i.i.d. Mixed Inputs and Treating Interference as Noise are gdof Optimal for the Symmetric Gaussian Two-user Interference Channel

Size: px
Start display at page:

Download "i.i.d. Mixed Inputs and Treating Interference as Noise are gdof Optimal for the Symmetric Gaussian Two-user Interference Channel"

Transcription

1 iid Mixed nputs and Treating nterference as Noise are gdof Optimal for the Symmetric Gaussian Two-user nterference Channel Alex Dytso Daniela Tuninetti and Natasha Devroye University of llinois at Chicago Chicago L USA odytso2 danielat uicedu Abstract While a multi-letter limiting expression of the capacity region of the two-user Gaussian interference channel is known capacity is generally considered to be open as this is not computable Other computable capacity outer bounds are known to be achievable to within /2 bit using Gaussian inputs and joint decoding in the simplified Han and Kobayashi singleletter achievable rate region This work shows that the simple scheme known as treating interference as noise without timesharing attains the capacity region outer bound of the symmetric Gaussian interference channel to within either a constant gap or a gap of order Olog logsnr for all parameter regimes The scheme is therefore optimal in the generalized Degrees of Freedom gdof region sense almost surely The achievability is obtained by using iid mixed inputs ie a superposition of discrete and Gaussian random variables in the multi-letter capacity expression where the optimal number of points in the discrete part of the inputs as well as the optimal power split among the discrete and continuous parts of the inputs are characterized in closed form An important practical implication of this result is that the discrete part of the inputs behaves as a common message whose contribution can be removed from the channel output even though joint decoding is not employed Moreover time-sharing may be mimicked by varying the number of points in the discrete part of the inputs NTRODUCTON The memoryless real-valued additive white Gaussian noise interference channel G-C has input-output relationship Y n = h X n + h 2 X2 n + Z n a Y2 n = h 2 X n + h 22 X2 n + Z2 n b where Xj n := X j X jn and Yj n := Y j Y jn are the length-n vector inputs and outputs respectively for user j [ : 2] the noise vectors Zj n have iid zero-mean unitvariance Gaussian components for n the block length The input Xj n is a function of the independent message W j that is uniformly distributed on [ : 2 nrj ] where R j is the rate for user j [ : 2] and is subject to a per-block power constraint n n i= X2 ji Receiver j [ : 2] wishes to recover W j from the channel output Yj n with arbitrarily small probability of error Achievable rates and capacity region are defined in the usual way [] For sake of simplicity we shall focus from now on on the symmetric G-C only defined as h 2 = h 22 2 = S 0 h 2 2 = h 2 2 = 0 and denote the capacity region as CS The restriction to the symmetric case is just to reduce the number of parameters in our derivations; we believe that the results of this paper hold for the general asymmetric case Past Work The general information stable two-user interference channel was first introduced in [2] and its capacity may be characterized as C = lim n co P X n X n 2 =P X n P X n 2 R n Xn ; Y n R 2 n Xn 2 ; Y2 n where co denotes the convex hull operation Unfortunately the capacity expression in 2 is considered uncomputable in a sense that it is not known explicitly how to characterize the input distributions that attain its convex closure Moreover it is not clear whether there exists an equivalent single-letter form for 2 in general For the G-C an equivalent single-letter form is known in the strong interference region [3] given by S in the symmetric case Because of it uncomputability the capacity expression in 2 has received little attention except for [4] where it was shown that jointly Gaussian inputs may not be optimal nstead the field has focussed on finding alternative ways to characterize single-letter inner and outer bounds The best known inner bound is the Han and Kobayashi HK achievable scheme [5] which is capacity achieving in all cases where capacity is known [] Except for the strong interference regime the sum-capacity of the G-C is known exactly only for the Z-channel and in 2 S + 2 the noisy interference regime defined by in the symmetric case for which iid Gaussian inputs in 2 are optimal [] So instead of pursuing exact results the community has recently focussed on giving performance guarantees on approximations of the capacity region n [6] the authors showed that the HK scheme with Gaussian inputs and without time-sharing is optimal to within /2 bit/sec/hz irrespective of the channel parameters This constant gap result provides an exact characterization of the generalized Degrees of Freedom gdof region defined as R i S = S α Dα := d d 2 : d i := lim S i [ : 2] 2 log + S R R 2 is achievable /5/$ EEE 76 ST 205

