1 |
E. Arikan, "Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels," IEEE Trans. Inform. Theory, Vol.55, No.7, pp. 3051-3073, July 2009.
DOI
ScienceOn
|
2 |
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," arXiv:1001.0210v1, Jan. 2010.
|
3 |
C. E. Shannon, "A mathematical theory of communication," Bell System Tech. J., Vol.27, pp. 379-423, 623-656, July-Oct. 1948.
DOI
|
4 |
R. Mori and T. Tanaka, "Performance and construction of polar codes on symmetric binary-input memoryless channels," in Proc, IEEE Int. Symp. Inform. Theory, Seoul, South Korea, June 2009, pp.1496-1500.
|
5 |
M. Andersson, V. Rathi, R. Thobaben, J. Kliewer, M. Skoglund, "Nested polar codes for wiretap and relay channels," arXiv:1006.3573v1, Jun 2010.
DOI
ScienceOn
|
6 |
M. Bakshi, S. Jaggi, and M. Effros, "Concatenated polar codes," IEEE Int. Symp. Inform. Theory, June 2010.
|
7 |
N. Hussami, R.L. Urbanke, and S. B. Korada, "Performance of polar codes for channel and source coding," in Proc. IEEE Int. Symp. Inform. Theory, Seoul, South Korea, June 2009, pp.1488-1492.
|
8 |
S. B. Korada and R. Urbanke, "Polar codes are optimal for lossy source coding," IEEE Trans. Inform. Theory, Vol.56, No.4, pp.1751-1768, April 2010.
DOI
ScienceOn
|