Binary Dirty MAC with Common State Information

Size: px
Start display at page:

Download "Binary Dirty MAC with Common State Information"

Transcription

1 Binary Dirty MAC with Common State Information Anatoly Khina Tal Philosof Ram Zamir Uri Erez Astract The general two-user memoryless multiple-access channel, with common channel state information known to the encoders, has no single-letter solution which explicitly characterizes its capacity region. In this paper a inary dirty multipleaccess channel MAC with common interference, when the interference sequence is known to oth encoders, is considered. We determine its sum-capacity, which equals to the capacity when full-cooperation etween transmitters is allowed, contrary to the Gaussian case. We further derive an achievale rate region for this channel, y adopting the onion-peeling strategies which achieve the capacity region of the clean inary MAC. We show that the gap etween the capacity region of the clean MAC and the achievale rate region of dirty MAC stems from the loss of the point-to-point inary dirty channel relative to the corresponding clean channel. I. INTRODUCTION Consider the two-user memoryless state-dependent multiple-access channel MAC with transition and state proaility distriutions py x,x,s and ps, where s Sis known non-causally at oth encoders, ut not to the decoder. The channel inputs are x X and x X, and the channel output is y Y. The memoryless property of the channel implies that n py x, x, s = py i x i,x i,s i. i= The capacity region of this channel is still not known in general, and remains an open prolem. See, e.g., []. Interestingly, this model appears to e a ottleneck in many wireless networks, ad hoc networks and relay prolems. The MAC model in generalizes the point-to-point channel with side information SI at the transmitter considered y Gel fand and Pinsker []. Gel fand and Pinsker proved a direct coding theorem using a random inning technique, an approach widely used in the analysis of multi-terminal source and channel coding prolems [3]. They otained a general capacity expression which is given in terms of an auxiliary random variale U: C = max HU S HU Y, 3 pu,x s This work was supported in part y the U.S. - Israel Binational Science Foundation under grant 008/455. where the maximization is over all joint distriutions of the form pu, s, y, x =pspu, x spy x, s. Using this result, Costa [4] showed that in the Gaussian additive channel with known interference, the capacity is equal to that of the AWGN channel, i.e., as if the interference S were not present. Nevertheless, this does not carry on to the inary modulo-additive case inary dirty-paper channel : Y = X S Z, where X, S, Z Z and denotes addition mod XOR. The input constraint is n w Hx q, where 0 q / We shall refer to this constraint as power constraint, w H denotes Hamming weight, and n is the length of the codeword. The noise Z Bernoulliε is independent of S, X w.l.o.g. we assume ε / ; the state information interference S Bernoulli / is known non-causally to the encoder. The capacity of this dirty channel is equal to CDirty PP =uce max H q H ε, 0, 4 where H denotes the inary entropy [3] and ucre is the upper convex envelope operation with respect to q ε is held constant. The capacity of the interference-free clean channel the inary symmetric channel with a Hamming input constraint, given y CClean PP = H q ε H ε, 5 is higher than that of the dirty inary channel 4, since H q ε H q, where denotes inary convolution, defined as p p p p + p p. See [5], [6]. One approach to finding achievale rates for the MAC with common interference, is to extend the Gel fand and Pinsker result [] to the two-user case []. This extension leads to the following inner ound for the capacity region of see []: R cl conv R,R :R IU; Y V IU; S V R IV ; Y U IV ; S U R + R IU, V ; Y IU, V ; S, 6 where cl and conv are the closure and convex hull, respectively, taken over all admissile auxiliary pairs U, V satisfying:

2 W W S Enc. Enc. X X Z Y Ŵ Dec Ŵ Fig.. Dirty MAC with common state information U, X S V,X U, V X,X,S Y. Philosof et al. [7], [8] considered the douly-dirty MAC : a Gaussian additive MAC, with an additive interference which is composed of a sum of two independent Gaussian interferences, where each interference is known non-causally only to one of the encoders. The capacity region of the Gaussian dirty MAC, where the interference is known non-causally to oth transmitters inary MAC with common interference, was found y Gel fand and Pinsker [9] and rediscovered y Kim, Sutivong and Sigurjónsson [0], to e equal to the interference-free MAC channel, y applying dirty paper coding y oth users. Philosof, Zamir and Erez [] considered a inary moduloadditive version of this channel inary DMAC, depicted also in Figure : Y = X X S Z, 7 where X,X,S,Z Z. The input power constraints are n w Hx i q i, i =,, 8 where 0 q,q /. The noise Z has Bernoulliε distriution and is independent of S, X,X ; the state information S Bernoulli / is referred to as interference. The rates, R and R, of the two users are given y R i = n log W i, where W i is the set of messages of user i. In [], the capacity for two different scenarios is derived: The inary douly-dirty MAC: in this scenario S = S S, where S,S Bernoulli/ are independent and known non-causally to encoders and, respectively. The capacity region of this channel is given y the set of all rate pairs R,R satisfying: Cq,q R,R : R + R uce max [H q min H ε], where q min minq,q and the upper convex envelope operation is w.r.t. q and q. The inary MAC with a single informed user: in this scenario S is known only to user. The capacity region of this channel is given y the set of all rate pairs R,R satisfying: Cq,q cl conv R,R : R H q ε H ε R + R H q H ε. 9 Unlike in the Gaussian case, in which the common interference capacity region is the same as the interference-free region, and is achieved using stationary inputs, in the inary DMAC, we shall see that there is a loss. In this work we consider the inary MAC with common interference, depicted in Figure, where the interference S is known non-causally at oth encoders. We assume that the interference is strong S Bernoulli /. This is the worst-case interference, as any other distriution of the interference can e transformed into a uniform one y incorporating dithering at the receiver s end. We show that using the dirty-paper strategies that achieve 5 in 6, along with successive decoding of the messages onion peeling allows to achieve a rate region of the inary DMAC 7, that is equal to the inary clean MAC capacity region up to a loss which stems from the loss seen in the point-to-point case 4,5. Moreover, we show that these strategies achieve the sum-capacities of the inary clean MAC and dirty MAC with common interference, which are equal to the sum-capacities of these channels when full cooperation etween the encoders is allowed, unlike in the Gaussian MAC with common interference. To simplify the treatment we concentrate on the noiseless case, i.e., Z =0. The paper is organized as follows: We first consider the inary clean MAC in Section II and then turn to treating the inary MAC with common interference in Section III. II. CLEAN MAC In this section we consider the clean inary moduloadditive channel: Y = X X Z 0 with input constraints q,q. The capacity region of this channel contains the capacity region of the inary DMAC 7, and therefore serves as an outer ound. Furthermore, the capacity achieving strategies are useful also for the DMAC case, as is discussed in Section III. As mentioned earlier, we concentrate on the noiseless case Z =0. The inary additive model 0 is a special case of the general clean MAC channel, the capacity region of which is known to e [], [3]: C cl conv R,R : R IX ; Y X R IX ; Y X R + R IX,X ; Y, where the closure and convex hull operations are taken over all product distriutions p x p x on X X. In the Gaussian additive MAC, any point within its capacity region can e achieved using Gaussian stationary inputs. Hence the convex hull operation is superfluous see, e.g., [3]. In the inary case, however, the use of stationary inputs is not optimal and convex hull is necessary to achieve the capacity

