Capacity of a Class of Semi-Deterministic Primitive Relay Channels
|
|
- Audra McKinney
- 5 years ago
- Views:
Transcription
1 Capacity of a Class of Semi-Deterministic Primitive Relay Channels Ravi Tandon Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 ravit@umd.edu ulukus@umd.edu Abstract We characterize the capacity of a class of primitive relay channels. The primitive relay channel considered in this paper consists of a semi-deterministic broadcast channel to the relay and the decoder. The relay can help the message transmission through an orthogonal finite capacity link to the decoder. We show that the capacity of this class of primitive relay channels is given by the cut-set upper bound, and it can be achieved by the partial decode-and-forward scheme. We also show that the rate achievable by the compress-and-forward scheme is strictly smaller than the capacity. I. INTRODUCTION In this paper, we consider the primitive relay channel. A primitive relay channel consists of a broadcast channel from the encoder to the decoder and the relay. Furthermore, there is an orthogonal, finite capacity link from the relay to the decoder. Figure shows the primitive relay channel, where the channel input is X, the channel output at the decoder is, and the channel output at the relay is. The primitive relay channel is relatively simpler to study than the general relay channel [], since the relay does not have an explicit coded input to the channel. The capacity of the primitive relay channel is known for the following classes. A class of semi-deterministic primitive relay channels was considered in [2], with the assumption that the channel output at the relay, i.e., can be obtained as a deterministic function of the channel input X and the channel output of the decoder,. It was shown that the compress-and-forward CAF) scheme [, Theorem 6] is capacity achieving and matches the cut-set upper bound [3]. This was the first result to show the optimality of the CAF scheme for any relay channel. Also note that this class of primitive relay channels includes the sub-class, where the broadcast channel is fully deterministic, i.e., when = fx) and = gx), for deterministic functions f and g. For this sub-class, the capacity can be obtained from [2], [4]. An interesting example in the class of semi-deterministic relay channels of [2] is when = X N, where denotes modulo addition and the relay observes the noise N, which is assumed to be independent of the message. Since N = X, the capacity can be achieved by CAF scheme and matches the cut-set bound. In an interesting generalization of this example, it was shown in [5] that if the relay observes a noisy version of the forward noise, i.e., the relay observes Ñ where Ñ = N V, and V is independent of N, then the This work was supported by NSF Grants CCF , CCF , CNS 7-63 and CCF M Encoder X Fig.. py, z x) Relay The primitive relay channel. R Decoder CAF scheme is capacity achieving, although, the capacity can be strictly smaller than the cut-set bound. This was the first result to show the sub-optimality of the cut-set bound for any relay channel. In this paper, we focus on a special class of primitive relay channels whose capacity is not known. Figure 2 shows the broadcast component, py, z x), for the primitive relay channel in consideration. The channel input X is ternary, taking values in {,,2} and the channel outputs and are binary, taking values in {,}. Note that is a deterministic function of X, whereas is not. Furthermore, for any p,), fx, ), i.e., cannot be expressed as a deterministic function of X, ). To observe this, note that if X = 2, then =, but could be either or. In other words, this primitive relay channel does not fall in the class of primitive relay channels studied in [2], [4]. This particular semi-deterministic broadcast channel is also referred to as the noisy Blackwell channel and was studied in [6]. Observe that when p =, then = = fx) and the capacity is given by CR ) px) H ) = for