2 and where Dα : d d 2 d + d 2 [ α] + + maxα d + d 2 max α α + max α α 2d + d 2 [ α] + + max α + max α α d + 2d 2 [ α] + + max α + max α α P X X 2 =P X P X2 4a 4b 4c 4d 4e Contribution n this work we focus on the following capacity inner bound obtained by using iid inputs in 2 R TN R X in S = ; Y 5 R 2 X 2 ; Y 2 commonly referred to as the treating interference as noise TN inner bound Note that the TN region may not be convex because a time-sharing / convex-hull operation is not considered Our major contribution is to show that iid mixed inputs ie a superposition of discrete and Gaussian random variables in the TN region in 5 achieve the capacity region outer bound to within a gap and thus are optimal for the whole gdof region in 4 This work extends our past work in [7] where we demonstrated that iid mixed inputs achieve the symmetric sum-capacity while here we consider the whole capacity region to within a constant gap or to within Olog log S up to a outage set whose Lebesgue measure is a controllable parameter We note that a similar result ie optimality of TN in all parameter regimes was pointed out in [ Remark 62] However the proof is not constructive and is based on showing that TN is optimal for the linear deterministic model LDA and then using a universal gap between the LDA and G-C to arrive at the result Unfortunately this approach results in a very large gap and characterization of the inputs for the G-C from the LDA is not immediate On the other hand our proof is constructive and provides in closed form the optimal number of points in the discrete part of the inputs as well as the optimal power split among the discrete and continuous parts of the inputs An important practical implication of this result is that the discrete part of the inputs behaves as a common message whose contribution can be removed from the channel output even though joint decoding is not employed Moreover time-sharing may be mimicked by varying the number of points in the discrete part of the inputs Notation convention Throughout the paper we adopt the following notation Lower case variables are instances of upper case random variables rv which take on values in calligraphic alphabets We let N d x := + x 6 g x := log + x 7 2 d X := [ ] + HX gap 8 8 gap 8 := 2πe 2 log log + 2 d 2 9 minx where the subscripts d and g remind the reader that discrete and Gaussian respectively inputs are involved HX is the entropy of the discrete rv X and [x] + := max0 x [n : n 2 ] is the set of integers from n to n 2 n f A is a rv we denote its support by suppa The symbol denotes: A is the cardinality of the set A X is the cardinality of suppx of the random variable X or x is the absolute value of the real-valued x For x R x is the largest integer not greater than x d mins := min i j:sis j S s i s j is the minimum distance among the points in the set S With some abuse of notation we also use d minx to denote d minsuppx for a rv X X PAM N d minx denotes the uniform probability mass function over a zero-mean Pulse Amplitude Modulation PAM constellation with suppx = N points minimum N 2 2 distance d minx and average energy E[X 2 ] = d 2 minx ms denotes Lebesgue measure of the set S For i [ : 2] we let i [ : 2] to be i i MAN TOOLS n the rest of the paper due to space limitations proofs are omitted and may be found in [8] At the core of our proofs is the following lower bound on the rate achieved by a discrete input on a point-to-point additive noise channel Prop Let X D be a discrete random variable whose support has size N minimum distance d minxd and average power E[XD 2 ] Let Z be a zero-mean unit-variance random variable independent of X D not necessarily Gaussian Then d X D X D ; X D + Z HX D 0 where d is defined in 8 Rem The upper bound in 0 for Z = Z G N 0 may be tightened to X D ; X D + Z G min HX D g E[X 2 D] since a Gaussian input is capacity achieving for the powerconstrained point-to-point Gaussian noise channel n the following we shall use a mixed input at each user; this implies that a receiver sees a linear combination of two discrete constellations; in order to apply Prop we need to lower bound the minimum distance of the resulting sumset The following set of sufficient conditions will play an important role in evaluating the minimum distance of mixed input constellations in our TN inner bound Prop 2 Let h x h y R 2 be two constants Let X PAM X d minx and Y PAM Y d miny Then h x X + h y Y = X Y d minhxx+h yy = min h x d minx h y d miny under the following conditions either Y h y d miny h x d minx or X h x d minx h y d miny 2a 2b 77