3 region envelope. To see this, we rewrite explicitly for the inary case: C cl conv R,R :R i H X i, i =, R +R H X X, where the closure and the convex hull are taken over all admissile distriutions of the form p x p x on 0, 0,, such that the input constraints 8 are satisfied. One easily verifies that, y allowing only stationary inputs in,.i.e., relinquishing the convex hull, the sum-rate R + R cannot exceed R + R H q q, 3 which is suoptimal, as indicated y the following theorem. Theorem Sum-Rate Capacity of the Binary Clean MAC: The sum-capacity of the inary noiseless modulo-additive MAC 0 with input constraints n w Hx i q i, i =,, is: Cclean sum = H + q + q, 4 where H + q H min q, /. Proof: Direct: Using time-sharing one can divide each lock into two parts: in the first n lock samples user spends all of its power to convey his private message, while user is silent transmits zeros, whereas in the remaining n lock samples user spends all of its transmission power to convey his message, while user is silent. This leads to the sum-rate R + R = H + q + H + q, which is equal to H + q + q for = q q +q. Converse: Full cooperation etween the transmitters can only increase the sum-capacity. Full cooperation transforms the prolem into a point-to-point prolem of transmitting over a inary clean channel with power constraint n w Hx q + q, the capacity of which is H + q + q. Thus, the sum-capacity of the inary clean MAC 4 is strictly greater than the est achievale rate using only stationary inputs 3. Remark : The sum-capacity of 0 can e shown, using the same methods, to e: C sum clean = H+ q + q ε H ε. If we allow full cooperation etween the transmitters, the capacity of the channel does not outperform 4, as pointed out in the converse part of the proof. In the Gaussian case, on the other hand, the sum-capacity of the MAC channel is equal to log + SNR + SNR, which is strictly smaller than the full-cooperation capacity, log + SNR + SNR + SNR SNR. This R [its] Capacity Region Sum Capacity Improved Onion Peeling Onion Peeling Time Sharing one Tx at a time h q*q h q h q*q h q R [its] Fig.. Rate Regions for the inary clean MAC and input constraints: q =/6, q =/0. dissimilarity stems from the difference of the alphaets that we work with in oth prolems and the nature of the addition. In the inary case, no coherence can e attained y transmitting the same message, and additional power can only assist in exploiting more time slots within a lock. In the Gaussian case, on the other hand, cooperation allows additional coherence gain, which cannot e achieved in the inary case. To find the capacity region of explicitly, we replace the convex hull with a time-sharing variale Q, with alphaet of size Q =see, e.g., [4]. C R,R :R H X Q R H X Q R +R H X X Q, 5 where the union is over all admissile Markov chains X Q X, satisfying the input constraints EX i q i, i =,. Remark : Note that X and X are not independent in 5, ut rather independent given the time-sharing parameter Q. Deriving an explicit analytical expression for 5 is hard, and numerical solutions are needed instead. Using the scheme proposed in the proof of Theorem, in which only one user transmits at each time instance, whereas the other user remains silent, is suoptimal in general, as is illustrated in Figure. Exploring the capacity region in 5, we note that the corner points of the pentagons, which constitute the capacity region, i.e., points that satisfy one of the first two inequalities and the third one with equality in 5, can e achieved y incorporating the successive cancellation or onion peeling method, in which the decoder treats the message of one of the users as noise, recovers the message of the other user, and sutracts it to recover the remaining message. Due to the time-sharing variale Q of cardinality, two such strategies need to e considered, to achieve a general point in the capacity region 5, such that the power constraints