all values of R. This implies that the relay is not useful at all. On the other hand, when p =, then = fx) and = gx), and the resulting primitive relay channel falls in the class studied in [2], [4]. We therefore consider the case when p,). The main contribution of this paper is to characterize the capacity of this primitive relay channel. We show that the capacity is given by the cut-set upper bound and it can be achieved by using the partial decodeand-forward scheme PDAF). We also show that for this class of primitive relay channels, the CAF scheme is sub-optimal. II. MAIN RESULT We now state the main result of this paper in the following theorem. ˆM
2 X 2 p p Fig. 2. The broadcast component of the primitive relay channel in consideration. Theorem : The capacity of the primitive relay channel with a broadcast channel as shown in Figure 2 is given as, CR ) = max hα) + minr, α)kp)) ) α [,/2] where, Kp) = log + p)p p/ p) ). The capacity, CR ), is equal to the cut-set upper bound and can be achieved by the partial decode-and-forward scheme. We will prove Theorem in two steps. We first explicitly evaluate the cut-set upper bound [3] and then show that it can be achieved by the PDAF scheme [7]. A. Evaluation of the Cut-set Bound We begin by first evaluating the cut-set bound for this relay channel [3]: CSR ) px) minix;,),ix; ) + R ) 2) which can be simplified to CSR ) px) H ) + minix; ),R )) 3) by using the fact that H X) =. Let us fix an input distribution, px), as p X ) = α, p X ) = π) α), p X 2) = π α) 4) where α,π [,]. For this input distribution, we have, H ) = hα) 5) where hα) is the binary entropy function, and IX; ) = P )IX; = ) + P )IX; = ) 6) = P )IX; = ) 7) = α)ix; = ) 8) Now, note that IX; = ) = hπ p)) πhp) 9) max hπ p)) πhp) ) π [,] = Kp) ) where Kp) is the capacity of a -channel with crossover probability p [8], and is given as, Kp) = log + p)p p/ p)) 2) By using 5), 8), and ), we have an expression for the cut-set bound as, CSR ) px) H ) + minr,ix; )) 3) α [,] hα) + minr, α)kp)) 4) α [,/2] hα) + minr, α)kp)) 5) where 5) follows from the fact that hα) is symmetric around /2. B. Evaluation of the Partial Decode-and-Forward Rate The PDAF scheme yields the following rate for the primitive relay channel [7], R PDF R ) pu,x) minh U) + IU;),H ) + R ) 6) We consider the following input distribution pu, x). Select U = 2, and the distribution pu,x) as follows. Fix an α [, /2], and define, { + p)p p/ p) if α >, β = +/α p)p p/ p) 7) otherwise. and = { α β if α >, otherwise. We now describe the input distribution pu, x) as, and 8) P U ) =, P U ) = 9) P X U ) =, P X U ) = β, P X U 2 ) = β. 2) To observe the input distribution, see Figure 3. For this input distribution, we have P ) = β = α, so that We will now show that, H U) + IU;) = hα) + α)log H ) = hα) 2) + p)p p/ p)) 22)
3 Fig. 3. U β β X 2 p p Construction of the optimal input distribution pu, x). which is equivalent to showing that, = hα) + α)kp) 23) IU;) IU; ) = α)kp) 24) The proof of 24) is given in the Appendix. Therefore, the rates for PDAF can be lower bounded as, R PDF R ) max minhα) + R,hα) + α)kp)) α [,/2] 25) α [,/2] hα) + minr, α)kp)) 26) Using 5) and 26), the capacity of the primitive relay channel in consideration is given as, CR ) = max hα) + minr, α)kp)) 27) α [,/2] III. ON THE SUB-OPTIMALIT OF THE CAF SCHEME In the previous section, we showed that the PDAF scheme achieves the capacity of a particular class of primitive relay channels. Besides the PDAF scheme, another natural achievable scheme for the primitive relay channel is the CAF scheme. In this scheme, the relay does not make use of the codebook structure and compresses its output using decoder s channel output as the side information. In this section, we will show that for the primitive relay channel in consideration, the CAF scheme is strictly sub-optimal. We will show this by obtaining an upper bound on the rate of the CAF scheme. We will then show that this upper bound is strictly smaller than