Hybrid Coding. Young-Han Kim, UCSD. Living Information Theory Workshop Happy<70.42> th birthday,professorberger!
|
|
- Kristopher Cain
- 5 years ago
- Views:
Transcription
1 Hybrid Coding Young-Han Kim, UCSD Living Information Theory Workshop Happy<70.42> th birthday,professorberger! 1/21
2 Hybrid Coding Young-Han Kim, UCSD Living Information Theory Workshop Happy<70.42> th birthday,professorberger! SungHoonLim,PaoloMinero,andAbbasElGamal 1/21
3 Gratitude#1 2/21
4 Gratitude # /
5 Gratitude # /
6 Gratitude#2 3/21
7 Gratitude#2 Strong typicality (Extended) Markov lemma 3/21
8 Gratitude#3 4/21
9 Gratitude#3 4/21
10 Gratitude#3 But life is short and information endless: nobody has time for everything. In practice we are generally forced to choose between an unduly brief exposition and no exposition at all. Abbreviation is a necessary evil and the abbreviator s businessistomakethebestofajobwhich, though intrinsically bad, is still better than nothing. He must learn to simplify, but not to the point of falsification. He must learn to concentrate upon the essentials of a situation, but without ignoring too many of reality s qualifying side issues. Aldous Huxley Brave New World Revisited 4/21
11 Point-to-Point Communication System S n Source channel X n p(y x) Source channel Ŝ n encoder decoder Question Find the sufficient and necessary condition to achieve lim sup n 1 n n i=1 d(s i,ŝ i ) D 5/21
12 Point-to-Point Communication System S n Source M Channel X n Channel ˆM p(y x) Source Ŝ n encoder encoder encoder encoder Question Find the sufficient and necessary condition to achieve lim sup n 1 n n i=1 d(s i,ŝ i ) D Answer: Source channel separation(shannon 1948, 1959) Sufficient and necessary condition: R(D) = min I(S;Ŝ)< max I(X;Y)=C p(ŝ s) E(d(S,Ŝ)) D p(x) 5/21
13 Point-to-Point Communication System S n Source M Channel X n Channel ˆM p(y x) Source Ŝ n encoder encoder encoder encoder Question Find the sufficient and necessary condition to achieve lim sup n 1 n n i=1 d(s i,ŝ i ) D Answer: Source channel separation(shannon 1948, 1959) Sufficient and necessary condition: R(D) = min I(S;Ŝ)< max I(X;Y)=C p(ŝ s) E(d(S,Ŝ)) D p(x) 5/21
14 Point-to-Point Communication System S n Source M Channel X n Channel ˆM p(y x) Source Ŝ n encoder encoder encoder encoder Question Find the sufficient and necessary condition to achieve lim sup n 1 n n i=1 d(s i,ŝ i ) D Answer: Source channel separation(shannon 1948, 1959) Sufficient and necessary condition: R(D) = min I(S;Ŝ)< max I(X;Y)=C p(ŝ s) E(d(S,Ŝ)) D p(x) Digital source channel interface 5/21
15 Uncoded Transmission S n Source channel X n p(y x) Source channel Ŝ n encoder decoder 6/21
16 Uncoded Transmission S n X n Ŝ n x(s) p(y x) ŝ(y) 6/21
17 Uncoded Transmission S n X n Ŝ n x(s) p(y x) ŝ(y) Optimal for quadratic Gaussian source coding over the Gaussian channel with average power constraint(goblick 1965) 6/21
18 Uncoded Transmission S n X n Ŝ n x(s) p(y x) ŝ(y) Optimal for quadratic Gaussian source coding over the Gaussian channel with average power constraint(goblick 1965) R(D)=C 6/21
19 Uncoded Transmission S n X n Ŝ n x(s) p(y x) ŝ(y) Optimal for quadratic Gaussian source coding over the Gaussian channel with average power constraint(goblick 1965) R(D)=C Tocodeornottocode (Gastpar,Rimoldi,andVetterli2003) 6/21
20 Uncoded Transmission S n X n Ŝ n x(s) p(y x) ŝ(y) Optimal for quadratic Gaussian source coding over the Gaussian channel with average power constraint(goblick 1965) R(D)=C Tocodeornottocode (Gastpar,Rimoldi,andVetterli2003) Analog source channel interface 6/21
21 Hybrid Coding S n Source channel X n p(y x) Source channel Ŝ n encoder decoder 7/21
22 Hybrid Coding S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder 7/21
23 Hybrid Coding S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Sufficient condition: I(U;S)<I(U;Y) forsomep(u s), x(u,s),ŝ(u,y)suchthate(d(s,ŝ)) D 7/21
24 Hybrid Coding S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Sufficient condition: I(U;S)<I(U;Y) forsomep(u s), x(u,s),ŝ(u,y)suchthate(d(s,ŝ)) D Analog/digital hybrid source channel interface 7/21
25 Hybrid Coding S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Sufficient condition: I(U;S)<I(U;Y) forsomep(u s), x(u,s),ŝ(u,y)suchthate(d(s,ŝ)) D Analog/digital hybrid source channel interface U= :uncodedtransmission 7/21
26 Hybrid Coding S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Sufficient condition: I(U;S)<I(U;Y) forsomep(u s), x(u,s),ŝ(u,y)suchthate(d(s,ŝ)) D Analog/digital hybrid source channel interface U= :uncodedtransmission U=(Ŝ,X) p(ŝ s)p(x):separatesourceandchannelcoding 7/21