4 are satisfied on the average. Nevertheless, we examine these rates for stationary points viz. P Q =0=, to otain etter understanding. Thus, oth users transmit simultaneously at all times, such that user uses all of its availale power EX = q, whereas user uses only some portion of its power EX = q 0 q q. User treats q as noise and can achieve a rate of R = H q q H q. After recovering the message of user, it can e sutracted, such that user sees a clean point-to-point channel and hence can achieve a rate of R = H q. Note that even though using this strategy alone the capacity region cannot e achieved, it does achieve certain rate pairs which cannot e achieved y simple time-sharing, like the one used in Lemma and depicted in Figure. Remark 3: When using this onion peeling strategy, user does not exploit all of its power, ut only a portion 0 q q. Hence a residual power of q q is left unexploited. This implies that this strategy is not optimal except when q = q as is, and a way to exploit this residual power needs to e constructed. As mentioned earlier, time-sharing etween such onion peeling strategies allows to achieve capacity. However, numerical evidence suggest that a simpler scheme suffices to achieve the capacity region, as is depicted in Figure. In this scheme we divide the transmission lock into two parts, where in the first we use onion peeling, such that the user eing pilled first uses all of its power, whereas the other user uses a portion of its power in the first su-lock, and transmits with its remaining power in the second-lock whereas the other user is silent. If we denote y the lock portion allotted to onion peeling and y q 0 q q the power of user, used during this period, this scheme supplies us with the following achievale rates: R = H + R = H + q q q H + + H + q, q q, 6 Or in the noise case: R = H + q q q ε H + ε, q R = H + ε + H + q q ε H ε, in a similar manner. The roles of user and user are not symmetric: the achievale rate pairs, using onion peeling, when user is peeled, differ from the rate pairs that are achieved when user is peeled. Hence, y switching roles etween the two users, one may achieve additional rate points. III. DIRTY MAC WITH COMMON INTERFERENCE We adopt the strategies introduced in Section II to the dirty case 7 depicted also in Figure, and derive an achievale rate region. Similarly to the clean MAC case, the sum-capacity of the inary DMAC with common interference is equal to the capacity of this channel when oth encoders can fully cooperate, as indicated y the following theorem. Theorem Sum-Rate Capacity of DMAC with Common SI: The sum-capacity of the inary noiseless modulo-additive MAC with common interference 7 and input constraints n w Hx i q i, i =,, is: Cdirty sum = H + q + q. 7 Proof: Direct: We repeat the proof of Lemma, only now the point-to-point BSC capacity 4 should e replaced y the inary dirty paper channel capacity 5. Nevertheless, in the noiseless case Z =0, there is no difference etween the two expressions, and thus R + R = H + q + q. Converse: Again, like in the proof of Lemma, we allow full cooperation etween the transmitters, which in turn transforms the prolem into a point-to-point channel, the capacity of which is H + q + q. Remark 4: In the presence of noise, the sum-capacity of this channel is C sum Dirty =uchmax H + q + q H ε, 0. In the noiseless case, the sum-capacities of the inary clean and dirty MACs are equal. However, in the presence of noise Z, the sum-capacity of the dirty MAC channel is strictly smaller than that of the clean MAC channel for q + q <. This difference stems from the capacity loss, due to the presence of interference, of the point-topoint setting 4,5 As was mentioned in Remark, if we allow full cooperation etween the transmitters, the capacity of the channel cannot exceed 7, in contrast to the Gaussian case, in which additional coherence gain can e achieved. The capacity region of the single informed user 9 serves as an inner ound for the capacity region of the common interference dirty MAC. To improve the achievale region of our channel of interest, we allow time-sharing etween single informed user strategies, where the informed user is alternately user or user. Note that y this only the user that is pilled first needs to know the interference. This is also true for the sum-capacity achieving strategy presented in the proof of Theorem. Remark 5: The strategies used in [], to achieve the capacity region of the single informed user 9, can e viewed as onion