3 When Prop 2 is not applicable we shall use: Prop 3 Let X PAM X d minx and Y PAM Y d miny Then for h x h y R 2 we have h x X + h y X = X Y almost surely as 3a and for any γ > 0 there exists a set E R such that for all h x h y E we have d minhxx+h yy κ γ X Y min h x d minx hx d minx h y d miny max h y d miny 3b Y X where the complement of the set E referred to as the outage set has Lebesgue measure smaller than γ and where γ κ γ X Y = 2 + lnmax X Y MAN RESULT For the G-C in we now evaluate the TN region in 5 with mixed inputs X i = δ i X id + δ i X ig i [ : 2] : 4a 2 X id PAM N i Ni 2 4b X ig N x ig ; 0 P := [N N 2 δ δ 2 ] N N [0 ] [0 ] 4c 4d where the random variables X ij are independent for i [ : 2] j D G A careful choice of the parameters in P will lead to the desired results in different parameter regimes From the TN region in 5 we have: Prop 4 For the G-C the following region is achievable R in S := R in S ; P 5a P N 2 [0] 2 where R in S ; P is a lower bound on the TN region in 5 evaluated for the mixed input in 4 with fixed parameter vector P := [N N 2 δ δ 2 ] given by Sδi R in S ; P := R R 2 : R i d S i + g min logn i g δi + δ i i [ : 2] + δ i 5b and where the equivalent discrete constellations seen at the receivers are δi SXiD + δ i Xi D S i := 5c + Sδi + δ i for i i [ : 2] and the functionals d and g are defined in 8 and 7 respectively From Prop 4 it follows that the following gdof region is achievable: Prop 5 Parametrize the number of points and the power splits in the mixed inputs in 4 as N i = N d S βi β i 0 δ i = + S p pi i 0 6a for i [ : 2] where N d is defined in 6 For the G-C an achievable gdof region ae is D in α = D in α; p 6b p:=[β β 2p p 2]p R 4 + D in α; p = d d 2 : d i β + β 2 + [ p i [α p i ] + ] + minβ i α [α p i ] + i [ : 2] 6c provided that at least one of the following conditions hold for all i [ : 2] α β i and max p i α p i 0 min β i α β i = 0 2 α β i and max p i α p i 0 min β i α β i = 0 3 max p i α p i 0 min β i α β i max β i β i α β i β i = 0 The main result of this paper is the following theorem: 6d 6e 6f Theorem For the symmetric G-C the TN-based achievable region in 5a is optimal to within a constant gap or a gap of order Olog logs up to an outage set and it is therefore gdof optimal up to a set of measure zero Proof: Depending on the parameters S = S α we identify the following operational regimes: Very Strong nterference: α 2 2 Strong nterference: α < 2 3 Weak nterference Type : 2/3 α < 4 Weak nterference Type : /2 α < 2/3 5 Very Weak nterference: 0 α < /2 We shall consider each regime individually by picking the parameters of the mixed inputs such that inner and outer bounds approximately match Here we view the discrete and the Gaussian part of the mixed input as a common and a private message respectively in the HK scheme Thus a critical aspect of our analysis is to identify the optimal rate split for each point on the convex closure of the capacity region outer bound By using [9 Lem 4] which can be thought of as the gdof region in 4 before Fourier-Motzkin elimination we found that either it is optimal to user p i = α in 6a or equally split the rate between common and private messages a Very Strong nterference Regime: α 2: n this regime it is optimal to send only common messages and to perform successive decoding starting with the interfering message While joint decoding is not allowed in our TN region the discrete part of the inputs behaves as common message ie as if it could be decoded at non intended destination The gdof region in 4 is D Very Strong : d d 2 78