the capacity for certain values of R. The achievable rate of the CAF scheme is given as, R CAF R ) = max IX;,Ẑ) 28) px),pẑ z) such that I;Ẑ ) R 29) We remark here that evaluation of the rates of CAF scheme is a difficult problem, primarily due to the presence of the auxiliary random variable Ẑ, for which there are no cardinality bounds. To obtain an upper bound on R CAF R ), we fix an arbitrary input distribution px) as follows, p X ) = α, p X ) = π) α), p X 2) = π α) 3) where α,π [,]. For this input distribution, we have, We also have, HX) = hα) + α)hπ) 3) H ) = α)hπ p)) 32) IX;,Ẑ) = HX) HX,Ẑ) 33) = hα) + α)hπ) HX,Ẑ) 34) = hα) + α)hπ) α)hx =,Ẑ) 35) Note that only such conditional distributions pẑ z) are permitted such that, R I;Ẑ ) 36) = H ) H,Ẑ) 37) = α)hπ p)) H,Ẑ) 38) = α)hπ p)) α)h =,Ẑ) 39) This implies that, H =,Ẑ) hπ p)) R ) + α) 4) = λα,π,r ) 4) where x +,x). To obtain an upper bound on the rate achievable by the CAF scheme, we will lower bound the term HX =,Ẑ) appearing in 35). For this purpose, we will use 4) in the following manner. For simplicity, we define the following random variables X,,Ẑ, where X = {,2}, = and Ẑ = Ẑ. The random variables have the following joint distribution, p X,,Ẑ x,z,ẑ ) = p X, x,z y = )pẑ ẑ z ) 42) for all x,z,ẑ ). By the construction of X,,Ẑ ), the following is a valid Markov chain. Moreover, we also have, Ẑ X 43) HX Ẑ ) = HX =,Ẑ) 44) H Ẑ ) = H =,Ẑ) 45) We will now make use of the following result on pairs of dependent random variables [9, Theorem 4], []. If Ẑ X forms a Markov chain, and, H Ẑ ) π p)) h) 46)
4 for some [ π p)),], then, where, HX Ẑ hǫ ) ) π p)) ǫ = Continuing from 35), we have, IX;,Ẑ) π) π p)) 47) 48) = hα) + α)hπ) α)hx =,Ẑ) 49) = hα) + α)hπ) α)hx Ẑ ) 5) hǫ ) hα) + α)hπ) α) π p)) 5) = hα) + α)hπ) α)µα,π,r ) 52) where 5) follows from 44), 5) follows from 47), and in 52), we have defined hǫ ) µα,π,r ) = π p)) 53) where [ π p)),] is the solution of the equation, λα,π,r ) = π p)) h) 54) Using 52), we have an upper bound on the rates of CAF scheme as follows, [ ] R CAF R ) max hα) + α)hπ) µα,π,r )) α,π 55) The capacity as a function of R is shown in Figure 4 for various values of parameter p. The figure also shows the upper bound on the rate of CAF scheme, obtained in 55) for p =.2. We observe that the rate of CAF scheme is strictly below the capacity when p =.2. IV. CONCLUSIONS We considered a class of primitive relay channel whose capacity was not previously known. We characterized the capacity of this class of channels. It is shown that the cut-set upper bound is tight and it can be achieved by partial decodeand-forward scheme. We also show that the compress-andforward scheme is strictly sub-optimal for this relay channel. A. Proof of 24) V. APPENDIX To prove 24), we define the following variables, so that we have, η = p)p p/ p) 56) α) = α p) 57) β = + η + η + η ) 58) CR ), p= CR ), p=.2 R CAF R ), p=.2 CR ), p= R Fig. 4. Capacity curve CR ) for various values of parameter p. Using these variables, we have the following, ) α + η H) = h 59) + η H ) = hα) 6) ) α + η + η ) + η H U) = h 6) + η) + η + η ) α + η + η ) η p H U) = h 62) + η) + η + η We therefore have, IU;) IU; ) ) α + η = h hα) + η [ ) α + η + η ) η p h + η) + η + η ) ] + η h 63) + η + η = α)log + η) 64) = α)log + p)p p/ p) ) 65) = α)kp) 66) where 64) follows from direct simplification of the expression. REFERENCES [] T. M. Cover and A. El Gamal. Capacity theorems for the relay channel. IEEE Trans. on Information Theory, 255): , September 979. [2] -H. Kim. Capacity of a class of deterministic relay channels. IEEE Trans. on Information Theory, 543): , Mar. 28. [3] T. M. Cover and J. A. Thomas. Elements of Information Theory. New ork:wiley, 99. [4] A. El Gamal and M. Aref. The capacity of the semideterministic relay channel. IEEE Trans. on Information Theory, 283):536, May 982. [5] M. Aleksic, P. Razaghi, and W. u. Capacity of a class of modulo-sum relay channels. IEEE Trans. on Information Theory, 553):92 93, Mar. 29.
