Delete-and-Conquer: Rateless coding with constrained feedback

Morteza Hashemi, Ari Trachtenberg, Yuval Cassuto

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Traditional rateless codes were designed without the use of a feedback channel, though one is available in many applications. In this work, we build upon recent interest in rateless coding with feedback to produce a novel approach, dubbed Delete-and-Conquer coding, for rateless coding with very little feedback. In our scheme, the feedback used is a measure of distance between a received word and the symbols already decoded at the receiver. This distance, in turn, permits a transmitter to deduce which symbols have been decoded and exclude them from subsequent transmissions. Our approach can be tuned to the specific transmission properties of a given feedback channel, and we empirically show that a very small amount of feedback from receiver back to the transmitter can significantly reduce coding overhead and encoding/decoding complexity. We also provide some analytically backed intuition for this improvement.

Original languageEnglish
Title of host publication2013 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013
Pages350-357
Number of pages8
DOIs
StatePublished - 2013
Event51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013 - Monticello, IL, United States
Duration: 2 Oct 20134 Oct 2013

Publication series

Name2013 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013

Conference

Conference51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013
Country/TerritoryUnited States
CityMonticello, IL
Period2/10/134/10/13

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Delete-and-Conquer: Rateless coding with constrained feedback'. Together they form a unique fingerprint.

Cite this