4 which is easily matched by the achievable scheme in Prop 5 by using p = [ ] n order to complete the proof we show that the condition in 6d is satisfied: α β i i [ : 2] α β 2 α where the last implication comes from the definition of regime For the finite S the capacity region in maxr R 2 g S We set δ i = 0 N i = N d S i [ : 2] and thus for sum-sets in 5c we have S = S 2 := S; the gap is thus readily computed as gap = g S d S 6πe 2 log 75 2 b Strong nterference: α < 2: Capacity in this regime is achieved by sending only common messages Thus similar to the very strong interference regime we set δ = δ 2 = 0 However unlike in the very strong interference regime we vary the number of points in the discrete part in order to mimic time sharing for a reason that will become clear soon n this regime the gdof region is that of a Compound MAC and in parametric form is given by D Strong α = t [0] d t + t α := β t d 2 t α + t := β 2 t Note that the parameter t [0 ] is used to time-share between the two corner points of the capacity region in this case a MAC-region This parametric form of the gdof region is matched to the achievable scheme in Prop 5 by using pt = [β t β 2 t ] t [0 ] To complete the proof we choose to verify the condition in 6f for i = and for all t [0 ] by symmetry it also holds for i = 2; we have min β t α β 2 t max β t β 2 t α β t β 2 t = max t t α α t α t 0 = 0 t [0 ] and the last equality follows since in this regime we have α β t α β 2 t t [0 ] For finite S the outer bound for this regime can be written as R t g + t g S R Strong S = t [0] +S := g S t R 2 t g +S + t g S := g S 2t By choosing δ i = 0 N i = N d S it i [ : 2] we have that the gap is gap = max gs it d S it i [:2] 2 log 2πe ln + S 2 3 γ 2 where we used Prop 3 to bound minimum distance of the sum-set constellations at the receivers and where such a bound holds everywhere except a set of measure γ c Weak Type : 2/3 α < : n this regime the best known strategy is to send common and private messages with a power split as in [6] Thus as in the strong interference regime we vary the number of points in the discrete parts to mimic time sharing but unlike the strong interference regime we also use the Gaussian part of the inputs ie δ δ 2 are non-zero to allow for a private message As we shall see for our TN-based scheme a single power split as in [6] does not suffice to achieve all points in the gdof region; we will thus also vary δ δ 2 in addition to β and β 2 n this regime the gdof region in 4 can be written in the parametric form as D Weak α = D d+d 2 α t D 2d+d 2 α t t [0] α t D d+d 2 d t2α + t α + α := β a t + α d 2 t α + t2α + α := β 2a t + α d D 2d+d 2 d 2 t α + t α := β 2b t + t α d β 2b t + t α β 2a t + α d 2 t2α + tα + α := β 2a t + α where again t [0 ] is used to time-share Next D d+d 2 α t is matched to Prop 5 by picking pt =[β a t β b t α α] t [0 ] To complete the achievability of D d+d 2 α t we show that 6f is satisfied Due to the symmetry it is enough to verify condition 6f for i = for all t [0 ] which gives α min β a t α β 2a t max β a t β 2a t α β a t β 2a t = α min t2α t α α t α t2α α t [0 ] = α α = 0 t [0 ] The region D 2d+d 2 α t is matched to Prop 5 with pt =[β 2a t β 2b t α t α] t [0 ] 79