5 [6] S. Gelfand and M. Pinsker. Capacity of a broadcast channel with one deterministic component. Problemy Peredachi Informatsii, 6):24 34, 98. [7] -H. Kim. Coding techniques for primitive relay channels. Proc. Annual Allerton Conference on Communication, Control and Computing, pages 29 35, 27. [8] S. W. Golomb. The limiting behavior of the -channel. IEEE Trans. on Information Theory, 663):372, May 98. [9] W. Gu, R. Koetter, M. Effros, and T. Ho. On source coding with coded side information for a binary source with binary side information. In IEEE International Symposium on Information Theory, Nice, France, June 27. [] H. S. Witsenhausen and A. D. Wyner. A conditional entropy bound for a pair of discrete random variables. IEEE Trans. on Information Theory, 25):493 5, September 975.
On the Rate-Limited Gelfand-Pinsker Problem
On the Rate-Limited Gelfand-Pinsker Problem Ravi Tandon Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 ravit@umd.edu ulukus@umd.edu Abstract
More informationOn Dependence Balance Bounds for Two Way Channels
On Dependence Balance Bounds for Two Way Channels Ravi Tandon Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ravit@umd.edu ulukus@umd.edu
More informationSuperposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels
Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:
More informationThe Capacity Region of a Class of Discrete Degraded Interference Channels
The Capacity Region of a Class of Discrete Degraded Interference Channels Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@umd.edu
More informationOn The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers
On The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers Albrecht Wolf, Diana Cristina González, Meik Dörpinghaus, José Cândido Silveira Santos Filho, and Gerhard Fettweis Vodafone
More informationThe Gallager Converse
The Gallager Converse Abbas El Gamal Director, Information Systems Laboratory Department of Electrical Engineering Stanford University Gallager s 75th Birthday 1 Information Theoretic Limits Establishing
More informationCoding Techniques for Primitive Relay Channels
Forty-Fifth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 26-28, 2007 WeB1.2 Coding Techniques for Primitive Relay Channels Young-Han Kim Abstract We give a comprehensive discussion
More informationIET Commun., 2009, Vol. 3, Iss. 4, pp doi: /iet-com & The Institution of Engineering and Technology 2009
Published in IET Communications Received on 10th March 2008 Revised on 10th July 2008 ISSN 1751-8628 Comprehensive partial decoding approach for two-level relay networks L. Ghabeli M.R. Aref Information
More informationCapacity of the Discrete Memoryless Energy Harvesting Channel with Side Information
204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener
More informationA Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources
A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources Wei Kang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College
More informationOn the Capacity Region of the Gaussian Z-channel
On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu
More informationEnergy State Amplification in an Energy Harvesting Communication System
Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu
More informationOn Multiple User Channels with State Information at the Transmitters
On Multiple User Channels with State Information at the Transmitters Styrmir Sigurjónsson and Young-Han Kim* Information Systems Laboratory Stanford University Stanford, CA 94305, USA Email: {styrmir,yhk}@stanford.edu
More informationCapacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel
Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Jun Chen Dept. of Electrical and Computer Engr. McMaster University Hamilton, Ontario, Canada Chao Tian AT&T Labs-Research 80 Park
More informationThe Role of Directed Information in Network Capacity
The Role of Directed Information in Network Capacity Sudeep Kamath 1 and Young-Han Kim 2 1 Department of Electrical Engineering Princeton University 2 Department of Electrical and Computer Engineering
More informationInformation Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results
Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel
More informationOn Gaussian MIMO Broadcast Channels with Common and Private Messages
On Gaussian MIMO Broadcast Channels with Common and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ersen@umd.edu
More informationFeedback Capacity of the Gaussian Interference Channel to Within Bits: the Symmetric Case
1 arxiv:0901.3580v1 [cs.it] 23 Jan 2009 Feedback Capacity of the Gaussian Interference Channel to Within 1.7075 Bits: the Symmetric Case Changho Suh and David Tse Wireless Foundations in the Department
More informationRelay Networks With Delays
Relay Networks With Delays Abbas El Gamal, Navid Hassanpour, and James Mammen Department of Electrical Engineering Stanford University, Stanford, CA 94305-9510 Email: {abbas, navid, jmammen}@stanford.edu
More informationLecture 10: Broadcast Channel and Superposition Coding
Lecture 10: Broadcast Channel and Superposition Coding Scribed by: Zhe Yao 1 Broadcast channel M 0M 1M P{y 1 y x} M M 01 1 M M 0 The capacity of the broadcast channel depends only on the marginal conditional
