The Capacity Region of the Strong Interference Channel With Common Information

Size: px
Start display at page:

Download "The Capacity Region of the Strong Interference Channel With Common Information"

Transcription

1 The Capacity Region of the Strong Interference Channel With Common Information Ivana Maric WINLAB, Rutgers University Piscataway, NJ Roy D. Yates WINLAB, Rutgers University Piscataway, NJ Gerhard Kramer Bell Labs, Lucent Technologies Murray Hill, New Jersey Abstract Transmitter cooperation enabled by dedicated links allows for a partial message exchange between encoders. After cooperation, each encoder knows a common message partially describing the two original messages, and its own private message containing the information that the encoders were not able to exchange. We consider the interference channel with both private and common messages at the encoders. A private message at an encoder is intended for a corresponding decoder as the common message is to be received at both decoders. We derive conditions under which the capacity region of this channel coincides with the capacity region of the channel in which both private messages are required at both receivers. We show that the obtained conditions are equivalent to the strong interference conditions determined by Costa and El Gamal for the interference channel with independent messages. I. INTRODUCTION A problem in which encoders partially cooperate in a discrete memoryless channel was proposed by Willems for a multiple access channel (MAC) [1]. To model the transmitter cooperation, two communication links with finite capacities are introduced between the two encoders. The amount of information exchanged between the two transmitters is bounded by the capacities of the communication links. The proposed discrete channel model enables investigation of transmitter cooperation gains. For a Gaussian network with two transmitters and two receivers, improvements in the achievable rates due to node cooperation were demonstrated in [2] [6]. In [2], the transmitters fully cooperate by exchanging their intended messages and then jointly encode them using dirty paper coding. Other cooperation schemes were analyzed in [3] [5]. In the discrete memoryless MAC with partially cooperating encoders [1], the outcome of the cooperation is referred to as a conference. Willems determined the capacity region of this channel and thus specified the optimum conference. His result was recently extended to a compound MAC in which two decoders wish to decode messages sent from the encoders [7]. The same form of conference as in [1] was shown to remain optimal. When cooperating over the links with finite capacities, encoders obtain partial information about each other s messages. This information is referred to as the common message as it is known to both encoders after the conference. In addition, 1 This work was supported by NSF Grant NSF ANI W 1 W0 W2 ENCODER 1 ENCODER 2 Fig. 1. X1(W 1,W 0 ) p(y1,y2 x1,x2) Y1 DECODER 1 ^ ^ (W 1,W 0 (1)) ^ ^ X2 (W 2,W 0 ) Y2 (W 2,W 0 (2)) DECODER 2 Interference channel with common information. each encoder will still have independent information referred to as the private message, as this message remains unknown to the other encoder. Both common and private messages are decoded at a single decoder in the case of the MAC [1], or at both receivers in the case of a compound MAC [7]. In this paper, we consider the communication situation in which two encoders each have a private message and a common message they wish to send. Each decoder is interested in only one private message sent at the corresponding encoder. Both decoders wish to decode the common message. We refer to this channel as an interference channel with common information, denoted! ". The communication system is shown in Figure 1. Without common information, this channel reduces to the interference channel [8], [9] for which the capacity region is known in the case of strong interference [10] satisfying %'&)( + %&)(, + %&( (1) %&(- (2) for all product distributions on the inputs and. The capacity region in this case coincides with the capacity region of the two-sender, two-receiver channel in which both messages are decoded at both receivers, as determined by Ahlswede [11]. In this paper, we determine the capacity region of interference channels with a common message if %&)( /.0 %&)(, /.0 &( 1.0 (3) &(- 1.0 (4) for all joint distributions 2 %32 that factor as 3% %. We further show that this class of interference channels is same as those determined by (1) and (2) with independent $5 and $6.