5 To complete achievability of D 2d+d 2 α t we verify condition 6f for S the one for S 2 follows similarly that is max0 p α p 2 min β 2a t α β 2b t max β 2a t β 2b t α β 2a t β 2b t = max0 α α t α min t2α + tα α t α α = 0 t [0 ] n order to achieve D 2d+d 2 and ie points on the closure on the region but not on the sum-rate face we had to vary both the common ie β i s and private ie p i s part of the messages to mimic time sharing and power control Another important observation is that we exactly characterized the set of parameters needed to achieve every rate pair on the closure of D Weak a characterization that is not obvious from the work in [6] which in fact seems to suggest that a single power split suffices to achieve all points in the gdof region The proof of optimality of the proposed scheme to within a gap of order Olog logs is quite tedious and it is not reported here for sake of space; the details can be found in [8] Rem 2 We remark that in order to bound the minimum distance of the received constellations in strong and weak type interference regimes we have used Prop 3 which implies that there exists a set of measure 0 where 5a is strictly below the outer bound 4 This comes as no surprise from [0] we know that in the vicinity of α = for two-user G- C constellation based schemes perform poorly when channel gains are rationally dependent and outage sets have been used to circumvent this Moreover for more than two users this becomes an artifact of the capacity region itself d Weak nterference Type : /2 α < 2/3: n this regime the gdof region in 4 can be written as D Weak : α = Dd H +d 2 α t Dd L +d 2 α t D d+d 2 t [0] D 2d+d 2 α t α t d t2 2α +t4α 2 := β a t + t α + t2α d 2 t4α 2 +t2 2α := β b t + t2α + t α d t2 2α + t := β D 2d+d 2 2a t + α d 2 t4α 2 := β 2b t + t2α d β 2b t + t2α β 2a t + α d 2 Next D d+d 2 α t is achievable for all t [0 ] by picking pt = [β a t β b t β a t β b t] in Prop 5 and verifying the condition in 6e which we do not report here as it is similar to the previous regime For α t we pick pt = [β 2a t β 2b t α β 2b t] in Prop 5 and verify the condition 6d for receiver one and condition 6e for receiver two By symmetry α t is achievable by swapping the users The proof of optimality of the proposed scheme to within a constant gap is quite tedious and it is not reported here for sake of space; the details can be found in [8] e Very Weak nterference: 0 α < /2: Gaussian inputs with power control and treating interference as noise are optimal to within /2 bit from the work of [6] Since this scheme is a special case of the TN region with mixed inputs with N = N 2 = the claimed optimality follows V CONCLUSON n this paper we proved that a very simple generally applicable lower bound that does neither require joint decoding nor time sharing is optimal to within an additive gap either constant uniformly over the channel gains or of order Olog logs up to an outage set of controllable measure and thus achieves the optimal gdof region of the twouser symmetric G-C for all channel parameters Our result demonstrates that properly accounting for the distribution of the interference ie not Gaussian with our mixed inputs when treating interference as noise results in near optimal rates in all channel parameters Moreover an exact characterization of the closure of gdof region together with the fact that we used PAM signals with closed form expressions for the number of points and the power splits makes the scheme practical ACKNOWLEDGMENT The work of the authors was partially funded by NSF under awards and 4225 REFERENCES [] A El Gamal and Y-H Kim Network nformation Theory Camrbidge University Press 202 [2] R Ahlswede Multi-way communication channels in Proc EEE nt Symp nf Theory Mar 973 pp [3] A Carleial nterference channels EEE Trans nf Theory vol T-24 no pp Jan 978 [4] R Cheng and S Verdu On limiting characterizations of memoryless multiuser capacity regions EEE Trans nf Theory vol 39 no 2 pp [5] T Han and K Kobayashi A new achievable rate region for the interference channel EEE Trans nf Theory vol T-27 no pp Jan 98 [6] R Etkin D Tse and H Wang Gaussian interference channel capacity to within one bit EEE Trans nf Theory vol 54 no 2 pp Dec 2008 [7] A Dytso N Devroye and D Tuninetti On Gaussian interference channels with mixed gaussian and discrete inputs in Proc EEE nt Symp nf Theory June 204 pp [8] A Dytso D Tuninetti and N Devroye nterference as noise: Friend or foe? Submitted to EEE Trans nf Theory 205 [9] G Bresler and D Tse The two-user Gaussian interference channel: A deterministic view EuroTrans Telecom vol 9 pp Apr 2008 [0] R Etkin and E Ordentlich The degrees-of-freedom of the K-user Gaussian interference channel is discontinuous at rational channel coefficients EEE Trans nf Theory vol 55 no pp Nov