5 peeling, where user assumes a point-to-point dirty paper channel and input constraint 0 q q ; and user treats the signal of user, X, as noise, and uses dirty paper coding of the form 5. The achievale rates, using this strategy, are of the form: R = H q H q, R = H q, where since q can take any value in the interval [0,q ], the single informed user capacity 9 is achieved y timesharing etween such strategies where user is always pilled first, since user is ignorant of the interference sequence. Using such stationary strategies alone with no timesharing, one cannot hope to achieve the sum-capacity of Lemma or the whole capacity region of the singleinformed user prolem 9, since there is an average residual power of q q, for each sample, left unexploited. As in the clean MAC case Section II, we conjecture that rather than using time-sharing etween two onion peeling strategies, a simplified scheme that divides the transmission locks into two parts, where in the first su-lock onion peeling is performed, where the user that is pilled first exploits all of power, and in the second su-lock the other user transmits with all of its remaining power. This allows to achieve rate pairs of the form: R = H + R = H + q H + q q + H +, q q, 8 where q [0,q ]. See Figure 3. In the noisy case, this scheme achieves the following rates: R = H + q q H + ε, q R = H + ε + H + q q ε H ε. Even in the noiseless case Z =0 the achievale rate region of the dirty channel 8 is properly contained in its corresponding clean counterpart 6 as depicted in Figure 3, in contrast to the point-to-point setting, in which the capacities are equal in the asence of noise 4, 5. The gap etween the two regions stems from the fact that in the first su-lock, the user eing peeled first, treats the signal of the other user as noise, in the presence of interference. Hence the achievale rate during this stage is strictly smaller, due to the point-to-point loss of inary dirty paper coding 4, 5. This strategy is asymmetric in user and user, as was explained in Remark 3. R [its] Clean Sum Capacity UB Clean MAC Capacity UB TS etween OP Improved Onion Peeling Time Sharing one Tx at a time Onion Peeling h q*q h q h q*q h q R [its] Fig. 3. Rate regions for the inary DMAC with common interference and input constraints q =/6, q =/0. [] S. I. Gel fand and M. S. Pinsker, Coding for channel with random parameters, Prolemy Pered. Inform. Prolems of Inform. Trans., vol. 9, No., pp. 9 3, 980. [3] T. M. Cover and J. A. Thomas, Elements of Information Theory. New York: Wiley, 99. [4] M. H. M. Costa, Writing on dirty paper, IEEE Trans. Information Theory, vol. IT-9, pp , May 983. [5] R. J. Barron, B. Chen, and G. W. Wornell, The duality etween information emedding and source coding with side information and some applications, IEEE Trans. Information Theory, vol. 49, pp , May 003. [6] R. Zamir, S. S. Shitz, and U. Erez, Nested linear/lattice codes for structured multiterminal inning, IEEE Trans. Information Theory, vol. 48, pp , June 00. [7] T. Philosof, R. Zamir, U. Erez, and A. Khisti, Lattice strategies for the dirty multiple access channel, arxiv: v, also sumitted to Transaction on Information Theory, 009. [8] T. Philosof and R. Zamir, On the loss of single-letter characterization: The dirty multiple access channel, IEEE Trans. Information Theory, vol. IT-55, pp , June 009. [9] S. I. Gel fand and M. S. Pinsker, On Gaussian channels with random parameters, in Astracts of Sixth International Symposium on Information Theory, Tashkent, U.S.S.R, Sep. 984, pp [0] Y. H. Kim, A. Sutivong, and S. Sigurjónsson, Multiple user writing on dirty paper, in Proceedings of IEEE International Symposium on Information Theory, Chicago, USA, June 004. [] T. Philosof, R. Zamir, and U. Erez, The capacity region of the inary dirty MAC, in Proc. of Info. Th. Workshop, Sicily, Italy, Oct. 009, pp [] R. Ahlswede, Multi-way communication channels, in Proceedings of nd International Symposium on Information Theory, Thakadsor, Armenian S.S.R., Sept. 97. Akadémiai Kiadó, Budapest, 973, pp [3] H. Liao, Multiple access channels, Ph.D. dissertation, Department of Electrical Engineering, University of Hawaii, Honolulu, 97. [4] I. Csiszar and J. Korner, Information Theory - Coding Theorems for Discrete Memoryless Systems. New York: Academic Press, 98. REFERENCES [] T. Philosof, R. Zamir, and U. Erez, Technical report: Achievale rates for the MAC with correlated channel-state information, in arxiv: , 008.

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,

More information

The Robustness of Dirty Paper Coding and The Binary Dirty Multiple Access Channel with Common Interference

The Robustness of Dirty Paper Coding and The Binary Dirty Multiple Access Channel with Common Interference The and The Binary Dirty Multiple Access Channel with Common Interference Dept. EE - Systems, Tel Aviv University, Tel Aviv, Israel April 25th, 2010 M.Sc. Presentation The B/G Model Compound CSI Smart

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

On the Duality between Multiple-Access Codes and Computation Codes

On the Duality between Multiple-Access Codes and Computation Codes On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch

More information

Information Theory for Wireless Communications. Lecture 10 Discrete Memoryless Multiple Access Channel (DM-MAC): The Converse Theorem

Information Theory for Wireless Communications. Lecture 10 Discrete Memoryless Multiple Access Channel (DM-MAC): The Converse Theorem Information Theory for Wireless Communications. Lecture 0 Discrete Memoryless Multiple Access Channel (DM-MAC: The Converse Theorem Instructor: Dr. Saif Khan Mohammed Scribe: Antonios Pitarokoilis I. THE

More information

Generalized Writing on Dirty Paper

Generalized Writing on Dirty Paper Generalized Writing on Dirty Paper Aaron S. Cohen acohen@mit.edu MIT, 36-689 77 Massachusetts Ave. Cambridge, MA 02139-4307 Amos Lapidoth lapidoth@isi.ee.ethz.ch ETF E107 ETH-Zentrum CH-8092 Zürich, Switzerland

More information

Structured interference-mitigation in two-hop networks

Structured interference-mitigation in two-hop networks tructured interference-mitigation in two-hop networks Yiwei ong Department of Electrical and Computer Eng University of Illinois at Chicago Chicago, IL, UA Email: ysong34@uicedu Natasha Devroye Department

More information

The Gallager Converse

The Gallager Converse The Gallager Converse Abbas El Gamal Director, Information Systems Laboratory Department of Electrical Engineering Stanford University Gallager s 75th Birthday 1 Information Theoretic Limits Establishing

More information

Physical-Layer MIMO Relaying

Physical-Layer MIMO Relaying Model Gaussian SISO MIMO Gauss.-BC General. Physical-Layer MIMO Relaying Anatoly Khina, Tel Aviv University Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv University August 5, 2011 Model Gaussian

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

Cut-Set Bound and Dependence Balance Bound

Cut-Set Bound and Dependence Balance Bound Cut-Set Bound and Dependence Balance Bound Lei Xiao lxiao@nd.edu 1 Date: 4 October, 2006 Reading: Elements of information theory by Cover and Thomas [1, Section 14.10], and the paper by Hekstra and Willems