2 @ II. CHANNEL MODEL AND STATEMENT OF RESULT The channel consists of finite sets ) '! and a conditional probability distribution 2 % ' - ',. Symbols % 78 9 are channel inputs and % 7: ; are the corresponding channel outputs. Each encoder, 9 )>, wishes to send a private message?a@b7dc FE"EFE/GH@)I to decoder in J channel uses. In addition, a common message?lkm7hc FE"EFE/GHKI needs to be communicated from the encoders to both decoders, as shown in Figure 1. The channel is memoryless and time-invariant in the sense that 2 % 1N O N O- P O P O Q OSRT Q OSR- U K UV U+ (5) W'XYWZ[\!X]\^Z /N O FN OT - /N O, FN O_ P O N N Od and W X W Z [\ X \ Z Yef is the channel probability distribution. We are here following the convention of dropping subscripts of probability distributions if the arguments of the distributions are lower case versions of the corresponding random variables. To simplify notation, we drop the superscript when g Indexes? K,?H and?a are independently generated at the beginning of each block of J channel uses. An encoder : /> maps the common message? K and the private into a codeword P ih?ak/? (6) P ih?ak/? 1E (7) Each decoder J. estimates the common message?lk and the private based on the received J -sequence j? K 1 j?k " ml %n8 (8) j?lks >1 j? ml %n 1E (9) An GHK)G )G J8)o2p code for the channel consists of two encoding functions h, h, two decoding functions l, l and a maximum error probability o2p u vxwy N w X N w Zz o p+qir6s't Co p N o p N 'I (10) G K G{ GB om %n}@ ~ U+KU@Y x %U K UV 'U " sent! )> E (11) A rate triple K 0 ') is achievable if, for any ƒ, there is an G K )G )GB 'J8)o p code such that o p and Ĝ ^ m>+ -ŒŽ The capacity region of the interference channel with common information is the closure of the set of all achievable rate triplets K ). The next theorem is the main result of this paper. It gives conditions under which the capacity region coincides with the capacity region of the channel in which both private messages are required at both receivers. /> E Theorem 1: For an interference channel %S, 1! " with common information satisfying %'&)( + %&)(, + %&( (12) %&(- (13) K C. K C for all product distributions on $5 and $6, the capacity region is given by CS ) ' Mm %&)( /.0 (14) Mm %$6 &)( S $5 '/.0 (15) 0 š{ rœ ž $Ÿ '$6 &)( 1 %$5 '$6 &)(.01I (16) Mm B 0 šb rœ ž $Ÿ '$6 &)( F1 $Ÿ '$6 &)( /I (17) the union is over joint distributions 3 that factor as 2 %3-42 % 3-42 % 3%, 1E (18) III. THE MAC WITH COMMON INFORMATION AND ACHIEVABILITY The interference channel with common information is closely related to a discrete channel model in which private and common messages are transmitted to a single receiver, referred to as the MAC with common information [12]. The capacity region of this channel,, was shown in [12] and [13] to be 9 - CS K ) M 0 $Ÿ &( $6 1.0 M $œ &( $ šb 0 %$5 $6 &)(.0 M K{ { %$ &)( /I (19) the union is over all 2 %32- ', that factor as 3% 3-4, S 3-42 %T,. (In [13] the convex hull operation used in [12] was shown to be unnecessary). In this paper we analyze a channel model with two receivers. When each receiver wishes to decode both private messages and the common message, the considered channel becomes a compound MAC with common information. This channel defines two MAC channels with common information one for each receiver ', u (20) Z SZ and 2 % u X/ X % 1E (21) As described in [7, Section IV], the encoding and decoding strategy proposed by Willems in [13] can be adopted for the

3 compound MAC with common information to guarantee the achievability of rates MACt, CMAC C MAC1 ª MAC2 I (22) )> satisfies the bounds (19) with ( replaced by and the union is over all %3-42 %- 3%, 3-4 ". We remark that under the conditions (12) and (13), the regions (14)-(17) and (22) are the same. Consider next the strong interference channel with common information. The achievability of the rates of Theorem 1 in the case in which both messages are required at the receivers guarantees that these rates are also achieved when a weaker constraint of decoding of a single message is imposed at the receivers. Hence the proof of achievability in Theorem 1 is immediate. We next prove the converse. IV. CONVERSE Consider a code G K /G{ /Ĝ )J8o p for the interference channel with common information. Applying Fano s inequality results in? K /?k n8 + o p ž, G K G T{ o p " q JA± 1N (23)? K )?² n} mo p x, G K Ĝ + T o p ' q JL±" N E (24) ±@ N ³ as ³ (or as o^p ³ ). It follows that?ak/? n? K )?² S nµ "?LK n? K n} T? n /?LK' JA± 1N (25)?² n} )? K mjl±" N E (26) Since conditioning cannot increase entropy, from (26) it follows that?a S n} /? K )?H?A S nµ /? K + JA±F FN E (27) To prove the converse, we will use the data processing inequality for the following Markov chains: Lemma 1: The following form Markov chains for the interference channel with a common message:?k ³ µ ')? K /?A ³ n8 (28)?A ³ 5 )? K /?k F ³ nµ (29)? K )? K ³ š /> E (30) We will need the following data processing inequality: Lemma 2: For a Markov chain? ³.+$² ³ (? &(.0 %$ &)(. 1E (31) Proof: See [14]. Applying Lemma 2 to the Markov Chains (29)- (30) and using (30) yields,? & & K? K /?k & n: " & K K & &?AK/? (32) (33)? µ n8 E (34) We first consider the bound (17) at the decoder. We have JB VK{ B?AK?? vž z? K )?H?A S? K )?H F? K )?H & n: "T?² & n} S? K )?H F vž¹? K /?k n8?a S nµ /? K )?H z?lk & n T & n?ak/? vžº? K /?k n8?a S nµ /? K )?H z? K : & n: F } & n}? K /?k F {JL± 1N JL± FN vž» z? K : & n: F } & n} S? K /?k ' : '? K )?H F {JL± 1N JL±F FN v p z?ak) & n & n?lk {JL± 1N JL± FN (35) ¼ follows from the independence of?lk)? /? ; ½ from (32) and (34); ¾F from (25) and (27); S and À' from (6). If & n?ak) + then it follows from (35) that & n?ak) (36) JB VK{ B?AK) & n & n )?AK' {JL± 1N {JL± FN?AK) ) & n T{JL± 1N {JL± FN µ ' } & n: BJL± /N BJL±" N YO )O&(- O BJA± 1N BJA± FN E (37) To prove that the bound (16) at the decoder is valid, we consider JB 0 šb?k "?² " vž z??ak??ak/??h & n:? K?² & n}? K /?k " vž¹?k n8 /? K?² n} )? K /?k " z & n?ak & n?lk)? vžº? n /?LK'? n )?AK/? z : & n:? K } & nµ? K )?H " {JL± /N {JL±" N vž» z '& n?akt & n?lk)??ak/? {JL± /N {JL± N v p z µ & n8? K T } & n} : '/? K {JL± /N {JL±" N E (38)