27 Hybrid Coding S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Sufficient condition: I(U;S)<I(U;Y) forsomep(u s), x(u,s),ŝ(u,y)suchthate(d(s,ŝ)) D Analog/digital hybrid source channel interface U= :uncodedtransmission U=(Ŝ,X) p(ŝ s)p(x):separatesourceandchannelcoding Beaten? (Shamai, Verdú, and Zamir 1998, Mittal and Phamdo 2002, Tinguely and Lapidoth 2006, Caire and Narayanan 2007, Kochman, Khina, Erez, and Zamir 2009, Tian, Diggavi, and Shamai 2010) 7/21
28 Hybrid Coding S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Sufficient condition: I(U;S)<I(U;Y) forsomep(u s), x(u,s),ŝ(u,y)suchthate(d(s,ŝ)) D Analog/digital hybrid source channel interface U= :uncodedtransmission U=(Ŝ,X) p(ŝ s)p(x):separatesourceandchannelcoding Beaten? (Shamai, Verdú, and Zamir 1998, Mittal and Phamdo 2002, Tinguely and Lapidoth 2006, Caire and Narayanan 2007, Kochman, Khina, Erez, and Zamir 2009, Tian, Diggavi, and Shamai 2010) 7/21
29 Proof of Achievability S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder 8/21
30 Proof of Achievability S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Random codebook generation 2 nr sequences u n (m) n i=1 p U(u i ) form [1 2 nr ] 8/21
31 Proof of Achievability S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Random codebook generation 2 nr sequences u n (m) n i=1 p U(u i ) form [1 2 nr ] Joint typicality encoding Findanindexmsuchthat(u n (m),s n ) T (n) є andtransmit x i = x(u i (m),s i ): 8/21
32 Proof of Achievability S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Random codebook generation 2 nr sequences u n (m) n i=1 p U(u i ) form [1 2 nr ] Joint typicality encoding Findanindexmsuchthat(u n (m),s n ) T (n) є andtransmit x i = x(u i (m),s i ): successfulw.h.p.ifr>i(u;s) 8/21
33 Proof of Achievability S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Random codebook generation 2 nr sequences u n (m) n i=1 p U(u i ) form [1 2 nr ] Joint typicality encoding Findanindexmsuchthat(u n (m),s n ) T (n) є andtransmit x i = x(u i (m),s i ): successfulw.h.p.ifr>i(u;s) Joint typicality decoding Findtheuniqueindex ˆmsuchthat(u n ( ˆm),y n ) T (n) є ŝ i = ŝ(u i ( ˆm),y i ): and reconstruct 8/21
34 Proof of Achievability S n Source U n (M) encoder X n x(u, s) p(y x) Channel U n ( ˆM) Ŝ n ŝ(u, y) decoder Random codebook generation 2 nr sequences u n (m) n i=1 p U(u i ) form [1 2 nr ] Joint typicality encoding Findanindexmsuchthat(u n (m),s n ) T (n) є andtransmit x i = x(u i (m),s i ): successfulw.h.p.ifr>i(u;s) Joint typicality decoding Findtheuniqueindex ˆmsuchthat(u n ( ˆm),y n ) T (n) є ŝ i = ŝ(u i ( ˆm),y i ): successfulw.h.p.ifr<i(u;y) and reconstruct 8/21
35 Correlated Sources over a MAC S1 n S2 n Source encoder 1 Source encoder 2 U1(M n 1) x 1(u 1,s 1) U2(M n 2) x 2(u 2,s 2) X n 1 X n 2 p(y x 1,x 2) Channel decoder U1( n ˆM 1) ŝ 1(u 1,u 2,y) U2( n ˆM 2) ŝ 2(u 1,u 2,y) Ŝ n 1 Ŝ n 2 Hybrid coding Berger Tung source coding + MAC coding 9/21
36 Correlated Sources over a MAC S1 n S2 n Source encoder 1 Source encoder 2 U1(M n 1) x 1(u 1,s 1) U2(M n 2) x 2(u 2,s 2) X n 1 X n 2 p(y x 1,x 2) Channel decoder U1( n ˆM 1) ŝ 1(u 1,u 2,y) U2( n ˆM 2) ŝ 2(u 1,u 2,y) Ŝ n 1 Ŝ n 2 Hybrid coding Berger Tung source coding + MAC coding R 1 > I(U 1 ;S 1 ), R 2 > I(U 2 ;S 2 ) 9/21
37 Correlated Sources over a MAC S1 n S2 n Source encoder 1 Source encoder 2 U1(M n 1) x 1(u 1,s 1) U2(M n 2) x 2(u 2,s 2) X n 1 X n 2 p(y x 1,x 2) Channel decoder U1( n ˆM 1) ŝ 1(u 1,u 2,y) U2( n ˆM 2) ŝ 2(u 1,u 2,y) Ŝ n 1 Ŝ n 2 Hybrid coding Berger Tung source coding + MAC coding R R 1 > I(U 1 ;S 1 ), 1 < I(U 1 ;Y,U 2 ), R R 2 > I(U 2 ;S 2 ) 2 < I(U 2 ;Y,U 1 ), R 1 +R 2 < I(U 1,U 2 ;Y)+I(U 1 ;U 2 ) 9/21
38 Correlated Sources over a MAC S1 n S2 n Source encoder 1 Source encoder 2 U1(M n 1) x 1(u 1,s 1) U2(M n 2) x 2(u 2,s 2) X n 1 X n 2 p(y x 1,x 2) Channel decoder U1( n ˆM 1) ŝ 1(u 1,u 2,y) U2( n ˆM 2) ŝ 2(u 1,u 2,y) Ŝ n 1 Ŝ n 2 Hybrid coding Berger Tung source coding + MAC coding I(U 1 ;S 1 Q)<I(U 1 ;Y,U 2 Q), I(U 2 ;S 2 Q)<I(U 2 ;Y,U 1 Q), I(U 1 ;S 1 Q)+I(U 2 ;S 2 Q)<I(U 1,U 2 ;Y Q)+I(U 1 ;U 2 Q) forsomep(q)p(u 1 s 1,q)p(u 2 s 2,q), x j (u j,s j,q),ŝ j (u 1,u 2,y,q)such thate(d j (S j,ŝ j )) D j, j=1,2 10/21
39 Correlated Sources over a MAC S1 n S2 n Source encoder 1 Source encoder 2 U1(M n 1) x 1(u 1,s 1) U2(M n 2) x 2(u 2,s 2) X n 1 X n 2 p(y x 1,x 2) Channel decoder U1( n ˆM 1) ŝ 1(u 1,u 2,y) U2( n ˆM 2) ŝ 2(u 1,u 2,y) Ŝ n 1 Ŝ n 2 Hybrid coding Berger Tung source coding + MAC coding 11/21
40 Correlated Sources over a MAC S1 n S2 n Source encoder 1 Source encoder 2 U1(M n 1) x 1(u 1,s 1) U2(M n 2) x 2(u 2,s 2) X n 1 X n 2 p(y x 1,x 2) Channel decoder U1( n ˆM 1) ŝ 1(u 1,u 2,y) U2( n ˆM 2) ŝ 2(u 1,u 2,y) Ŝ n 1 Ŝ n 2 Hybrid coding Berger Tung source coding + MAC coding Special cases (Ŝ 1,Ŝ 2 )=(S 1,S 2 ):losslesscoding(cover,elgamal,andsalehi1980) 11/21