More informationFading Wiretap Channel with No CSI Anywhere
Fading Wiretap Channel with No CSI Anywhere Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 7 pritamm@umd.edu ulukus@umd.edu Abstract
More informationOn the Capacity of the Two-Hop Half-Duplex Relay Channel
On the Capacity of the Two-Hop Half-Duplex Relay Channel Nikola Zlatanov, Vahid Jamali, and Robert Schober University of British Columbia, Vancouver, Canada, and Friedrich-Alexander-University Erlangen-Nürnberg,
More informationVariable Length Codes for Degraded Broadcast Channels
Variable Length Codes for Degraded Broadcast Channels Stéphane Musy School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland Email: stephane.musy@ep.ch Abstract This paper investigates
More informationCapacity Theorems for Relay Channels
Capacity Theorems for Relay Channels Abbas El Gamal Department of Electrical Engineering Stanford University April, 2006 MSRI-06 Relay Channel Discrete-memoryless relay channel [vm 7] Relay Encoder Y n
More informationAn Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,
More informationCapacity of a Class of Deterministic Relay Channels
Capacity of a Class of Deterministic Relay Channels Thomas M. Cover Information Systems Laboratory Stanford University Stanford, CA 94305, USA cover@ stanford.edu oung-han Kim Department of ECE University
More informationSolutions to Homework Set #3 Channel and Source coding
Solutions to Homework Set #3 Channel and Source coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits per channel use)
More informationAN INTRODUCTION TO SECRECY CAPACITY. 1. Overview
AN INTRODUCTION TO SECRECY CAPACITY BRIAN DUNN. Overview This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits
More informationA Comparison of Superposition Coding Schemes
A Comparison of Superposition Coding Schemes Lele Wang, Eren Şaşoğlu, Bernd Bandemer, and Young-Han Kim Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA
More informationAn Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel
Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 8-3, An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel Invited Paper Bernd Bandemer and
More informationMulticoding Schemes for Interference Channels
Multicoding Schemes for Interference Channels 1 Ritesh Kolte, Ayfer Özgür, Haim Permuter Abstract arxiv:1502.04273v1 [cs.it] 15 Feb 2015 The best known inner bound for the 2-user discrete memoryless interference
More informationOn Scalable Coding in the Presence of Decoder Side Information
On Scalable Coding in the Presence of Decoder Side Information Emrah Akyol, Urbashi Mitra Dep. of Electrical Eng. USC, CA, US Email: {eakyol, ubli}@usc.edu Ertem Tuncel Dep. of Electrical Eng. UC Riverside,
More informationCut-Set Bound and Dependence Balance Bound
Cut-Set Bound and Dependence Balance Bound Lei Xiao lxiao@nd.edu 1 Date: 4 October, 2006 Reading: Elements of information theory by Cover and Thomas [1, Section 14.10], and the paper by Hekstra and Willems
More informationJoint Source-Channel Coding for the Multiple-Access Relay Channel
Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il
More informationDegrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages
Degrees of Freedom Region of the Gaussian MIMO Broadcast hannel with ommon and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and omputer Engineering University of Maryland, ollege
More informationInteractive Decoding of a Broadcast Message
In Proc. Allerton Conf. Commun., Contr., Computing, (Illinois), Oct. 2003 Interactive Decoding of a Broadcast Message Stark C. Draper Brendan J. Frey Frank R. Kschischang University of Toronto Toronto,
More informationEquivalence for Networks with Adversarial State
Equivalence for Networks with Adversarial State Oliver Kosut Department of Electrical, Computer and Energy Engineering Arizona State University Tempe, AZ 85287 Email: okosut@asu.edu Jörg Kliewer Department
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationMultiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets
Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,
More informationKatalin Marton. Abbas El Gamal. Stanford University. Withits A. El Gamal (Stanford University) Katalin Marton Withits / 9
Katalin Marton Abbas El Gamal Stanford University Withits 2010 A. El Gamal (Stanford University) Katalin Marton Withits 2010 1 / 9 Brief Bio Born in 1941, Budapest Hungary PhD from Eötvös Loránd University
More informationOn the Duality between Multiple-Access Codes and Computation Codes
On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch
More informationRemote Source Coding with Two-Sided Information
Remote Source Coding with Two-Sided Information Basak Guler Ebrahim MolavianJazi Aylin Yener Wireless Communications and Networking Laboratory Department of Electrical Engineering The Pennsylvania State
More informationBounds and Capacity Results for the Cognitive Z-interference Channel
Bounds and Capacity Results for the Cognitive Z-interference Channel Nan Liu nanliu@stanford.edu Ivana Marić ivanam@wsl.stanford.edu Andrea J. Goldsmith andrea@wsl.stanford.edu Shlomo Shamai (Shitz) Technion
More informationLattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function
Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Dinesh Krithivasan and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science,
More informationThe Capacity Region of the Cognitive Z-interference Channel with One Noiseless Component
1 The Capacity Region of the Cognitive Z-interference Channel with One Noiseless Component Nan Liu, Ivana Marić, Andrea J. Goldsmith, Shlomo Shamai (Shitz) arxiv:0812.0617v1 [cs.it] 2 Dec 2008 Dept. of
More informationDistributed Lossy Interactive Function Computation
Distributed Lossy Interactive Function Computation Solmaz Torabi & John MacLaren Walsh Dept. of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: solmaz.t@drexel.edu &
More informationInformation Theoretic Limits of Randomness Generation
Information Theoretic Limits of Randomness Generation Abbas El Gamal Stanford University Shannon Centennial, University of Michigan, September 2016 Information theory The fundamental problem of communication
More informationApproximate Capacity of the MIMO Relay Channel
04 IEEE International Symposium on Information Theory Approximate Capacity of the MIMO Relay Channel Xianglan Jin Department of Electrical and Computer Engineering Pusan National University Busan 609-735
More informationApproximate capacity region of the two-pair bidirectional Gaussian relay network
Approximate capacity region of the two-pair bidirectional Gaussian relay network Aydin Sezgin UC Irvine CA USA asezgin@uci.edu M. Amin Khajehnejad Caltech Pasadena CA USA amin@caltech.edu A. Salman Avestimehr
More informationA Formula for the Capacity of the General Gel fand-pinsker Channel
A Formula for the Capacity of the General Gel fand-pinsker Channel Vincent Y. F. Tan Institute for Infocomm Research (I 2 R, A*STAR, Email: tanyfv@i2r.a-star.edu.sg ECE Dept., National University of Singapore
More informationarxiv: v2 [cs.it] 28 May 2017
Feedback and Partial Message Side-Information on the Semideterministic Broadcast Channel Annina Bracher and Michèle Wigger arxiv:1508.01880v2 [cs.it] 28 May 2017 May 30, 2017 Abstract The capacity of the
More informationThe Poisson Channel with Side Information
The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH
More informationEfficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel
Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca
More informationThe Capacity Region of the Gaussian Cognitive Radio Channels at High SNR
The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract
More informationEE376A: Homework #3 Due by 11:59pm Saturday, February 10th, 2018
Please submit the solutions on Gradescope. EE376A: Homework #3 Due by 11:59pm Saturday, February 10th, 2018 1. Optimal codeword lengths. Although the codeword lengths of an optimal variable length code
More informationDispersion of the Gilbert-Elliott Channel
Dispersion of the Gilbert-Elliott Channel Yury Polyanskiy Email: ypolyans@princeton.edu H. Vincent Poor Email: poor@princeton.edu Sergio Verdú Email: verdu@princeton.edu Abstract Channel dispersion plays
More informationSimultaneous Nonunique Decoding Is Rate-Optimal
Fiftieth Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 1-5, 2012 Simultaneous Nonunique Decoding Is Rate-Optimal Bernd Bandemer University of California, San Diego La Jolla, CA
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More informationPaul Cuff, Han-I Su, and Abbas EI Gamal Department of Electrical Engineering Stanford University {cuff, hanisu,
Cascade Multiterminal Source Coding Paul Cuff, Han-I Su, and Abbas EI Gamal Department of Electrical Engineering Stanford University E-mail: {cuff, hanisu, abbas}@stanford.edu Abstract-We investigate distributed
More informationII. THE TWO-WAY TWO-RELAY CHANNEL
An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable
More informationTHE fundamental architecture of most of today s
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 4, APRIL 2015 1509 A Unified Approach to Hybrid Coding Paolo Minero, Member, IEEE, Sung Hoon Lim, Member, IEEE, and Young-Han Kim, Fellow, IEEE Abstract
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationStrong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach
Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Silas Fong (Joint work with Vincent Tan) Department of Electrical & Computer Engineering National University
More informationMultiuser Successive Refinement and Multiple Description Coding
Multiuser Successive Refinement and Multiple Description Coding Chao Tian Laboratory for Information and Communication Systems (LICOS) School of Computer and Communication Sciences EPFL Lausanne Switzerland
More informationX 1 : X Table 1: Y = X X 2
ECE 534: Elements of Information Theory, Fall 200 Homework 3 Solutions (ALL DUE to Kenneth S. Palacio Baus) December, 200. Problem 5.20. Multiple access (a) Find the capacity region for the multiple-access
More informationOptimal Encoding Schemes for Several Classes of Discrete Degraded Broadcast Channels
Optimal Encoding Schemes for Several Classes of Discrete Degraded Broadcast Channels Bike Xie, Student Member, IEEE and Richard D. Wesel, Senior Member, IEEE Abstract arxiv:0811.4162v4 [cs.it] 8 May 2009
More informationAn Outer Bound for the Gaussian. Interference channel with a relay.