4 g J again ¼ follows from the independence of? K )?H /?A ; ½F from (32) and (33); ¾F from (25) and (27); S and À' from (6). Again, if (36) holds, then (38) becomes JB 0!{ µ & n8? K 5 & n: : '/? K {JL± 1N {JL±F FN µ } & n8? K T{JL± 1N {JL±F FN we have used. O $Ÿ O-$œ )O &( OT? K BJL± /N {JL±" N O )O&(- O. O BJA± 1N BJA± FN E?LK (39) FEFE"EJLE (40) The same approach as in (35) and (38) can be used to obtain JL JL JB š{ JB Ÿ Ÿ K $Ÿ O &)( OT $6 )O/.!O BJA± 1N (41) )O-&)(, )O O /. O BJA± FN (42) %$5 O$6 )O &( OT.šO {JL± /N {JL±" N (43) YO )O&( )O ŸJL± /N 5JL± FN E (44) We further can write (36) and its corresponding bound as & n )µ+ '& n Â: n n & Â: (45) & )µE (46) We can now proceed as in [10], [14] to show that the conditions (45) and (46) reduce to the per-letter conditions %$6 &)( S $Ÿ '/.0 %$5 &)( $œ /.0 $6 &)( $5 1.0 (47) $5 &)( $6 1.0 (48) to be satisfied for every distribution of the form (18). It was shown in [14] that (47) and (48) are equivalent to the strong interference conditions (1) and (2) thus proving Theorem 1. In the following, we present a more direct proof. Theorem 2: The condition 5 & n} S : )µ+ 5 & n8 µ Â: (49) is satisfied for all input distributions of the form (18) if and only if the vector version of the strong interference condition (2), given by & n + & n (50) is satisfied for all product distributions on and. Proof. To prove that (50) implies (49), we write the mutual information in (49) as 5 & n} S : )µ uã oä9 %3-5 & n} : ') We next observe that the following is a Markov chain Æ ] E (51) ²n OSR- ) OSRT OSR- ³ %$5 1N O-$6 FN O ³ ( 1N O ( N O (52) and therefore Q P P Q P P E (53) Furthermore, the same reasoning as in [13, Ç_E È,E ] shows that (6), (7) and (40) imply ³  ³, that is 2 %P 'PT S 2 %P 42 %PT S 1E (54) Since (50) holds for any input distribution on independent inputs, it follows that for all we have } & n} µ  i } & n: : ') i (55) and are independent. Inserting this bound into (51) gives the desired result. To show the other directions, we observe that since (49) holds for all input distributions of the form (54), it must also hold for  independent from. By choosing such distribution on ÂA) µ } we obtain (50). É From Theorem 2, it follows that conditions µ & n8 5 Â:+ : & n} 5 Â: when satisfied for all distributions as in (18) are equivalent to µ & n8 5 V µ & nµ 5 " satisfied for all independent inputs. Combining Theorem 2 and the Lemma in [10] we conclude that the conditions (46) and (45) reduce to the strong interference conditions (1) and (2) respectively, thus proving Theorem 1. É The equivalence of the per-letter conditions (3)-(4) and the strong interference conditions (1)-(2) relies on the fact that (3)-(4) must hold for all input distributions of the form (18). At this point, it is not clear if these conditions can be tightened to require a subset of distributions (for example only capacityachieving distributions) to satisfy the conditions (3)-(4). V. GAUSSIAN CHANNEL Consider the Gaussian interference channel in the standard form [9], [15] Y Y F, ) {Ê' (56), /,B, ) {Ê ) (57) the are independent, zero-mean, unit-variance Gaussian random variables. The code definition is the same as that given in Section II with the addition of the power constraints xá mo@1! )> E (58)

