-device (D2D) communication can increase the system throughput over underlaying wireless networks, w...
—Arıkan’s polar coding technique is based on the idea of synthesizing n channels from the n instances of the physical channel by a simple linear encoding transformation. Each ...
Joseph M. Renes, David Sutter, Seyed Hamed Hassani
While LTE is becoming widely rolled out for human-type services, it is also a promising solution for cost-efficient connectivity of the smart grid monitoring equipment. This is a...
—Information-theoretic work for wiretap channels is mostly based on random coding schemes. Designing practical coding schemes to achieve information-theoretic secrecy is an impor...
—An extension of polar codes is proposed, which allows some of the frozen symbols, called dynamic frozen symbols, to be data-dependent. A construction of polar codes with dynamic...
—The IoT paradigm holds the promise to revolutionize the way we live and work by means of a wealth of new services, based on seamless interactions between a large amount of heter...
Maria Rita Palattella, Mischa Dohler, Luigi Alfred...
—As the emergence of new wireless applications, data traffic in cellular networks has dramatically increased in recent years, which imposes an immediate requirement for large ne...
—The wide range of performance characteristics of storage technologies motivates the use of a hybrid energy storage systems (HESS) that combines the best features of multiple tec...