41 Correlated Sources over a MAC S1 n S2 n Source encoder 1 Source encoder 2 U1(M n 1) x 1(u 1,s 1) U2(M n 2) x 2(u 2,s 2) X n 1 X n 2 p(y x 1,x 2) Channel decoder U1( n ˆM 1) ŝ 1(u 1,u 2,y) U2( n ˆM 2) ŝ 2(u 1,u 2,y) Ŝ n 1 Ŝ n 2 Hybrid coding Berger Tung source coding + MAC coding Special cases (Ŝ 1,Ŝ 2 )=(S 1,S 2 ):losslesscoding(cover,elgamal,andsalehi1980) Y=(X 1,X 2 ): noiselesschannel(berger1978,tung1978) 11/21
42 Correlated Sources over a MAC S1 n S2 n Source encoder 1 Source encoder 2 U1(M n 1) x 1(u 1,s 1) U2(M n 2) x 2(u 2,s 2) X n 1 X n 2 p(y x 1,x 2) Channel decoder U1( n ˆM 1) ŝ 1(u 1,u 2,y) U2( n ˆM 2) ŝ 2(u 1,u 2,y) Ŝ n 1 Ŝ n 2 Hybrid coding Berger Tung source coding + MAC coding Special cases (Ŝ 1,Ŝ 2 )=(S 1,S 2 ):losslesscoding(cover,elgamal,andsalehi1980) Y=(X 1,X 2 ): noiselesschannel(berger1978,tung1978) Gaussian(S 1,S 2 )andgaussianmac(tinguelyandlapidoth2006) 11/21
43 Correlated Sources over a MAC S1 n S2 n Source encoder 1 Source encoder 2 U1(M n 1) x 1(u 1,s 1) U2(M n 2) x 2(u 2,s 2) X n 1 X n 2 p(y x 1,x 2) Channel decoder U1( n ˆM 1) ŝ 1(u 1,u 2,y) U2( n ˆM 2) ŝ 2(u 1,u 2,y) Ŝ n 1 Ŝ n 2 Hybrid coding Berger Tung source coding + MAC coding Special cases (Ŝ 1,Ŝ 2 )=(S 1,S 2 ):losslesscoding(cover,elgamal,andsalehi1980) Y=(X 1,X 2 ): noiselesschannel(berger1978,tung1978) Gaussian(S 1,S 2 )andgaussianmac(tinguelyandlapidoth2006) Common part: Kaspi Berger coding + Slepian Wolf MAC coding 11/21
44 2-Sender 2-Receiver Channel S1 n S2 n Encoder 1 Encoder 2 X1 n X2 n p(y 1,y 2 x 1,x 2) 1 2 Decoder 1 Decoder 2 Ŝ n 11,Ŝ n 21 Ŝ n 12,Ŝ n 22 12/21
45 2-Sender 2-Receiver Channel S1 n S2 n Encoder 1 Encoder 2 X1 n X2 n p(y 1,y 2 x 1,x 2) 1 2 Decoder 1 Decoder 2 Ŝ n 11,Ŝ n 21 Ŝ n 12,Ŝ n 22 Hybrid coding 12/21
46 2-Sender 2-Receiver Channel S n 1 S n 2 Encoder 1 Encoder 2 X n 1 X n 2 p(y 1,y 2 x 1,x 2) 1 2 Decoder 1 Decoder 2 Ŝ n 11,Ŝ n 21 Ŝ n 12,Ŝ n 22 Hybrid coding Conceptually simple yet performs very well 12/21
47 2-Sender 2-Receiver Channel S n 1 S n 2 Encoder 1 Encoder 2 X n 1 X n 2 p(y 1,y 2 x 1,x 2) 1 2 Decoder 1 Decoder 2 Ŝ n 11,Ŝ n 21 Ŝ n 12,Ŝ n 22 Hybrid coding Conceptually simple yet performs very well PaoloMinero stalkonmonday10:05am(rightbeforedavidtse) 12/21
48 Diamond Network M Encoder X n 1 2 p(y 2,y 3 x 1) p(y 4 x 2,x 3) Yn 4 3 Relay 2 Relay 3 X n 2 X n 3 Decoder ˆM Existing coding schemes Decode forward(digital-to-digital interface) 13/21
49 Diamond Network M Encoder X n 1 2 p(y 2,y 3 x 1) p(y 4 x 2,x 3) Yn 4 3 Relay 2 Relay 3 X n 2 X n 3 Decoder ˆM Existing coding schemes Decode forward(digital-to-digital interface) Amplify forward(analog-to-analog interface) 13/21
50 Diamond Network M Encoder X n 1 2 p(y 2,y 3 x 1) p(y 4 x 2,x 3) Yn 4 3 Relay 2 Relay 3 X n 2 X n 3 Decoder ˆM Existing coding schemes Decode forward(digital-to-digital interface) Amplify forward(analog-to-analog interface) Noisy network coding(analog-to-digital interface) 13/21
51 Diamond Network M Encoder X n 1 2 p(y 2,y 3 x 1) p(y 4 x 2,x 3) Yn 4 3 Relay 2 Relay 3 X n 2 X n 3 Decoder ˆM Existing coding schemes Decode forward(digital-to-digital interface) Amplify forward(analog-to-analog interface) Noisy network coding(analog-to-digital interface) Question Can we do better than these coding schemes? 13/21
52 Diamond Network M Encoder X n 1 2 p(y 2,y 3 x 1) p(y 4 x 2,x 3) Yn 4 3 Relay 2 Relay 3 X n 2 X n 3 Decoder ˆM Answer Hybrid coding(analog-to-[analog/digital] interface) 14/21
53 Diamond Network M Encoder X n 1 2 p(y 2,y 3 x 1) p(y 4 x 2,x 3) Yn 4 3 Relay 2 Relay 3 X n 2 X n 3 Decoder ˆM Answer Hybrid coding(analog-to-[analog/digital] interface) Yj n Source U n j(m j ) encoder x j (u j,y j ) X n j 14/21
54 Diamond Network M Encoder X n 1 2 p(y 2,y 3 x 1) p(y 4 x 2,x 3) Yn 4 3 Relay 2 Relay 3 X n 2 X n 3 Decoder ˆM Answer Hybrid coding(analog-to-[analog/digital] interface) Yj n Source U n j(m j ) encoder x j (u j,y j ) X n j Naturally combines noisy network coding and amplify forward 14/21
55 Example 1: Deterministic Diamond Network M Encoder X n 1 2 (y 2,y 3)(x 1) y 4(x 2,x 3) 3 Relay 2 Relay 3 X n 2 X n 3 4 Decoder ˆM 15/21
56 Example 1: Deterministic Diamond Network M Encoder X n 1 2 (y 2,y 3)(x 1) y 4(x 2,x 3) 3 Relay 2 Relay 3 X n 2 X n 3 4 Decoder ˆM Cutset bound C max p(x 1,x 2,x 3 ) min{h(y 2,Y 3 ), H(Y 2 )+H(Y 4 X 3 ), H(Y 3 )+H(Y 4 X 2 ), H(Y 4 )} 15/21
57 Example 1: Deterministic Diamond Network M Encoder X n 1 2 (y 2,y 3)(x 1) y 4(x 2,x 3) 3 Relay 2 Relay 3 X n 2 X n 3 4 Decoder ˆM Cutset bound C max p(x 1,x 2,x 3 ) min{h(y 2,Y 3 ), H(Y 2 )+H(Y 4 X 3 ), H(Y 3 )+H(Y 4 X 2 ), H(Y 4 )} General lower bound(avestimehr, Diggavi, and Tse 2007) C max p(x 1 )p(x 2 )p(x 3 ) min{h(y 2,Y 3 ), H(Y 2 )+H(Y 4 X 3 ), H(Y 3 )+H(Y 4 X 2 ), H(Y 4 )} 15/21