5 ¼Ò From the maximum-entropy theorem [16, Thm. Í E Î EfÏ ] it follows that Gaussian inputs are optimal in Theorem 1. We have the following result. Corollary 1: When the strong interference conditions, 1 are satisfied, the capacity region of the Gaussian strong interference channel with common information is given by CS 0 ) + M 0 ÑÐ Ò ¼So^ " (59) M ÑÐ Ó Ò½1o "Ô (60) 0 šb 0 Õ Ö rm ž 1N / Ð Ó Õ ¼So^! Ò Õ Ò½/o2 Ô (61) M K { š{ 0 rœ x Õ Ð Ø Õ oš š Õ o {> Õ " Õ Ù ¼oš ½o "Ú2I (62) the union is over all ¼)½, for ²Û¼ˆ Aܽ6, k¼, Ò½ ˆ½, and ) ). For any choice of values ¼ and ½, the fraction of power allocated to send the common message at transmitters and > is ¼So^ and ½1o2, respectively. Private messages are transmitted with the remaining powers ¼oš Ò and Ò½1o2. [10] M. H. M. Costa and A. A. E. Gamal, The capacity region of the discrete memoryless interference channel with strong interference, IEEE Trans. on Inf. Theory, vol. 33, no. 5, pp , Sept [11] R. Ahlswede, The capacity region of a channel with two senders and two receivers, Annals of Probability, vol. 2, no. 5, pp , [12] D. Slepian and J. K. Wolf, A coding theorem for multiple access channels with correlated sources, Bell Syst. Tech. J., vol. 52, pp , [13] F. M. J. Willems, Informationtheoretical results for the discrete memoryless multiple access channel, Ph.D. dissertation, Katholieke Universiteit Leuven, Belgium, Oct [14] I. Maric, R. D. Yates, and G. Kramer, The strong interference channel with common information, in Allerton Conference on Communications, Control and Computing, Sept [15] G. Kramer, Outer bounds on the capacity of gaussian interference channels, IEEE Trans. on Inf. Theory, vol. 50, no. 53, pp , Mar [16] T. Cover and J. Thomas, Elements of Information Theory. John Wiley Sons, Inc., VI. DISCUSSION Communication systems with encoders that need to send both private and common information naturally arise when encoders can partially cooperate as in [1], [7]. After such cooperation, the common information consists of two indexes each partially describing one of the two original messages. The assumption of the model that the entire common message is decoded simplifies the problem. However, a receiver interested in a message from only one encoder, as is the case in the interference channel, will be interested in only a part of the common message. Understanding such communication problems appears to be much more challenging and is the subject of our future work. REFERENCES [1] F. M. J. Willems, The discrete memoryless multiple channel with partially cooperating encoders, IEEE Trans. on Inf. Theory, vol. 29, no. 3, pp , May [2] N. Jindal, U. Mitra, and A. Goldsmith, Capacity of ad-hoc networks with node cooperation, in IEEE Int. Symp. Inf. Theory, 2004, p [3] A. Høst-Madsen, A new achievable rate for cooperative diversity based on generalized writing on dirty paper, in IEEE Int. Symp. Inf. Theory, June 2003, p [4], On the achievable rate for receiver cooperation in ad-hoc networks, in IEEE Int. Symp. Inf. Theory, June 2004, p [5], On the capacity of cooperative diversity, IEEE Trans. on Inf. Theory, submitted. [6] C. Ng and A. Goldsmith, Transmitter cooperation in ad-hoc wireless networks: Does dirty-paper coding beat relaying? in IEEE Inf. Theory Workshop, Oct [7] I. Maric, R. D. Yates, and G. Kramer, The discrete memoryless compound multiple access channel with conferencing encoders, in IEEE Int. Symp. Inf. Theory, Sept [8] H. Sato, Two user communication channels, IEEE Trans. on Inf. Theory, vol. 23, no. 3, p. 295, May [9] A. B. Carleial, Interference channels, IEEE Trans. on Inf. Theory, vol. 24, no. 1, p. 60, Jan

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,

More information

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 28-30, 2011 Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Zhiyu Cheng, Natasha

More information

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Interference Channels With Correlated Receiver Side Information Nan Liu, Member, IEEE, Deniz Gündüz, Member, IEEE, Andrea J.

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

Capacity and Cooperation in Wireless Networks

Capacity and Cooperation in Wireless Networks Capacity and Cooperation in Wireless Networks Chris T. K. Ng and Andrea J. Goldsmith Stanford University Abstract We consider fundamental capacity limits in wireless networks where nodes can cooperate

More information

CORRELATED data arises naturally in many applications

CORRELATED data arises naturally in many applications IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 54, NO. 10, OCTOBER 2006 1815 Capacity Region and Optimum Power Control Strategies for Fading Gaussian Multiple Access Channels With Common Data Nan Liu and Sennur

More information

COOPERATION via relays that forward information in

COOPERATION via relays that forward information in 4342 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 7, JULY 2012 Relaying in the Presence of Interference: Achievable Rates, Interference Forwarding, and Outer Bounds Ivana Marić, Member, IEEE,

More information

Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C.

Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 5, MAY 2011 2941 Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, David N C Tse, Fellow, IEEE Abstract

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

DEGRADED broadcast channels were first studied by

DEGRADED broadcast channels were first studied by 4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,

More information

SHANNON S source channel separation theorem states

SHANNON S source channel separation theorem states IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 3927 Source Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Member, IEEE, Elza Erkip, Senior Member,

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY 2011 4087 New Inner Outer Bounds for the Memoryless Cognitive Interference Channel Some New Capacity Results Stefano Rini, Daniela Tuninetti,

More information

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints 1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu

More information

Power and Bandwidth Allocation in Cooperative Dirty Paper Coding

Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Chris T. K. Ng 1, Nihar Jindal 2 Andrea J. Goldsmith 3, Urbashi Mitra 4 1 Stanford University/MIT, 2 Univeristy of Minnesota 3 Stanford

More information

State Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE

State Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE 1850 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 State Amplification Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE Abstract We consider the problem

More information

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel On ecure ignaling for the Gaussian Multiple Access Wire-Tap Channel Ender Tekin tekin@psu.edu emih Şerbetli serbetli@psu.edu Wireless Communications and Networking Laboratory Electrical Engineering Department

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

State of the Cognitive Interference Channel

State of the Cognitive Interference Channel State of the Cognitive Interference Channel Stefano Rini, Ph.D. candidate, srini2@uic.edu Daniela Tuninetti, danielat@uic.edu Natasha Devroye, devroye@uic.edu Interference channel Tx 1 DM Cognitive interference

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

Multicasting over Multiple-Access Networks

Multicasting over Multiple-Access Networks ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

WIRELESS or wired link failures are of a nonergodic nature

WIRELESS or wired link failures are of a nonergodic nature IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY 2011 4187 Robust Communication via Decentralized Processing With Unreliable Backhaul Links Osvaldo Simeone, Member, IEEE, Oren Somekh, Member,

More information

SHANNON showed that feedback does not increase the capacity

SHANNON showed that feedback does not increase the capacity IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2667 Feedback Capacity of the Gaussian Interference Channel to Within 2 Bits Changho Suh, Student Member, IEEE, and David N. C. Tse, Fellow,

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL 2011 1911 Fading Multiple Access Relay Channels: Achievable Rates Opportunistic Scheduling Lalitha Sankar, Member, IEEE, Yingbin Liang, Member,

More information

Degrees of Freedom of the MIMO X Channel

Degrees of Freedom of the MIMO X Channel Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department

More information

CONSIDER a sensor network of nodes taking

CONSIDER a sensor network of nodes taking 5660 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 Wyner-Ziv Coding Over Broadcast Channels: Hybrid Digital/Analog Schemes Yang Gao, Student Member, IEEE, Ertem Tuncel, Member,

More information

Efficient Multihop Broadcast for Wideband Systems

Efficient Multihop Broadcast for Wideband Systems Efficient Multihop Broadcast for Wideband Systems Ivana Maric WINLAB, Rutgers University ivanam@winlab.rutgers.edu Roy Yates WINLAB, Rutgers University ryates@winlab.rutgers.edu Abstract In this paper

More information

Degrees of Freedom in Multiuser MIMO

Degrees of Freedom in Multiuser MIMO Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department

More information

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,

More information

MOST wireless communication systems employ

MOST wireless communication systems employ 2582 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 Interference Networks With Point-to-Point Codes Francois Baccelli, Abbas El Gamal, Fellow, IEEE, and David N. C. Tse, Fellow, IEEE

More information

IN RECENT years, wireless multiple-input multiple-output

IN RECENT years, wireless multiple-input multiple-output 1936 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 6, NOVEMBER 2004 On Strategies of Multiuser MIMO Transmit Signal Processing Ruly Lai-U Choi, Michel T. Ivrlač, Ross D. Murch, and Wolfgang

More information

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH

More information

Error Performance of Channel Coding in Random-Access Communication

Error Performance of Channel Coding in Random-Access Communication IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012 3961 Error Performance of Channel Coding in Random-Access Communication Zheng Wang, Student Member, IEEE, andjieluo, Member, IEEE Abstract

More information

Computing and Communications 2. Information Theory -Channel Capacity

Computing and Communications 2. Information Theory -Channel Capacity 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication

More information

A Bit of network information theory

A Bit of network information theory Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,

More information

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING.

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. COMPACT LECTURE NOTES on COMMUNICATION THEORY. Prof. Athanassios Manikas, version Spring 22 Digital

More information

Wireless Network Information Flow

Wireless Network Information Flow Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch

More information

Bounds on Achievable Rates for Cooperative Channel Coding

Bounds on Achievable Rates for Cooperative Channel Coding Bounds on Achievable Rates for Cooperative Channel Coding Ameesh Pandya and Greg Pottie Department of Electrical Engineering University of California, Los Angeles {ameesh, pottie}@ee.ucla.edu Abstract

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Exploiting Interference through Cooperation and Cognition

Exploiting Interference through Cooperation and Cognition Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

Rab Nawaz. Prof. Zhang Wenyi

Rab Nawaz. Prof. Zhang Wenyi Rab Nawaz PhD Scholar (BL16006002) School of Information Science and Technology University of Science and Technology of China, Hefei Email: rabnawaz@mail.ustc.edu.cn Submitted to Prof. Zhang Wenyi wenyizha@ustc.edu.cn

