{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T07:44:11Z","timestamp":1698219851624},"reference-count":26,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2011,1,31]],"date-time":"2011-01-31T00:00:00Z","timestamp":1296432000000},"content-version":"vor","delay-in-days":5935,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[1994,11]]},"abstract":"Abstract<\/jats:title>This paper describes suboptimal decoding methods for multilevel block\u2010encoded modulation schemes. These decoding methods can achieve large coding gains with relatively low decoding complexity, and operate, in part, by decoding a supercode of the code to be decoded. By decomposing the multilevel codes in various ways, a wide range of performance\/complexity tradeoff points can be obtained. Introducing syndrome checking can further reduce the average decoding complexity with no degradation in performance. Both analysis and extensive simulation results confirm that a given coding gain can be achieved with significantly smaller decoding complexity than Viterbi decoding.<\/jats:p>","DOI":"10.1002\/ett.4460050603","type":"journal-article","created":{"date-parts":[[2011,1,31]],"date-time":"2011-01-31T13:43:14Z","timestamp":1296481394000},"page":"665-679","source":"Crossref","is-referenced-by-count":0,"title":["Complexity\/performance tradeoffs in multistage decoders"],"prefix":"10.1002","volume":"5","author":[{"given":"Wing\u2010Man","family":"Lee","sequence":"first","affiliation":[]},{"given":"Frank R.","family":"Kschischang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2011,1,31]]},"reference":[{"key":"e_1_2_1_2_2","unstructured":"O.Amrani Y.Be'ery A.Vardy F.\u2010W.Sun H. C. A.van Tilborg The leech lattice and the golay code: bounded\u2010distance decoding and multilevel constructions. \u201cIEEE Trans on Inform. Theory\u201d to appear."},{"key":"e_1_2_1_3_2","first-page":"27","volume-title":"Coded Modulation and Bandwidth\u2010Efficient Transmission","author":"Biglieri E.","year":"1992"},{"key":"e_1_2_1_4_2","first-page":"218","article-title":"Coding of generalized concatenated codes","volume":"10","author":"Blokh E. L.","year":"1974","journal-title":"Probl. Peredach. Inform."},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/26.20095"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1987.1057291"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2249-9"},{"key":"e_1_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1049\/el:19840043"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.21245"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.21246"},{"key":"e_1_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.32173"},{"key":"e_1_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.133243"},{"key":"e_1_2_1_13_2","first-page":"20","article-title":"Multidimensional signals for a continuous channel","volume":"20","author":"Ginzburg V. V.","year":"1984","journal-title":"Problems of Information Transmission"},{"issue":"1","key":"e_1_2_1_13_3","first-page":"28","volume":"20","year":"1984","journal-title":"Problemy Peredachi Informatsii."},{"key":"e_1_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/49.29620"},{"key":"e_1_2_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055718"},{"key":"e_1_2_1_15_3","unstructured":"Correction Nov.1977 p.784."},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.86990"},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/49.29613"},{"key":"e_1_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.119683"},{"key":"e_1_2_1_19_2","volume-title":"The theory of error\u2010correcting codes","author":"MacWilliams F. J.","year":"1977"},{"key":"e_1_2_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.42180"},{"key":"e_1_2_1_21_2","volume-title":"Digital Communications","author":"Proakis J. G.","year":"1983"},{"key":"e_1_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1986.1096446"},{"key":"e_1_2_1_23_2","first-page":"201","volume-title":"Coded Modulation and Bandwidth\u2010Efficient Transmission","author":"Takata T.","year":"1992"},{"key":"e_1_2_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056454"},{"key":"e_1_2_1_25_2","first-page":"2","article-title":"Generalized cascade codes","volume":"12","author":"Zinoviev V. A.","year":"1976","journal-title":"Probl. Peredach. Inform."}],"container-title":["European Transactions on Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.4460050603","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4460050603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T03:09:06Z","timestamp":1698116946000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.4460050603"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,11]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1994,11]]}},"alternative-id":["10.1002\/ett.4460050603"],"URL":"https:\/\/doi.org\/10.1002\/ett.4460050603","archive":["Portico"],"relation":{},"ISSN":["1124-318X","1541-8251"],"issn-type":[{"value":"1124-318X","type":"print"},{"value":"1541-8251","type":"electronic"}],"subject":[],"published":{"date-parts":[[1994,11]]}}}