On Gaussian Interference Channels with Mixed Gaussian and Discrete Inputs

On Gaussian Interference Channels with Mixed Gaussian and Discrete Inputs On Gaussian nterference Channels with Mixed Gaussian and Discrete nputs Alex Dytso Natasha Devroye and Daniela Tuninetti University of llinois at Chicago Chicago L 60607 USA Email: odytso devroye danielat

More information

On the Optimality of Treating Interference as Noise in Competitive Scenarios

On the Optimality of Treating Interference as Noise in Competitive Scenarios On the Optimality of Treating Interference as Noise in Competitive Scenarios A. DYTSO, D. TUNINETTI, N. DEVROYE WORK PARTIALLY FUNDED BY NSF UNDER AWARD 1017436 OUTLINE CHANNEL MODEL AND PAST WORK ADVANTAGES

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 3, MARCH

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 3, MARCH IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 6, NO., MARCH 05 57 On the Two-User Interference Channel With Lack of Knowledge of the Interference Codebook at One Receiver Alex Dytso, Daniela Tuninetti,

More information

On the K-user Cognitive Interference Channel with Cumulative Message Sharing Sum-Capacity

On the K-user Cognitive Interference Channel with Cumulative Message Sharing Sum-Capacity 03 EEE nternational Symposium on nformation Theory On the K-user Cognitive nterference Channel with Cumulative Message Sharing Sum-Capacity Diana Maamari, Daniela Tuninetti and Natasha Devroye Department

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

A Comparison of Two Achievable Rate Regions for the Interference Channel

A Comparison of Two Achievable Rate Regions for the Interference Channel A Comparison of Two Achievable Rate Regions for the Interference Channel Hon-Fah Chong, Mehul Motani, and Hari Krishna Garg Electrical & Computer Engineering National University of Singapore Email: {g030596,motani,eleghk}@nus.edu.sg

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

Feedback Capacity of the Gaussian Interference Channel to Within Bits: the Symmetric Case

Feedback Capacity of the Gaussian Interference Channel to Within Bits: the Symmetric Case 1 arxiv:0901.3580v1 [cs.it] 23 Jan 2009 Feedback Capacity of the Gaussian Interference Channel to Within 1.7075 Bits: the Symmetric Case Changho Suh and David Tse Wireless Foundations in the Department

More information

An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel

An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 8-3, An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel Invited Paper Bernd Bandemer and

More information

820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY Stefano Rini, Daniela Tuninetti, and Natasha Devroye

820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY Stefano Rini, Daniela Tuninetti, and Natasha Devroye 820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY 2012 Inner and Outer Bounds for the Gaussian Cognitive Interference Channel and New Capacity Results Stefano Rini, Daniela Tuninetti,

More information

On Gaussian MIMO Broadcast Channels with Common and Private Messages

On Gaussian MIMO Broadcast Channels with Common and Private Messages On Gaussian MIMO Broadcast Channels with Common and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ersen@umd.edu

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

Survey of Interference Channel

Survey of Interference Channel Survey of Interference Channel Alex Dytso Department of Electrical and Computer Engineering University of Illinois at Chicago, Chicago IL 60607, USA, Email: odytso2 @ uic.edu Abstract Interference Channel(IC)

More information

Approximate Sum-Capacity of Full- and Half-Duplex Asymmetric Interference Channels with Unilateral Source Cooperation

Approximate Sum-Capacity of Full- and Half-Duplex Asymmetric Interference Channels with Unilateral Source Cooperation 1 Approximate Sum-Capacity of Full- and Half-Duplex Asymmetric Interference Channels with Unilateral Source Cooperation Martina Cardone, Daniela Tuninetti, Raymond Knopp, Umer Salim Eurecom, Sophia Antipolis,

More information

Interference Channel aided by an Infrastructure Relay

Interference Channel aided by an Infrastructure Relay Interference Channel aided by an Infrastructure Relay Onur Sahin, Osvaldo Simeone, and Elza Erkip *Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, Department