58 Example 1: Deterministic Diamond Network M Encoder X n 1 2 (y 2,y 3)(x 1) y 4(x 2,x 3) 3 Relay 2 Relay 3 X n 2 X n 3 4 Decoder ˆM Cutset bound C max p(x 1,x 2,x 3 ) min{h(y 2,Y 3 ), H(Y 2 )+H(Y 4 X 3 ), H(Y 3 )+H(Y 4 X 2 ), H(Y 4 )} General lower bound(avestimehr, Diggavi, and Tse 2007) C max p(x 1 )p(x 2 )p(x 3 ) min{h(y 2,Y 3 ), H(Y 2 )+H(Y 4 X 3 ), H(Y 3 )+H(Y 4 X 2 ), H(Y 4 )} Hybrid coding lower bound C max p(x 1 )p(x 2 y 2 )p(x 3 y 3 ) min{h(y 2,Y 3 ), H(Y 2 )+H(Y 4 X 3 ), H(Y 3 )+H(Y 4 X 2 ), H(Y 4 )} 15/21
59 Example 1: Deterministic Diamond Network M Encoder X n 1 2 (y 2,y 3)(x 1) y 4(x 2,x 3) 3 Relay 2 Relay 3 X n 2 X n 3 4 Decoder ˆM BlackwellBC(y 2 (x 1 ),y 3 (x 1 )) BinaryerasureMAC y 4 (x 2,x 3 ) X Y 2 Y 3 Y 4 = X 2 +X 3 X 2,X 3 {0,1}, Y 4 {0,1,2} 16/21
60 Example 1: Deterministic Diamond Network M Encoder X n 1 2 (y 2,y 3)(x 1) y 4(x 2,x 3) 3 Relay 2 Relay 3 X n 2 X n 3 4 Decoder ˆM BlackwellBC(y 2 (x 1 ),y 3 (x 1 )) BinaryerasureMAC y 4 (x 2,x 3 ) X Y 2 Y 3 Y 4 = X 2 +X 3 X 2,X 3 {0,1}, Y 4 {0,1,2} Generallowerbound=1.5<log3=Hybridcodinglowerbound 16/21
61 Example 2: Gaussian Diamond Network Z 2 X 1 g 21 Y 2 X 2 g 42 Z 4 Y 4 g 31 Y 3 X 3 g 43 Z 3 17/21
62 Example 2: Gaussian Diamond Network Z 2 g Y 2 X 2 1 Z 4 X 1 Y 4 1 Y 3 X 3 g Z 3 17/21
63 AFvs.NNCvs.HybridCoding g 18/21
64 AFvs.NNCvs.HybridCoding g 18/21
65 Example 3: Gaussian Two-Way Relay Channel Z 3 g 31 g 32 X 1 X 2 Y 3 X 3 Y 1 Y g 2 13 g 23 Z 1 Z 2 19/21
66 Example 3: Gaussian Two-Way Relay Channel Z 3 r 3/2 (1 r) 3/2 X 1 X 2 Y 3 X 3 Y 1 Y 2 r 3/2 (1 r) 3/2 Z 1 Z 2 r /21
67 Hybrid Coding vs. Other Coding Schemes R CS R AF R NNC R DF r 20/21
68 Hybrid Coding vs. Other Coding Schemes R CS R HC R AF R NNC R DF r 20/21
69 Concluding Remarks Hybrid coding 21/21
70 Concluding Remarks Hybrid coding Versatile interface for source channel coding and relaying 21/21
71 Concluding Remarks Hybrid coding Versatile interface for source channel coding and relaying Joint source channel coding can be simple(and fun too!) 21/21
72 Concluding Remarks Hybrid coding Versatile interface for source channel coding and relaying Joint source channel coding can be simple(and fun too!) Hybrid coding > amplify forward + noisy network coding 21/21
73 Concluding Remarks Hybrid coding Versatile interface for source channel coding and relaying Joint source channel coding can be simple(and fun too!) Hybrid coding > amplify forward + noisy network coding Hybrid coding + structured coding > decode forward 21/21
74 Concluding Remarks Hybrid coding Versatile interface for source channel coding and relaying Joint source channel coding can be simple(and fun too!) Hybrid coding > amplify forward + noisy network coding Hybrid coding + structured coding > decode forward Back to reality 21/21
75 Concluding Remarks Hybrid coding Versatile interface for source channel coding and relaying Joint source channel coding can be simple(and fun too!) Hybrid coding > amplify forward + noisy network coding Hybrid coding + structured coding > decode forward Back to reality Barron and Oppenheim(2002): US Patent 6,441,764 21/21
76 Concluding Remarks Hybrid coding Versatile interface for source channel coding and relaying Joint source channel coding can be simple(and fun too!) Hybrid coding > amplify forward + noisy network coding Hybrid coding + structured coding > decode forward Back to reality Barron and Oppenheim(2002): US Patent 6,441,764 Meir Feder: Amimon high-definition wireless audio-video modem 21/21
77 Concluding Remarks Hybrid coding Versatile interface for source channel coding and relaying Joint source channel coding can be simple(and fun too!) Hybrid coding > amplify forward + noisy network coding Hybrid coding + structured coding > decode forward Back to reality Barron and Oppenheim(2002): US Patent 6,441,764 Meir Feder: Amimon high-definition wireless audio-video modem Any good code for both(source) encoding and(channel) decoding? 21/21
THE fundamental architecture of most of today s
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 4, APRIL 2015 1509 A Unified Approach to Hybrid Coding Paolo Minero, Member, IEEE, Sung Hoon Lim, Member, IEEE, and Young-Han Kim, Fellow, IEEE Abstract
More informationRematch and Forward: Joint Source-Channel Coding for Communications
Background ρ = 1 Colored Problem Extensions Rematch and Forward: Joint Source-Channel Coding for Communications Anatoly Khina Joint work with: Yuval Kochman, Uri Erez, Ram Zamir Dept. EE - Systems, Tel