More information

Frequency hopping does not increase anti-jamming resilience of wireless channels

Frequency hopping does not increase anti-jamming resilience of wireless channels Frequency hopping does not increase anti-jamming resilience of wireless channels Moritz Wiese and Panos Papadimitratos Networed Systems Security Group KTH Royal Institute of Technology, Stocholm, Sweden

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications 1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,

More information

Scheduling in omnidirectional relay wireless networks

Scheduling in omnidirectional relay wireless networks Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science

More information

Degrees of Freedom in Adaptive Modulation: A Unified View

Degrees of Freedom in Adaptive Modulation: A Unified View Degrees of Freedom in Adaptive Modulation: A Unified View Seong Taek Chung and Andrea Goldsmith Stanford University Wireless System Laboratory David Packard Building Stanford, CA, U.S.A. taek,andrea @systems.stanford.edu

More information

arxiv: v1 [cs.it] 26 Oct 2009

arxiv: v1 [cs.it] 26 Oct 2009 K-User Fading Interference Channels: The Ergodic Very Strong Case Lalitha Sanar, Jan Vondra, and H. Vincent Poor Abstract Sufficient conditions required to achieve the interference-free capacity region

More information

Diversity Gain Region for MIMO Fading Multiple Access Channels

Diversity Gain Region for MIMO Fading Multiple Access Channels Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,

More information

The Multi-way Relay Channel

The Multi-way Relay Channel The Multi-way Relay Channel Deniz Gündüz, Aylin Yener, Andrea Goldsmith, H. Vincent Poor Department of Electrical Engineering, Stanford University, Stanford, CA Department of Electrical Engineering, Princeton

More information

Capacity and Optimal Resource Allocation for Fading Broadcast Channels Part I: Ergodic Capacity

Capacity and Optimal Resource Allocation for Fading Broadcast Channels Part I: Ergodic Capacity IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 1083 Capacity Optimal Resource Allocation for Fading Broadcast Channels Part I: Ergodic Capacity Lang Li, Member, IEEE, Andrea J. Goldsmith,

More information

Coding Techniques and the Two-Access Channel

Coding Techniques and the Two-Access Channel Coding Techniques and the Two-Access Channel A.J. Han VINCK Institute for Experimental Mathematics, University of Duisburg-Essen, Germany email: Vinck@exp-math.uni-essen.de Abstract. We consider some examples

More information

WIRELESS communication channels vary over time

WIRELESS communication channels vary over time 1326 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 Outage Capacities Optimal Power Allocation for Fading Multiple-Access Channels Lifang Li, Nihar Jindal, Member, IEEE, Andrea Goldsmith,

More information

State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class

State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 5, MAY 2013 2629 State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class Majid Nasiri Khormuji, Member, IEEE, Abbas

More information

Rate Allocation for Serial Concatenated Block Codes

Rate Allocation for Serial Concatenated Block Codes 1 Rate Allocation for Serial Concatenated Block Codes Maja Bystrom and Robert A. Coury Abstract While serial concatenated codes were designed to provide good overall performance with reasonable system

More information

The Reachback Channel in Wireless Sensor Networks

The Reachback Channel in Wireless Sensor Networks The Reachback Channel in Wireless Sensor Networks Sergio D Servetto School of lectrical and Computer ngineering Cornell University http://peopleececornelledu/servetto/ DIMACS /1/0 Acknowledgements An-swol

More information

OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL

OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 6, December 06 OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL Zouhair Al-qudah Communication Engineering Department, AL-Hussein

More information

Degrees of Freedom of Bursty Multiple Access Channels with a Relay

Degrees of Freedom of Bursty Multiple Access Channels with a Relay Fifty-third Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October 2, 205 Degrees of Freedom of Bursty Multiple Access Channels with a Relay Sunghyun im and Changho Suh Department

More information

SPACE TIME coding for multiple transmit antennas has attracted

SPACE TIME coding for multiple transmit antennas has attracted 486 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 3, MARCH 2004 An Orthogonal Space Time Coded CPM System With Fast Decoding for Two Transmit Antennas Genyuan Wang Xiang-Gen Xia, Senior Member,

More information

Capacity of Two-Way Linear Deterministic Diamond Channel

Capacity of Two-Way Linear Deterministic Diamond Channel Capacity of Two-Way Linear Deterministic Diamond Channel Mehdi Ashraphijuo Columbia University Email: mehdi@ee.columbia.edu Vaneet Aggarwal Purdue University Email: vaneet@purdue.edu Xiaodong Wang Columbia

More information

Forwarding Strategies for Gaussian Parallel-Relay Networks

Forwarding Strategies for Gaussian Parallel-Relay Networks 1 Forwarding Strategies or Gaussian arallelrelay Networks vana Maric Member, EEE and Roy D. Yates Member, EEE Abstract This paper investigates reliable and unreliable orwarding strategies in a parallelrelay

