Extending adaptive ECC scheme for window-constrained real-time communications in wireless networks

Kyong Hoon Kim, Jong Kim, Sung Je Hong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The technological development of the wireless environment has made real-time communications possible in wireless networks. Many studies have been done on real-time communications in wireless networks in order to overcome a higher bit error rate in wireless channels. However, no work deals with the window-constrained real-time communications in wireless networks, which is a recent issue in real-time systems. In this paper, we propose an adaptive error-correcting scheme for the window-constrained real-time communications in wireless networks to maximize the expected net profit. The proposed scheme adaptively selects an error-correcting code under the current air state and the (m, k)-constraint of a message stream. Throughout simulation results, we show that the suggested scheme provides more profit than single error-correcting schemes.

Original languageEnglish
Title of host publicationProceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications
EditorsA.O. Fapojuwo
Pages686-691
Number of pages6
StatePublished - 2004
EventProceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications - Banff, Canada
Duration: 8 Jul 200410 Jul 2004

Publication series

NameProceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications

Conference

ConferenceProceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications
Country/TerritoryCanada
CityBanff
Period8/07/0410/07/04

Keywords

  • Error-correcting codes
  • Window-constrained real-time communication
  • Wireless LANs
  • Wireless technologies

Fingerprint

Dive into the research topics of 'Extending adaptive ECC scheme for window-constrained real-time communications in wireless networks'. Together they form a unique fingerprint.

Cite this