More informationPhysical-Layer MIMO Relaying
Model Gaussian SISO MIMO Gauss.-BC General. Physical-Layer MIMO Relaying Anatoly Khina, Tel Aviv University Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv University August 5, 2011 Model Gaussian
More informationOn Scalable Coding in the Presence of Decoder Side Information
On Scalable Coding in the Presence of Decoder Side Information Emrah Akyol, Urbashi Mitra Dep. of Electrical Eng. USC, CA, US Email: {eakyol, ubli}@usc.edu Ertem Tuncel Dep. of Electrical Eng. UC Riverside,
More informationGeneralized Writing on Dirty Paper
Generalized Writing on Dirty Paper Aaron S. Cohen acohen@mit.edu MIT, 36-689 77 Massachusetts Ave. Cambridge, MA 02139-4307 Amos Lapidoth lapidoth@isi.ee.ethz.ch ETF E107 ETH-Zentrum CH-8092 Zürich, Switzerland
More informationRematch-and-Forward: Joint Source Channel Coding for Parallel Relaying with Spectral Mismatch
Rematch-and-Forward: Joint Source Channel Coding for Parallel Relaying with Spectral Mismatch Yuval Kochman, Anatoly Khina, Uri Erez, and Ram Zamir Abstract The Gaussian parallel relay network, introduced
More informationSparse Regression Codes for Multi-terminal Source and Channel Coding
Sparse Regression Codes for Multi-terminal Source and Channel Coding Ramji Venkataramanan Yale University Sekhar Tatikonda Allerton 2012 1 / 20 Compression with Side-Information X Encoder Rate R Decoder
More informationUCSD ECE 255C Handout #12 Prof. Young-Han Kim Tuesday, February 28, Solutions to Take-Home Midterm (Prepared by Pinar Sen)
UCSD ECE 255C Handout #12 Prof. Young-Han Kim Tuesday, February 28, 2017 Solutions to Take-Home Midterm (Prepared by Pinar Sen) 1. (30 points) Erasure broadcast channel. Let p(y 1,y 2 x) be a discrete
More informationMultiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets
Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,
More informationSecond-Order Asymptotics for the Gaussian MAC with Degraded Message Sets
Second-Order Asymptotics for the Gaussian MAC with Degraded Message Sets Jonathan Scarlett and Vincent Y. F. Tan Department of Engineering, University of Cambridge Electrical and Computer Engineering,
More informationOn Multiple User Channels with State Information at the Transmitters
On Multiple User Channels with State Information at the Transmitters Styrmir Sigurjónsson and Young-Han Kim* Information Systems Laboratory Stanford University Stanford, CA 94305, USA Email: {styrmir,yhk}@stanford.edu
More informationSimultaneous Nonunique Decoding Is Rate-Optimal
Fiftieth Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 1-5, 2012 Simultaneous Nonunique Decoding Is Rate-Optimal Bernd Bandemer University of California, San Diego La Jolla, CA
More informationCapacity Theorems for Relay Channels
Capacity Theorems for Relay Channels Abbas El Gamal Department of Electrical Engineering Stanford University April, 2006 MSRI-06 Relay Channel Discrete-memoryless relay channel [vm 7] Relay Encoder Y n
More informationEnergy Efficient Estimation of Gaussian Sources Over Inhomogeneous Gaussian MAC Channels
Energy Efficient Estimation of Gaussian Sources Over Inhomogeneous Gaussian MAC Channels Shuangqing Wei, Ragopal Kannan, Sitharama Iyengar and Nageswara S. Rao Abstract In this paper, we first provide
More informationCompetition and Cooperation in Multiuser Communication Environments
Competition and Cooperation in Multiuser Communication Environments Wei Yu Electrical Engineering Department Stanford University April, 2002 Wei Yu, Stanford University Introduction A multiuser communication
More informationOn Source-Channel Communication in Networks
On Source-Channel Communication in Networks Michael Gastpar Department of EECS University of California, Berkeley gastpar@eecs.berkeley.edu DIMACS: March 17, 2003. Outline 1. Source-Channel Communication
More informationDistributed Lossless Compression. Distributed lossless compression system
Lecture #3 Distributed Lossless Compression (Reading: NIT 10.1 10.5, 4.4) Distributed lossless source coding Lossless source coding via random binning Time Sharing Achievability proof of the Slepian Wolf
More informationApproximate Capacity of the MIMO Relay Channel
04 IEEE International Symposium on Information Theory Approximate Capacity of the MIMO Relay Channel Xianglan Jin Department of Electrical and Computer Engineering Pusan National University Busan 609-735
More informationEE 4TM4: Digital Communications II. Channel Capacity
EE 4TM4: Digital Communications II 1 Channel Capacity I. CHANNEL CODING THEOREM Definition 1: A rater is said to be achievable if there exists a sequence of(2 nr,n) codes such thatlim n P (n) e (C) = 0.