More information

Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function

Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Dinesh Krithivasan and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science,

More information

Multicoding Schemes for Interference Channels

Multicoding Schemes for Interference Channels Multicoding Schemes for Interference Channels 1 Ritesh Kolte, Ayfer Özgür, Haim Permuter Abstract arxiv:1502.04273v1 [cs.it] 15 Feb 2015 The best known inner bound for the 2-user discrete memoryless interference

More information

Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel

Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Jun Chen Dept. of Electrical and Computer Engr. McMaster University Hamilton, Ontario, Canada Chao Tian AT&T Labs-Research 80 Park

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

Duality Between Channel Capacity and Rate Distortion With Two-Sided State Information

Duality Between Channel Capacity and Rate Distortion With Two-Sided State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 6, JUNE 2002 1629 Duality Between Channel Capacity Rate Distortion With Two-Sided State Information Thomas M. Cover, Fellow, IEEE, Mung Chiang, Student

More information

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

On the Capacity of the Interference Channel with a Relay

On the Capacity of the Interference Channel with a Relay On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due

More information

A Summary of Multiple Access Channels

A Summary of Multiple Access Channels A Summary of Multiple Access Channels Wenyi Zhang February 24, 2003 Abstract In this summary we attempt to present a brief overview of the classical results on the information-theoretic aspects of multiple

More information

On Multiple User Channels with State Information at the Transmitters

On Multiple User Channels with State Information at the Transmitters On Multiple User Channels with State Information at the Transmitters Styrmir Sigurjónsson and Young-Han Kim* Information Systems Laboratory Stanford University Stanford, CA 94305, USA Email: {styrmir,yhk}@stanford.edu

More information

820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY Stefano Rini, Daniela Tuninetti, and Natasha Devroye

820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY Stefano Rini, Daniela Tuninetti, and Natasha Devroye 820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY 2012 Inner and Outer Bounds for the Gaussian Cognitive Interference Channel and New Capacity Results Stefano Rini, Daniela Tuninetti,

More information

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

On the Secrecy Capacity of the Z-Interference Channel

On the Secrecy Capacity of the Z-Interference Channel On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer

More information

Rematch and Forward: Joint Source-Channel Coding for Communications

Rematch and Forward: Joint Source-Channel Coding for Communications Background ρ = 1 Colored Problem Extensions Rematch and Forward: Joint Source-Channel Coding for Communications Anatoly Khina Joint work with: Yuval Kochman, Uri Erez, Ram Zamir Dept. EE - Systems, Tel

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Stefano Rini, Ernest Kurniawan and Andrea Goldsmith Technische Universität München, Munich, Germany, Stanford University,

More information

Broadcasting over Fading Channelswith Mixed Delay Constraints

Broadcasting over Fading Channelswith Mixed Delay Constraints Broadcasting over Fading Channels with Mixed Delay Constraints Shlomo Shamai (Shitz) Department of Electrical Engineering, Technion - Israel Institute of Technology Joint work with Kfir M. Cohen and Avi

More information

Joint Source-Channel Coding for the Multiple-Access Relay Channel

Joint Source-Channel Coding for the Multiple-Access Relay Channel Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il

More information

Variable Length Codes for Degraded Broadcast Channels

Variable Length Codes for Degraded Broadcast Channels Variable Length Codes for Degraded Broadcast Channels Stéphane Musy School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland Email: stephane.musy@ep.ch Abstract This paper investigates

More information

The Capacity Region of the Cognitive Z-interference Channel with One Noiseless Component

The Capacity Region of the Cognitive Z-interference Channel with One Noiseless Component 1 The Capacity Region of the Cognitive Z-interference Channel with One Noiseless Component Nan Liu, Ivana Marić, Andrea J. Goldsmith, Shlomo Shamai (Shitz) arxiv:0812.0617v1 [cs.it] 2 Dec 2008 Dept. of

More information

Bounds and Capacity Results for the Cognitive Z-interference Channel

Bounds and Capacity Results for the Cognitive Z-interference Channel Bounds and Capacity Results for the Cognitive Z-interference Channel Nan Liu nanliu@stanford.edu Ivana Marić ivanam@wsl.stanford.edu Andrea J. Goldsmith andrea@wsl.stanford.edu Shlomo Shamai (Shitz) Technion

More information

On Gaussian MIMO Broadcast Channels with Common and Private Messages

On Gaussian MIMO Broadcast Channels with Common and Private Messages On Gaussian MIMO Broadcast Channels with Common and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ersen@umd.edu

More information

The Duality Between Information Embedding and Source Coding With Side Information and Some Applications

The Duality Between Information Embedding and Source Coding With Side Information and Some Applications IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 5, MAY 2003 1159 The Duality Between Information Embedding and Source Coding With Side Information and Some Applications Richard J. Barron, Member,

More information

arxiv: v1 [cs.it] 4 Jun 2018

arxiv: v1 [cs.it] 4 Jun 2018 State-Dependent Interference Channel with Correlated States 1 Yunhao Sun, 2 Ruchen Duan, 3 Yingbin Liang, 4 Shlomo Shamai (Shitz) 5 Abstract arxiv:180600937v1 [csit] 4 Jun 2018 This paper investigates

More information

On the K-user Cognitive Interference Channel with Cumulative Message Sharing Sum-Capacity