More information

Cooperation in Wireless Networks

Cooperation in Wireless Networks Cooperation in Wireless Networks Ivana Marić and Ron Dabora Stanford 15 September 2008 Ivana Marić and Ron Dabora Cooperation in Wireless Networks 1 Objectives The case for cooperation Types of cooperation

More information

Computing functions over wireless networks

Computing functions over wireless networks This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/

More information

Capacity Gain from Two-Transmitter and Two-Receiver Cooperation

Capacity Gain from Two-Transmitter and Two-Receiver Cooperation Capacity Gain from Two-Transmitter and Two-Receiver Cooperation Chris T. K. Ng, Student Member, IEEE, Nihar Jindal, Member, IEEE, Andrea J. Goldsmith, Fellow, IEEE and Urbashi Mitra, Fellow, IEEE arxiv:0704.3644v1

More information

A unified graphical approach to

A unified graphical approach to A unified graphical approach to 1 random coding for multi-terminal networks Stefano Rini and Andrea Goldsmith Department of Electrical Engineering, Stanford University, USA arxiv:1107.4705v3 [cs.it] 14

More information

Analog network coding in the high-snr regime

Analog network coding in the high-snr regime Analog network coding in the high-snr regime The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Médard,

More information

Overlay Systems. Results around Improved Scheme Transmission for Achievable Rates. Outer Bound. Transmission Strategy Pieces

Overlay Systems. Results around Improved Scheme Transmission for Achievable Rates. Outer Bound. Transmission Strategy Pieces Cooperation at T EE36: Lecture 3 Outline Capacity of Cognitive adios Announcements Progress reports due Feb. 9 at midnight Overview Achievable rates in Cognitive adios Better achievable scheme and upper

More information

4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE

4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE 4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 Cooperative Sensor Networks With Misinformed Nodes Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE Abstract The

More information

CODE division multiple access (CDMA) systems suffer. A Blind Adaptive Decorrelating Detector for CDMA Systems

CODE division multiple access (CDMA) systems suffer. A Blind Adaptive Decorrelating Detector for CDMA Systems 1530 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 8, OCTOBER 1998 A Blind Adaptive Decorrelating Detector for CDMA Systems Sennur Ulukus, Student Member, IEEE, and Roy D. Yates, Member,

More information

BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS

BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS Aminata A. Garba Dept. of Electrical and Computer Engineering, Carnegie Mellon University aminata@ece.cmu.edu ABSTRACT We consider

More information

THE Shannon capacity of state-dependent discrete memoryless

THE Shannon capacity of state-dependent discrete memoryless 1828 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 5, MAY 2006 Opportunistic Orthogonal Writing on Dirty Paper Tie Liu, Student Member, IEEE, and Pramod Viswanath, Member, IEEE Abstract A simple

More information

When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network

When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network Nadia Fawaz, David Gesbert Mobile Communications Department, Eurecom Institute Sophia-Antipolis, France {fawaz, gesbert}@eurecom.fr

More information

Linear time and frequency domain Turbo equalization

Linear time and frequency domain Turbo equalization Linear time and frequency domain Turbo equalization Michael Tüchler, Joachim Hagenauer Lehrstuhl für Nachrichtentechnik TU München 80290 München, Germany micha,hag@lnt.ei.tum.de Abstract For coded data

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

OFDM Transmission Corrupted by Impulsive Noise

OFDM Transmission Corrupted by Impulsive Noise OFDM Transmission Corrupted by Impulsive Noise Jiirgen Haring, Han Vinck University of Essen Institute for Experimental Mathematics Ellernstr. 29 45326 Essen, Germany,. e-mail: haering@exp-math.uni-essen.de

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Energy Efficiency in Relay-Assisted Downlink

Energy Efficiency in Relay-Assisted Downlink Energy Efficiency in Relay-Assisted Downlink 1 Cellular Systems, Part I: Theoretical Framework Stefano Rini, Ernest Kurniawan, Levan Ghaghanidze, and Andrea Goldsmith Technische Universität München, Munich,

More information

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter On Fading Broadcast Channels with Partial Channel State Information at the Transmitter Ravi Tandon 1, ohammad Ali addah-ali, Antonia Tulino, H. Vincent Poor 1, and Shlomo Shamai 3 1 Dept. of Electrical

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 3787 Degrees of Freedom Region for an Interference Network With General Message Demands Lei Ke, Aditya Ramamoorthy, Member, IEEE, Zhengdao

More information

SNR Estimation in Nakagami Fading with Diversity for Turbo Decoding

SNR Estimation in Nakagami Fading with Diversity for Turbo Decoding SNR Estimation in Nakagami Fading with Diversity for Turbo Decoding A. Ramesh, A. Chockalingam Ý and L. B. Milstein Þ Wireless and Broadband Communications Synopsys (India) Pvt. Ltd., Bangalore 560095,

More information

Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying

Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying 013 IEEE International Symposium on Information Theory Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying M. Jorgovanovic, M. Weiner, D. Tse and B. Nikolić