More informationDuality Between Channel Capacity and Rate Distortion With Two-Sided State Information
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 6, JUNE 2002 1629 Duality Between Channel Capacity Rate Distortion With Two-Sided State Information Thomas M. Cover, Fellow, IEEE, Mung Chiang, Student
More informationLecture 6 I. CHANNEL CODING. X n (m) P Y X
6- Introduction to Information Theory Lecture 6 Lecturer: Haim Permuter Scribe: Yoav Eisenberg and Yakov Miron I. CHANNEL CODING We consider the following channel coding problem: m = {,2,..,2 nr} Encoder
More informationSecret Key Agreement Using Asymmetry in Channel State Knowledge
Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,
More informationFeedback Capacity of the Gaussian Interference Channel to Within Bits: the Symmetric Case
1 arxiv:0901.3580v1 [cs.it] 23 Jan 2009 Feedback Capacity of the Gaussian Interference Channel to Within 1.7075 Bits: the Symmetric Case Changho Suh and David Tse Wireless Foundations in the Department
More informationInformation Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results
Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel
More informationInformation Masking and Amplification: The Source Coding Setting
202 IEEE International Symposium on Information Theory Proceedings Information Masking and Amplification: The Source Coding Setting Thomas A. Courtade Department of Electrical Engineering University of
More informationThe Role of Directed Information in Network Capacity
The Role of Directed Information in Network Capacity Sudeep Kamath 1 and Young-Han Kim 2 1 Department of Electrical Engineering Princeton University 2 Department of Electrical and Computer Engineering
More informationImproving on the Cutset Bound via a Geometric Analysis of Typical Sets
Imroving on the Cutset Bound via a Geometric Analysis of Tyical Sets Ayfer Özgür Stanford University CUHK, May 28, 2016 Joint work with Xiugang Wu (Stanford). Ayfer Özgür (Stanford) March 16 1 / 33 Gaussian
More informationIET Commun., 2009, Vol. 3, Iss. 4, pp doi: /iet-com & The Institution of Engineering and Technology 2009
Published in IET Communications Received on 10th March 2008 Revised on 10th July 2008 ISSN 1751-8628 Comprehensive partial decoding approach for two-level relay networks L. Ghabeli M.R. Aref Information
More informationThe Sensor Reachback Problem
Submitted to the IEEE Trans. on Information Theory, November 2003. 1 The Sensor Reachback Problem João Barros Sergio D. Servetto Abstract We consider the problem of reachback communication in sensor networks.
More informationUCSD ECE 255C Handout #14 Prof. Young-Han Kim Thursday, March 9, Solutions to Homework Set #5
UCSD ECE 255C Handout #14 Prof. Young-Han Kim Thursday, March 9, 2017 Solutions to Homework Set #5 3.18 Bounds on the quadratic rate distortion function. Recall that R(D) = inf F(ˆx x):e(x ˆX)2 DI(X; ˆX).
More informationEquivalence for Networks with Adversarial State
Equivalence for Networks with Adversarial State Oliver Kosut Department of Electrical, Computer and Energy Engineering Arizona State University Tempe, AZ 85287 Email: okosut@asu.edu Jörg Kliewer Department
More informationOn Scalable Source Coding for Multiple Decoders with Side Information
On Scalable Source Coding for Multiple Decoders with Side Information Chao Tian School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS), EPFL, Lausanne,
More informationPaul Cuff, Han-I Su, and Abbas EI Gamal Department of Electrical Engineering Stanford University {cuff, hanisu,
Cascade Multiterminal Source Coding Paul Cuff, Han-I Su, and Abbas EI Gamal Department of Electrical Engineering Stanford University E-mail: {cuff, hanisu, abbas}@stanford.edu Abstract-We investigate distributed
More informationSimultaneous SDR Optimality via a Joint Matrix Decomp.
Simultaneous SDR Optimality via a Joint Matrix Decomposition Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv Uni. May 26, 2011 Model: Source Multicasting over MIMO Channels z 1 H 1 y 1 Rx1 ŝ 1 s
More informationJoint Source-Channel Coding for the Multiple-Access Relay Channel
Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il
More informationSINCE van der Meulen [1] studied the 3-node relay channel
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 63, NO. 7, JULY 2017 4103 Distributed Decode Forward for Relay Networks Sung Hoon Lim, Member, IEEE, KwangTaikKim,Member, IEEE, and Young-Han Kim, Fellow,
More informationInteractive Hypothesis Testing with Communication Constraints
Fiftieth Annual Allerton Conference Allerton House, UIUC, Illinois, USA October - 5, 22 Interactive Hypothesis Testing with Communication Constraints Yu Xiang and Young-Han Kim Department of Electrical
More informationOn the Duality between Multiple-Access Codes and Computation Codes
On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch
More informationSource-Channel Coding Theorems for the Multiple-Access Relay Channel
Source-Channel Coding Theorems for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora, and Deniz Gündüz Abstract We study reliable transmission of arbitrarily correlated sources over multiple-access
More informationTHE relay channel, whereby point-to-point communication
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 63, NO., FEBRUARY 017 1167 The Approximate Capacity of the MIMO Relay Channel Xianglan Jin, Member, IEEE, Young-Han Kim, Fellow, IEEE Abstract Capacity bounds
More informationA Comparison of Superposition Coding Schemes
A Comparison of Superposition Coding Schemes Lele Wang, Eren Şaşoğlu, Bernd Bandemer, and Young-Han Kim Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA
More informationUncoded transmission is exactly optimal for a simple Gaussian sensor network
Uncoded transmission is exactly optimal for a simple Gaussian sensor network Michael Gastpar University of California, Berkeley ireless Foundations Center, ept of EEC, Berkeley, CA 9470-770, UA Email:
More informationStrong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach
Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Silas Fong (Joint work with Vincent Tan) Department of Electrical & Computer Engineering National University
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationInformation Theory for Wireless Communications. Lecture 10 Discrete Memoryless Multiple Access Channel (DM-MAC): The Converse Theorem
Information Theory for Wireless Communications. Lecture 0 Discrete Memoryless Multiple Access Channel (DM-MAC: The Converse Theorem Instructor: Dr. Saif Khan Mohammed Scribe: Antonios Pitarokoilis I. THE
More informationThe Duality Between Information Embedding and Source Coding With Side Information and Some Applications
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 5, MAY 2003 1159 The Duality Between Information Embedding and Source Coding With Side Information and Some Applications Richard J. Barron, Member,
More informationEfficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel
Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca
More informationGaussian Relay Channel Capacity to Within a Fixed Number of Bits
Gaussian Relay Channel Capacity to Within a Fixed Number of Bits Woohyuk Chang, Sae-Young Chung, and Yong H. Lee arxiv:.565v [cs.it] 23 Nov 2 Abstract In this paper, we show that the capacity of the threenode
More informationOn Perceptual Audio Compression with Side Information at the Decoder
On Perceptual Audio Compression with Side Information at the Decoder Adel Zahedi, Jan Østergaard, Søren Holdt Jensen, Patrick Naylor, and Søren Bech Department of Electronic Systems Aalborg University,
More informationBroadcasting over Fading Channelswith Mixed Delay Constraints
Broadcasting over Fading Channels with Mixed Delay Constraints Shlomo Shamai (Shitz) Department of Electrical Engineering, Technion - Israel Institute of Technology Joint work with Kfir M. Cohen and Avi
More informationMinimum Expected Distortion in Gaussian Source Coding with Uncertain Side Information
Minimum Expected Distortion in Gaussian Source Coding with Uncertain Side Information Chris T. K. Ng, Chao Tian, Andrea J. Goldsmith and Shlomo Shamai (Shitz) Dept. of Electrical Engineering, Stanford
More informationSecrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View
Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference
More informationAnatoly Khina. Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT
Network Modulation: Transmission Technique for MIMO Networks Anatoly Khina Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT ACC Workshop, Feder Family Award
More informationThe Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference
The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference Soheyl Gherekhloo, Anas Chaaban, and Aydin Sezgin Chair of Communication Systems RUB, Germany Email: {soheyl.gherekhloo,
More informationSecret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper
Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Mohsen Bahrami, Ali Bereyhi, Mahtab Mirmohseni and Mohammad Reza Aref Information Systems and Security
More informationLecture 10: Broadcast Channel and Superposition Coding
Lecture 10: Broadcast Channel and Superposition Coding Scribed by: Zhe Yao 1 Broadcast channel M 0M 1M P{y 1 y x} M M 01 1 M M 0 The capacity of the broadcast channel depends only on the marginal conditional
More informationECE Information theory Final
ECE 776 - Information theory Final Q1 (1 point) We would like to compress a Gaussian source with zero mean and variance 1 We consider two strategies In the first, we quantize with a step size so that the
More informationAchieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel
Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of
More informationSide-information Scalable Source Coding
Side-information Scalable Source Coding Chao Tian, Member, IEEE, Suhas N. Diggavi, Member, IEEE Abstract The problem of side-information scalable (SI-scalable) source coding is considered in this work,
More informationRemote Source Coding with Two-Sided Information
Remote Source Coding with Two-Sided Information Basak Guler Ebrahim MolavianJazi Aylin Yener Wireless Communications and Networking Laboratory Department of Electrical Engineering The Pennsylvania State
More informationShannon s noisy-channel theorem
Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for
More informationInteractions of Information Theory and Estimation in Single- and Multi-user Communications
Interactions of Information Theory and Estimation in Single- and Multi-user Communications Dongning Guo Department of Electrical Engineering Princeton University March 8, 2004 p 1 Dongning Guo Communications
More informationSource-Channel Coding Theorems for the. Multiple-Access Relay Channel
Submitted to the IEEE Transactions on Information Theory, May 2011. Source-Channel Coding Theorems for the 1 Multiple-Access Relay Channel Yonathan Murin, Ron Dabora, Deniz Gündüz Dept. of Electrical and
More informationLecture 22: Final Review
Lecture 22: Final Review Nuts and bolts Fundamental questions and limits Tools Practical algorithms Future topics Dr Yao Xie, ECE587, Information Theory, Duke University Basics Dr Yao Xie, ECE587, Information
More informationTwo Applications of the Gaussian Poincaré Inequality in the Shannon Theory
Two Applications of the Gaussian Poincaré Inequality in the Shannon Theory Vincent Y. F. Tan (Joint work with Silas L. Fong) National University of Singapore (NUS) 2016 International Zurich Seminar on
More informationBinary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case
Binary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case Andrei Sechelea*, Samuel Cheng, Adrian Munteanu*, and Nikos Deligiannis* *Department of Electronics and Informatics,
More information9 Forward-backward algorithm, sum-product on factor graphs
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 9 Forward-backward algorithm, sum-product on factor graphs The previous
More informationKeyless authentication in the presence of a simultaneously transmitting adversary
Keyless authentication in the presence of a simultaneously transmitting adversary Eric Graves Army Research Lab Adelphi MD 20783 U.S.A. ericsgra@ufl.edu Paul Yu Army Research Lab Adelphi MD 20783 U.S.A.
More informationGraph-based Codes for Quantize-Map-and-Forward Relaying
20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,
More informationSOURCE CODING WITH SIDE INFORMATION AT THE DECODER (WYNER-ZIV CODING) FEB 13, 2003
SOURCE CODING WITH SIDE INFORMATION AT THE DECODER (WYNER-ZIV CODING) FEB 13, 2003 SLEPIAN-WOLF RESULT { X i} RATE R x ENCODER 1 DECODER X i V i {, } { V i} ENCODER 0 RATE R v Problem: Determine R, the
More informationX 1 : X Table 1: Y = X X 2
ECE 534: Elements of Information Theory, Fall 200 Homework 3 Solutions (ALL DUE to Kenneth S. Palacio Baus) December, 200. Problem 5.20. Multiple access (a) Find the capacity region for the multiple-access
More informationEE5139R: Problem Set 7 Assigned: 30/09/15, Due: 07/10/15
EE5139R: Problem Set 7 Assigned: 30/09/15, Due: 07/10/15 1. Cascade of Binary Symmetric Channels The conditional probability distribution py x for each of the BSCs may be expressed by the transition probability
More informationNETWORK INFORMATION THEORY
NETWORK INFORMATION THEORY OMISSIONS TO ALL PRINTINGS p., Bibliographic Notes, line should read: The capacity region of the deterministic broadcast channel was established independently by Marton( a) and
More informationOn the Capacity of the Interference Channel with a Relay
On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due