On the K-user Cognitive Interference Channel with Cumulative Message Sharing Sum-Capacity 03 EEE nternational Symposium on nformation Theory On the K-user Cognitive nterference Channel with Cumulative Message Sharing Sum-Capacity Diana Maamari, Daniela Tuninetti and Natasha Devroye Department

More information

The Dirty MIMO Multiple-Access Channel

The Dirty MIMO Multiple-Access Channel The Dirty MIMO Multiple-Access Channel Anatoly Khina, Caltech Joint work with: Yuval Kochman, Hebrew University Uri Erez, Tel-Aviv University ISIT 2016 Barcelona, Catalonia, Spain July 12, 2016 Motivation:

More information

Interference Channel aided by an Infrastructure Relay

Interference Channel aided by an Infrastructure Relay Interference Channel aided by an Infrastructure Relay Onur Sahin, Osvaldo Simeone, and Elza Erkip *Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, Department

More information

On Compound Channels With Side Information at the Transmitter

On Compound Channels With Side Information at the Transmitter IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 52, NO 4, APRIL 2006 1745 On Compound Channels With Side Information at the Transmitter Patrick Mitran, Student Member, IEEE, Natasha Devroye, Student Member,

More information

On the Capacity Region of the Gaussian Z-channel

On the Capacity Region of the Gaussian Z-channel On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu

More information

An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel

An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 8-3, An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel Invited Paper Bernd Bandemer and

More information

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes Shannon meets Wiener II: On MMSE estimation in successive decoding schemes G. David Forney, Jr. MIT Cambridge, MA 0239 USA forneyd@comcast.net Abstract We continue to discuss why MMSE estimation arises

More information

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel Achaleshwar Sahai, Vaneet Aggarwal, Melda Yuksel and Ashutosh Sabharwal 1 Abstract arxiv:1104.4805v3 [cs.it]

More information

Computing sum of sources over an arbitrary multiple access channel

Computing sum of sources over an arbitrary multiple access channel Computing sum of sources over an arbitrary multiple access channel Arun Padakandla University of Michigan Ann Arbor, MI 48109, USA Email: arunpr@umich.edu S. Sandeep Pradhan University of Michigan Ann

More information

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview AN INTRODUCTION TO SECRECY CAPACITY BRIAN DUNN. Overview This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits

More information

A Comparison of Superposition Coding Schemes

A Comparison of Superposition Coding Schemes A Comparison of Superposition Coding Schemes Lele Wang, Eren Şaşoğlu, Bernd Bandemer, and Young-Han Kim Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA

More information

II. THE TWO-WAY TWO-RELAY CHANNEL

II. THE TWO-WAY TWO-RELAY CHANNEL An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable

More information

Cognitive Multiple Access Networks

Cognitive Multiple Access Networks Cognitive Multiple Access Networks Natasha Devroye Email: ndevroye@deas.harvard.edu Patrick Mitran Email: mitran@deas.harvard.edu Vahid Tarokh Email: vahid@deas.harvard.edu Abstract A cognitive radio can

More information

Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper

Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Mohsen Bahrami, Ali Bereyhi, Mahtab Mirmohseni and Mohammad Reza Aref Information Systems and Security

More information

Reliable Computation over Multiple-Access Channels

Reliable Computation over Multiple-Access Channels Reliable Computation over Multiple-Access Channels Bobak Nazer and Michael Gastpar Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA, 94720-1770 {bobak,

More information

Lecture 1: The Multiple Access Channel. Copyright G. Caire 12

Lecture 1: The Multiple Access Channel. Copyright G. Caire 12 Lecture 1: The Multiple Access Channel Copyright G. Caire 12 Outline Two-user MAC. The Gaussian case. The K-user case. Polymatroid structure and resource allocation problems. Copyright G. Caire 13 Two-user

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Capacity of a Class of Cognitive Radio Channels: Interference Channels with Degraded Message Sets

Capacity of a Class of Cognitive Radio Channels: Interference Channels with Degraded Message Sets Capacity of a Class of Cognitive Radio Channels: Interference Channels with Degraded Message Sets Wei Wu, Sriram Vishwanath and Ari Arapostathis Abstract This paper is motivated by two different scenarios.

More information

The Capacity Region of a Class of Discrete Degraded Interference Channels

The Capacity Region of a Class of Discrete Degraded Interference Channels The Capacity Region of a Class of Discrete Degraded Interference Channels Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@umd.edu

More information

IN this paper, we show that the scalar Gaussian multiple-access

IN this paper, we show that the scalar Gaussian multiple-access 768 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 5, MAY 2004 On the Duality of Gaussian Multiple-Access and Broadcast Channels Nihar Jindal, Student Member, IEEE, Sriram Vishwanath, and Andrea

More information

Random Access: An Information-Theoretic Perspective

Random Access: An Information-Theoretic Perspective Random Access: An Information-Theoretic Perspective Paolo Minero, Massimo Franceschetti, and David N. C. Tse Abstract This paper considers a random access system where each sender can be in two modes of

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

On the Capacity of Interference Channels with Degraded Message sets

On the Capacity of Interference Channels with Degraded Message sets On the Capacity of Interference Channels with Degraded Message sets Wei Wu, Sriram Vishwanath and Ari Arapostathis arxiv:cs/060507v [cs.it] 7 May 006 Abstract This paper is motivated by a sensor network