An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il
More informationJoint Write-Once-Memory and Error-Control Codes
1 Joint Write-Once-Memory and Error-Control Codes Xudong Ma Pattern Technology Lab LLC, U.S.A. Email: xma@ieee.org arxiv:1411.4617v1 [cs.it] 17 ov 2014 Abstract Write-Once-Memory (WOM) is a model for many
More informationSide-information Scalable Source Coding
Side-information Scalable Source Coding Chao Tian, Member, IEEE, Suhas N. Diggavi, Member, IEEE Abstract The problem of side-information scalable (SI-scalable) source coding is considered in this work,
More informationUCSD ECE 255C Handout #12 Prof. Young-Han Kim Tuesday, February 28, Solutions to Take-Home Midterm (Prepared by Pinar Sen)
UCSD ECE 255C Handout #12 Prof. Young-Han Kim Tuesday, February 28, 2017 Solutions to Take-Home Midterm (Prepared by Pinar Sen) 1. (30 points) Erasure broadcast channel. Let p(y 1,y 2 x) be a discrete
More informationSolutions to Homework Set #2 Broadcast channel, degraded message set, Csiszar Sum Equality
1st Semester 2010/11 Solutions to Homework Set #2 Broadcast channel, degraded message set, Csiszar Sum Equality 1. Convexity of capacity region of broadcast channel. Let C R 2 be the capacity region of
More informationCapacity Region of the Permutation Channel
Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationAchievable Rates and Outer Bound for the Half-Duplex MAC with Generalized Feedback
1 Achievable Rates and Outer Bound for the Half-Duplex MAC with Generalized Feedback arxiv:1108.004v1 [cs.it] 9 Jul 011 Ahmad Abu Al Haija and Mai Vu, Department of Electrical and Computer Engineering
More informationCapacity of channel with energy harvesting transmitter
IET Communications Research Article Capacity of channel with energy harvesting transmitter ISSN 75-868 Received on nd May 04 Accepted on 7th October 04 doi: 0.049/iet-com.04.0445 www.ietdl.org Hamid Ghanizade
More informationSecret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper
Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Mohsen Bahrami, Ali Bereyhi, Mahtab Mirmohseni and Mohammad Reza Aref Information Systems and Security
More informationInteractive Hypothesis Testing with Communication Constraints
Fiftieth Annual Allerton Conference Allerton House, UIUC, Illinois, USA October - 5, 22 Interactive Hypothesis Testing with Communication Constraints Yu Xiang and Young-Han Kim Department of Electrical
More informationCases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem
Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem Soheil Feizi, Muriel Médard RLE at MIT Emails: {sfeizi,medard}@mit.edu Abstract In this paper, we
More informationShannon s noisy-channel theorem
Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for
More informationGraph Coloring and Conditional Graph Entropy
Graph Coloring and Conditional Graph Entropy Vishal Doshi, Devavrat Shah, Muriel Médard, Sidharth Jaggi Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,
More informationOn the Capacity of the Interference Channel with a Relay
On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due
More informationRepresentation of Correlated Sources into Graphs for Transmission over Broadcast Channels
Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu
More informationLecture 22: Final Review
Lecture 22: Final Review Nuts and bolts Fundamental questions and limits Tools Practical algorithms Future topics Dr Yao Xie, ECE587, Information Theory, Duke University Basics Dr Yao Xie, ECE587, Information
More informationSecret Key and Private Key Constructions for Simple Multiterminal Source Models
Secret Key and Private Key Constructions for Simple Multiterminal Source Models arxiv:cs/05050v [csit] 3 Nov 005 Chunxuan Ye Department of Electrical and Computer Engineering and Institute for Systems
More informationThe Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel
The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department
More informationOnline Scheduling for Energy Harvesting Broadcast Channels with Finite Battery
Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,
More informationDuality Between Channel Capacity and Rate Distortion With Two-Sided State Information
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 6, JUNE 2002 1629 Duality Between Channel Capacity Rate Distortion With Two-Sided State Information Thomas M. Cover, Fellow, IEEE, Mung Chiang, Student
More informationEE 4TM4: Digital Communications II. Channel Capacity
EE 4TM4: Digital Communications II 1 Channel Capacity I. CHANNEL CODING THEOREM Definition 1: A rater is said to be achievable if there exists a sequence of(2 nr,n) codes such thatlim n P (n) e (C) = 0.