More informationEE/Stat 376B Handout #5 Network Information Theory October, 14, Homework Set #2 Solutions
EE/Stat 376B Handout #5 Network Information Theory October, 14, 014 1. Problem.4 parts (b) and (c). Homework Set # Solutions (b) Consider h(x + Y ) h(x + Y Y ) = h(x Y ) = h(x). (c) Let ay = Y 1 + Y, where
More informationCapacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel
Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Jun Chen Dept. of Electrical and Computer Engr. McMaster University Hamilton, Ontario, Canada Chao Tian AT&T Labs-Research 80 Park
More informationMulticoding Schemes for Interference Channels
Multicoding Schemes for Interference Channels 1 Ritesh Kolte, Ayfer Özgür, Haim Permuter Abstract arxiv:1502.04273v1 [cs.it] 15 Feb 2015 The best known inner bound for the 2-user discrete memoryless interference
More informationCapacity bounds for multiple access-cognitive interference channel
Mirmohseni et al. EURASIP Journal on Wireless Communications and Networking, :5 http://jwcn.eurasipjournals.com/content///5 RESEARCH Open Access Capacity bounds for multiple access-cognitive interference
More informationSubset Universal Lossy Compression
Subset Universal Lossy Compression Or Ordentlich Tel Aviv University ordent@eng.tau.ac.il Ofer Shayevitz Tel Aviv University ofersha@eng.tau.ac.il Abstract A lossy source code C with rate R for a discrete
More informationCapacity of a Class of Semi-Deterministic Primitive Relay Channels
Capacity of a Class of Semi-Deterministic Primitive Relay Channels Ravi Tandon Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 ravit@umd.edu
More informationOn Achievability for Downlink Cloud Radio Access Networks with Base Station Cooperation
On Achievability for Downlink Cloud Radio Access Networks with Base Station Cooperation Chien-Yi Wang, Michèle Wigger, and Abdellatif Zaidi 1 Abstract arxiv:1610.09407v1 [cs.it] 8 Oct 016 This work investigates
More informationSuperposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels
Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:
More informationA Graph-based Framework for Transmission of Correlated Sources over Multiple Access Channels
A Graph-based Framework for Transmission of Correlated Sources over Multiple Access Channels S. Sandeep Pradhan a, Suhan Choi a and Kannan Ramchandran b, a {pradhanv,suhanc}@eecs.umich.edu, EECS Dept.,
More informationDistributed Hypothesis Testing Over Discrete Memoryless Channels
1 Distributed Hypothesis Testing Over Discrete Memoryless Channels Sreejith Sreekumar and Deniz Gündüz Imperial College London, UK Email: {s.sreekumar15, d.gunduz}@imperial.ac.uk Abstract A distributed
More informationFeedback Capacity of a Class of Symmetric Finite-State Markov Channels
Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Nevroz Şen, Fady Alajaji and Serdar Yüksel Department of Mathematics and Statistics Queen s University Kingston, ON K7L 3N6, Canada
More informationExchanging Third-Party Information in a Network
David J. Love 1 Bertrand M. Hochwald Kamesh Krishnamurthy 1 1 School of Electrical and Computer Engineering Purdue University Beceem Communications ITA Workshop, 007 Information Exchange Some applications
More informationA General Formula for Compound Channel Capacity
A General Formula for Compound Channel Capacity Sergey Loyka, Charalambos D. Charalambous University of Ottawa, University of Cyprus ETH Zurich (May 2015), ISIT-15 1/32 Outline 1 Introduction 2 Channel
More informationAn Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel
Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 8-3, An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel Invited Paper Bernd Bandemer and
More informationNoise-Shaped Predictive Coding for Multiple Descriptions of a Colored Gaussian Source
Noise-Shaped Predictive Coding for Multiple Descriptions of a Colored Gaussian Source Yuval Kochman, Jan Østergaard, and Ram Zamir Abstract It was recently shown that the symmetric multiple-description
More informationInformation Theory for Wireless Communications, Part II:
Information Theory for Wireless Communications, Part II: Lecture 5: Multiuser Gaussian MIMO Multiple-Access Channel Instructor: Dr Saif K Mohammed Scribe: Johannes Lindblom In this lecture, we give the
More informationReliable Computation over Multiple-Access Channels
Reliable Computation over Multiple-Access Channels Bobak Nazer and Michael Gastpar Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA, 94720-1770 {bobak,
More informationCROSS LAYER CODING SCHEMES FOR BROADCASTING AND RELAYING. A Dissertation MAKESH PRAVIN JOHN WILSON
CROSS LAYER CODING SCHEMES FOR BROADCASTING AND RELAYING A Dissertation by MAKESH PRAVIN JOHN WILSON Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements
More informationJoint Wyner-Ziv/Dirty-Paper Coding by Modulo-Lattice Modulation
1 Joint Wyner-Ziv/Dirty-Paper Coding by Modulo-Lattice Modulation Yuval Kochman and Ram Zamir Dept. Electrical Engineering - Systems, Tel Aviv University arxiv:0801.0815v3 [cs.it] 17 Dec 2008 Abstract
More informationSource and Channel Coding for Correlated Sources Over Multiuser Channels
Source and Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Elza Erkip, Andrea Goldsmith, H. Vincent Poor Abstract Source and channel coding over multiuser channels in which
More informationMixed Noisy Network Coding
Mixed Noisy Networ Coding Arash Behboodi Dept of elecommunication Systems, U Berlin 10587 Berlin, Germany Email: behboodi@tntu-berlinde Pablo Piantanida Dept of elecommunications, SUPELEC 9119 Gif-sur-Yvette,
More informationCapacity Bounds for Diamond Networks
Technische Universität München Capacity Bounds for Diamond Networks Gerhard Kramer (TUM) joint work with Shirin Saeedi Bidokhti (TUM & Stanford) DIMACS Workshop on Network Coding Rutgers University, NJ
More informationBounds on Capacity and Minimum Energy-Per-Bit for AWGN Relay Channels
Bounds on Capacity and Minimum Energy-Per-Bit for AWG Relay Channels Abbas El Gamal, Mehdi Mohseni and Sina Zahedi Information Systems Lab Department of Electrical Engineering Stanford University, Stanford,
More informationCapacity of channel with energy harvesting transmitter
IET Communications Research Article Capacity of channel with energy harvesting transmitter ISSN 75-868 Received on nd May 04 Accepted on 7th October 04 doi: 0.049/iet-com.04.0445 www.ietdl.org Hamid Ghanizade
More information(Structured) Coding for Real-Time Streaming Communication
(Structured) Coding for Real-Time Streaming Communication Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Farrokh Etezadi (Toronto),
More informationLossy Distributed Source Coding
Lossy Distributed Source Coding John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 202 Lossy Distributed Source Coding Problem X X 2 S {,...,2 R } S 2 {,...,2 R2 } Ẑ Ẑ 2 E d(z,n,
More information