More information

On the Optimality of Treating Interference as Noise in Competitive Scenarios

On the Optimality of Treating Interference as Noise in Competitive Scenarios On the Optimality of Treating Interference as Noise in Competitive Scenarios A. DYTSO, D. TUNINETTI, N. DEVROYE WORK PARTIALLY FUNDED BY NSF UNDER AWARD 1017436 OUTLINE CHANNEL MODEL AND PAST WORK ADVANTAGES

More information

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 10, OCTOBER 2003 Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels Sriram Vishwanath, Student Member, IEEE, Nihar

More information

Capacity Bounds for Diamond Networks

Capacity Bounds for Diamond Networks Technische Universität München Capacity Bounds for Diamond Networks Gerhard Kramer (TUM) joint work with Shirin Saeedi Bidokhti (TUM & Stanford) DIMACS Workshop on Network Coding Rutgers University, NJ

More information

On Scalable Coding in the Presence of Decoder Side Information

On Scalable Coding in the Presence of Decoder Side Information On Scalable Coding in the Presence of Decoder Side Information Emrah Akyol, Urbashi Mitra Dep. of Electrical Eng. USC, CA, US Email: {eakyol, ubli}@usc.edu Ertem Tuncel Dep. of Electrical Eng. UC Riverside,

More information

On Capacity Under Received-Signal Constraints

On Capacity Under Received-Signal Constraints On Capacity Under Received-Signal Constraints Michael Gastpar Dept. of EECS, University of California, Berkeley, CA 9470-770 gastpar@berkeley.edu Abstract In a world where different systems have to share

More information

Feedback Capacity of the Gaussian Interference Channel to Within Bits: the Symmetric Case

Feedback Capacity of the Gaussian Interference Channel to Within Bits: the Symmetric Case 1 arxiv:0901.3580v1 [cs.it] 23 Jan 2009 Feedback Capacity of the Gaussian Interference Channel to Within 1.7075 Bits: the Symmetric Case Changho Suh and David Tse Wireless Foundations in the Department

More information

Secret Key Agreement Using Asymmetry in Channel State Knowledge

Secret Key Agreement Using Asymmetry in Channel State Knowledge Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,

More information

On the Rate-Limited Gelfand-Pinsker Problem

On the Rate-Limited Gelfand-Pinsker Problem On the Rate-Limited Gelfand-Pinsker Problem Ravi Tandon Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 ravit@umd.edu ulukus@umd.edu Abstract

More information

On the Expected Rate of Slowly Fading Channels with Quantized Side Information

On the Expected Rate of Slowly Fading Channels with Quantized Side Information On the Expected Rate of Slowly Fading Channels with Quantized Side Information Thanh Tùng Kim and Mikael Skoglund 2005-10-30 IR S3 KT 0515 c 2005 IEEE. Personal use of this material is permitted. However,

More information

5958 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

5958 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 5958 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Capacity Theorems for Discrete, Finite-State Broadcast Channels With Feedback and Unidirectional Receiver Cooperation Ron Dabora

More information

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu

More information

ECE Information theory Final

ECE Information theory Final ECE 776 - Information theory Final Q1 (1 point) We would like to compress a Gaussian source with zero mean and variance 1 We consider two strategies In the first, we quantize with a step size so that the

More information

Improved Rates and Coding for the MIMO Two-Way Relay Channel

Improved Rates and Coding for the MIMO Two-Way Relay Channel Improved Rates and Coding for the MIMO Two-Way Relay Channel Anatoly Khina Dept. of EE Systems, TAU Tel Aviv, Israel Email: anatolyk@eng.tau.ac.il Yuval Kochman School of CSE, HUJI Jerusalem, Israel Email:

More information

Equivalence for Networks with Adversarial State

Equivalence for Networks with Adversarial State Equivalence for Networks with Adversarial State Oliver Kosut Department of Electrical, Computer and Energy Engineering Arizona State University Tempe, AZ 85287 Email: okosut@asu.edu Jörg Kliewer Department

More information

Joint Write-Once-Memory and Error-Control Codes

Joint Write-Once-Memory and Error-Control Codes 1 Joint Write-Once-Memory and Error-Control Codes Xudong Ma Pattern Technology Lab LLC, U.S.A. Email: xma@ieee.org arxiv:1411.4617v1 [cs.it] 17 ov 2014 Abstract Write-Once-Memory (WOM) is a model for many

More information

On the Capacity of the Two-Hop Half-Duplex Relay Channel

On the Capacity of the Two-Hop Half-Duplex Relay Channel On the Capacity of the Two-Hop Half-Duplex Relay Channel Nikola Zlatanov, Vahid Jamali, and Robert Schober University of British Columbia, Vancouver, Canada, and Friedrich-Alexander-University Erlangen-Nürnberg,

More information

The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference

The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference Soheyl Gherekhloo, Anas Chaaban, and Aydin Sezgin Chair of Communication Systems RUB, Germany Email: {soheyl.gherekhloo,

More information

Capacity of a Class of Semi-Deterministic Primitive Relay Channels

Capacity of a Class of Semi-Deterministic Primitive Relay Channels Capacity of a Class of Semi-Deterministic Primitive Relay Channels Ravi Tandon Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 ravit@umd.edu

More information

Can Feedback Increase the Capacity of the Energy Harvesting Channel?

Can Feedback Increase the Capacity of the Energy Harvesting Channel? Can Feedback Increase the Capacity of the Energy Harvesting Channel? Dor Shaviv EE Dept., Stanford University shaviv@stanford.edu Ayfer Özgür EE Dept., Stanford University aozgur@stanford.edu Haim Permuter

More information

EE 4TM4: Digital Communications II. Channel Capacity

EE 4TM4: Digital Communications II. Channel Capacity EE 4TM4: Digital Communications II 1 Channel Capacity I. CHANNEL CODING THEOREM Definition 1: A rater is said to be achievable if there exists a sequence of(2 nr,n) codes such thatlim n P (n) e (C) = 0.