More informationComputation of Information Rates from Finite-State Source/Channel Models
Allerton 2002 Computation of Information Rates from Finite-State Source/Channel Models Dieter Arnold arnold@isi.ee.ethz.ch Hans-Andrea Loeliger loeliger@isi.ee.ethz.ch Pascal O. Vontobel vontobel@isi.ee.ethz.ch
More informationDistributed Lossless Compression. Distributed lossless compression system
Lecture #3 Distributed Lossless Compression (Reading: NIT 10.1 10.5, 4.4) Distributed lossless source coding Lossless source coding via random binning Time Sharing Achievability proof of the Slepian Wolf
More informationSum Capacity of Gaussian Vector Broadcast Channels
Sum Capacity of Gaussian Vector Broadcast Channels Wei Yu, Member IEEE and John M. Cioffi, Fellow IEEE Abstract This paper characterizes the sum capacity of a class of potentially non-degraded Gaussian
More informationCapacity Bounds for Diamond Networks
Technische Universität München Capacity Bounds for Diamond Networks Gerhard Kramer (TUM) joint work with Shirin Saeedi Bidokhti (TUM & Stanford) DIMACS Workshop on Network Coding Rutgers University, NJ
More informationCan Feedback Increase the Capacity of the Energy Harvesting Channel?
Can Feedback Increase the Capacity of the Energy Harvesting Channel? Dor Shaviv EE Dept., Stanford University shaviv@stanford.edu Ayfer Özgür EE Dept., Stanford University aozgur@stanford.edu Haim Permuter
More informationBinary Dirty MAC with Common State Information
Binary Dirty MAC with Common State Information Anatoly Khina Email: anatolyk@eng.tau.ac.il Tal Philosof Email: talp@eng.tau.ac.il Ram Zamir Email: zamir@eng.tau.ac.il Uri Erez Email: uri@eng.tau.ac.il
More informationEE376A - Information Theory Final, Monday March 14th 2016 Solutions. Please start answering each question on a new page of the answer booklet.
EE376A - Information Theory Final, Monday March 14th 216 Solutions Instructions: You have three hours, 3.3PM - 6.3PM The exam has 4 questions, totaling 12 points. Please start answering each question on
More informationOn Scalable Source Coding for Multiple Decoders with Side Information
On Scalable Source Coding for Multiple Decoders with Side Information Chao Tian School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS), EPFL, Lausanne,
More informationOn Lossless Coding With Coded Side Information Daniel Marco, Member, IEEE, and Michelle Effros, Fellow, IEEE
3284 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 7, JULY 2009 On Lossless Coding With Coded Side Information Daniel Marco, Member, IEEE, Michelle Effros, Fellow, IEEE Abstract This paper considers
More informationTHE multiple-access relay channel (MARC) is a multiuser
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 10, OCTOBER 2014 6231 On Joint Source-Channel Coding for Correlated Sources Over Multiple-Access Relay Channels Yonathan Murin, Ron Dabora, and Deniz
More informationEECS 750. Hypothesis Testing with Communication Constraints
EECS 750 Hypothesis Testing with Communication Constraints Name: Dinesh Krithivasan Abstract In this report, we study a modification of the classical statistical problem of bivariate hypothesis testing.
More informationInformation Theory Meets Game Theory on The Interference Channel
Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University
More information