More information

On Information Theoretic Interference Games With More Than Two Users

On Information Theoretic Interference Games With More Than Two Users On Information Theoretic Interference Games With More Than Two Users Randall A. Berry and Suvarup Saha Dept. of EECS Northwestern University e-ma: rberry@eecs.northwestern.edu suvarups@u.northwestern.edu

More information

Feedback via Message Passing in Interference Channels

Feedback via Message Passing in Interference Channels Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of

More information

Optimization of Coded MIMO-Transmission with Antenna Selection

Optimization of Coded MIMO-Transmission with Antenna Selection Optimization of Coded MIMO-Transmission with Antenna Selection Biljana Badic, Paul Fuxjäger, Hans Weinrichter Institute of Communications and Radio Frequency Engineering Vienna University of Technology

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

Reflections on the Capacity Region of the Multi-Antenna Broadcast Channel Hanan Weingarten

Reflections on the Capacity Region of the Multi-Antenna Broadcast Channel Hanan Weingarten IEEE IT SOCIETY NEWSLETTER 1 Reflections on the Capacity Region of the Multi-Antenna Broadcast Channel Hanan Weingarten Yossef Steinberg Shlomo Shamai (Shitz) whanan@tx.technion.ac.ilysteinbe@ee.technion.ac.il

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

SNR Scalability, Multiple Descriptions, and Perceptual Distortion Measures

SNR Scalability, Multiple Descriptions, and Perceptual Distortion Measures SNR Scalability, Multiple Descriptions, Perceptual Distortion Measures Jerry D. Gibson Department of Electrical & Computer Engineering University of California, Santa Barbara gibson@mat.ucsb.edu Abstract

More information

Iterative and One-shot Conferencing in Relay Channels

Iterative and One-shot Conferencing in Relay Channels Iterative and One-shot onferencin in Relay hannels hris T. K. N, Ivana Maric, Andrea J. Goldsmith, Shlomo Shamai (Shitz) and Roy D. Yates Dept. of Electrical Enineerin, Stanford University, Stanford, A

More information

Causal state amplification

Causal state amplification 20 IEEE International Symposium on Information Theory Proceedings Causal state amplification Chiranjib Choudhuri, Young-Han Kim and Urbashi Mitra Abstract A problem of state information transmission over

More information

I. INTRODUCTION. Fig. 1. Gaussian many-to-one IC: K users all causing interference at receiver 0.

I. INTRODUCTION. Fig. 1. Gaussian many-to-one IC: K users all causing interference at receiver 0. 4566 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 9, SEPTEMBER 2010 The Approximate Capacity of the Many-to-One One-to-Many Gaussian Interference Channels Guy Bresler, Abhay Parekh, David N. C.

More information

Performance Analysis of Maximum Likelihood Detection in a MIMO Antenna System

Performance Analysis of Maximum Likelihood Detection in a MIMO Antenna System IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 50, NO. 2, FEBRUARY 2002 187 Performance Analysis of Maximum Likelihood Detection in a MIMO Antenna System Xu Zhu Ross D. Murch, Senior Member, IEEE Abstract In

More information

High-Rate Non-Binary Product Codes

High-Rate Non-Binary Product Codes High-Rate Non-Binary Product Codes Farzad Ghayour, Fambirai Takawira and Hongjun Xu School of Electrical, Electronic and Computer Engineering University of KwaZulu-Natal, P. O. Box 4041, Durban, South

More information

Two Models for Noisy Feedback in MIMO Channels

Two Models for Noisy Feedback in MIMO Channels Two Models for Noisy Feedback in MIMO Channels Vaneet Aggarwal Princeton University Princeton, NJ 08544 vaggarwa@princeton.edu Gajanana Krishna Stanford University Stanford, CA 94305 gkrishna@stanford.edu

More information

Data Flow 4.{1,2}, 3.2

Data Flow 4.{1,2}, 3.2 < = = Computer Science Program, The University of Texas, Dallas Data Flow 4.{1,2}, 3.2 Batch Sequential Pipeline Systems Tektronix Case Study: Oscilloscope Formalization of Oscilloscope "systems where

More information

Approximately Optimal Wireless Broadcasting

Approximately Optimal Wireless Broadcasting Approximately Optimal Wireless Broadcasting Sreeram Kannan, Adnan Raja, and Pramod Viswanath Abstract We study a wireless broadcast network, where a single source reliably communicates independent messages

More information

Adaptive Resource Allocation in Wireless Relay Networks

Adaptive Resource Allocation in Wireless Relay Networks Adaptive Resource Allocation in Wireless Relay Networks Tobias Renk Email: renk@int.uni-karlsruhe.de Dimitar Iankov Email: iankov@int.uni-karlsruhe.de Friedrich K. Jondral Email: fj@int.uni-karlsruhe.de

More information

Coding for Noisy Networks

Coding for Noisy Networks Coding for Noisy Networks Abbas El Gamal Stanford University ISIT Plenary, June 2010 A. El Gamal (Stanford University) Coding for Noisy Networks ISIT Plenary, June 2010 1 / 46 Introduction Over past 40+

More information