More information

An Outer Bound for the Gaussian. Interference channel with a relay.

An Outer Bound for the Gaussian. Interference channel with a relay. An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il

More information

THE dirty-paper (DP) channel, first introduced by

THE dirty-paper (DP) channel, first introduced by On the obustness of Dirty Paper Coding Anatoly Khina and Uri Erez, Member, IEEE Abstract A dirty-paper channel is considered, where the transmitter knows the interference sequence up to a constant multiplicative

More information

Interference Channels with Source Cooperation

Interference Channels with Source Cooperation Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

STRONG CONVERSE FOR GEL FAND-PINSKER CHANNEL. Pierre Moulin

STRONG CONVERSE FOR GEL FAND-PINSKER CHANNEL. Pierre Moulin STROG COVERSE FOR GEL FAD-PISKER CHAEL Pierre Moulin Beckman Inst., Coord. Sci. Lab and ECE Department University of Illinois at Urbana-Champaign, USA ABSTRACT A strong converse for the Gel fand-pinsker

More information

New communication strategies for broadcast and interference networks

New communication strategies for broadcast and interference networks New communication strategies for broadcast and interference networks S. Sandeep Pradhan (Joint work with Arun Padakandla and Aria Sahebi) University of Michigan, Ann Arbor Distributed Information Coding

More information

Concatenated Coding Using Linear Schemes for Gaussian Broadcast Channels with Noisy Channel Output Feedback

Concatenated Coding Using Linear Schemes for Gaussian Broadcast Channels with Noisy Channel Output Feedback IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. XX, NO. Y, MONTH 204 Concatenated Coding Using Linear Schemes for Gaussian Broadcast Channels with Noisy Channel Output Feedback Ziad Ahmad, Student Member, IEEE,

More information

On Scalable Source Coding for Multiple Decoders with Side Information

On Scalable Source Coding for Multiple Decoders with Side Information On Scalable Source Coding for Multiple Decoders with Side Information Chao Tian School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS), EPFL, Lausanne,

More information

On the Duality of Gaussian Multiple-Access and Broadcast Channels

On the Duality of Gaussian Multiple-Access and Broadcast Channels On the Duality of Gaussian ultiple-access and Broadcast Channels Xiaowei Jin I. INTODUCTION Although T. Cover has been pointed out in [] that one would have expected a duality between the broadcast channel(bc)

More information

On The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers

On The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers On The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers Albrecht Wolf, Diana Cristina González, Meik Dörpinghaus, José Cândido Silveira Santos Filho, and Gerhard Fettweis Vodafone

More information

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages Degrees of Freedom Region of the Gaussian MIMO Broadcast hannel with ommon and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and omputer Engineering University of Maryland, ollege

More information

Lossy Distributed Source Coding

Lossy Distributed Source Coding Lossy Distributed Source Coding John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 202 Lossy Distributed Source Coding Problem X X 2 S {,...,2 R } S 2 {,...,2 R2 } Ẑ Ẑ 2 E d(z,n,

More information

Lecture 10: Broadcast Channel and Superposition Coding

Lecture 10: Broadcast Channel and Superposition Coding Lecture 10: Broadcast Channel and Superposition Coding Scribed by: Zhe Yao 1 Broadcast channel M 0M 1M P{y 1 y x} M M 01 1 M M 0 The capacity of the broadcast channel depends only on the marginal conditional

More information

i.i.d. Mixed Inputs and Treating Interference as Noise are gdof Optimal for the Symmetric Gaussian Two-user Interference Channel

i.i.d. Mixed Inputs and Treating Interference as Noise are gdof Optimal for the Symmetric Gaussian Two-user Interference Channel iid Mixed nputs and Treating nterference as Noise are gdof Optimal for the Symmetric Gaussian Two-user nterference Channel Alex Dytso Daniela Tuninetti and Natasha Devroye University of llinois at Chicago

More information

Lecture 22: Final Review

Lecture 22: Final Review Lecture 22: Final Review Nuts and bolts Fundamental questions and limits Tools Practical algorithms Future topics Dr Yao Xie, ECE587, Information Theory, Duke University Basics Dr Yao Xie, ECE587, Information

More information

Energy State Amplification in an Energy Harvesting Communication System

Energy State Amplification in an Energy Harvesting Communication System Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu

More information

Secret Key and Private Key Constructions for Simple Multiterminal Source Models

Secret Key and Private Key Constructions for Simple Multiterminal Source Models Secret Key and Private Key Constructions for Simple Multiterminal Source Models arxiv:cs/05050v [csit] 3 Nov 005 Chunxuan Ye Department of Electrical and Computer Engineering and Institute for Systems

More information

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Half-Duplex Gaussian Relay Networks with Interference Processing Relays Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras

More information

Capacity of Memoryless Channels and Block-Fading Channels With Designable Cardinality-Constrained Channel State Feedback

Capacity of Memoryless Channels and Block-Fading Channels With Designable Cardinality-Constrained Channel State Feedback 2038 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 9, SEPTEMBER 2004 Capacity of Memoryless Channels and Block-Fading Channels With Designable Cardinality-Constrained Channel State Feedback Vincent

More information