More information

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages Degrees of Freedom Region of the Gaussian MIMO Broadcast hannel with ommon and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and omputer Engineering University of Maryland, ollege

More information

On the Capacity Region of the Gaussian Z-channel

On the Capacity Region of the Gaussian Z-channel On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu

More information

On the Minimum Mean p-th Error in Gaussian Noise Channels and its Applications

On the Minimum Mean p-th Error in Gaussian Noise Channels and its Applications On the Minimum Mean p-th Error in Gaussian Noise Channels and its Applications Alex Dytso, Ronit Bustin, Daniela Tuninetti, Natasha Devroye, H. Vincent Poor, and Shlomo Shamai (Shitz) Notation X 2 R n,

More information

On Network Interference Management

On Network Interference Management On Network Interference Management Aleksandar Jovičić, Hua Wang and Pramod Viswanath March 3, 2008 Abstract We study two building-block models of interference-limited wireless networks, motivated by the

More information

Diversity-Multiplexing Tradeoff of the Two-User Interference Channel

Diversity-Multiplexing Tradeoff of the Two-User Interference Channel Diversity-Multiplexing Tradeoff of the Two-User Interference Channel arxiv:0905.0385v2 [cs.it] 8 Sep 2009 Adnan Raja and Pramod Viswanath April 9, 2018 Abstract Diversity-Multiplexing tradeoff DMT) is

More information

On the Capacity of the Interference Channel with a Relay

On the Capacity of the Interference Channel with a Relay On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due

More information

On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation

On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang 1 arxiv:1308.3310v1 [cs.it] 15 Aug 2013

More information

HetNets: what tools for analysis?

HetNets: what tools for analysis? HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March

More information

A Comparison of Superposition Coding Schemes

A Comparison of Superposition Coding Schemes A Comparison of Superposition Coding Schemes Lele Wang, Eren Şaşoğlu, Bernd Bandemer, and Young-Han Kim Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Interference channel capacity region for randomized fixed-composition codes

Interference channel capacity region for randomized fixed-composition codes Interference channel capacity region for randomized fixed-composition codes Cheng Chang D. E. Shaw & Co, New York, NY. 20 West 45th Street 39th Floor New York, NY 0036 cchang@eecs.berkeley.edu Abstract

More information

Lecture 1: The Multiple Access Channel. Copyright G. Caire 12

Lecture 1: The Multiple Access Channel. Copyright G. Caire 12 Lecture 1: The Multiple Access Channel Copyright G. Caire 12 Outline Two-user MAC. The Gaussian case. The K-user case. Polymatroid structure and resource allocation problems. Copyright G. Caire 13 Two-user

More information

Simultaneous Nonunique Decoding Is Rate-Optimal

Simultaneous Nonunique Decoding Is Rate-Optimal Fiftieth Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 1-5, 2012 Simultaneous Nonunique Decoding Is Rate-Optimal Bernd Bandemer University of California, San Diego La Jolla, CA

More information

Draft. On Limiting Expressions for the Capacity Region of Gaussian Interference Channels. Mojtaba Vaezi and H. Vincent Poor

Draft. On Limiting Expressions for the Capacity Region of Gaussian Interference Channels. Mojtaba Vaezi and H. Vincent Poor Preliminaries Counterexample Better Use On Limiting Expressions for the Capacity Region of Gaussian Interference Channels Mojtaba Vaezi and H. Vincent Poor Department of Electrical Engineering Princeton

More information

Interference Channels with Source Cooperation

Interference Channels with Source Cooperation Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL

More information

Mismatched Multi-letter Successive Decoding for the Multiple-Access Channel

Mismatched Multi-letter Successive Decoding for the Multiple-Access Channel Mismatched Multi-letter Successive Decoding for the Multiple-Access Channel Jonathan Scarlett University of Cambridge jms265@cam.ac.uk Alfonso Martinez Universitat Pompeu Fabra alfonso.martinez@ieee.org

More information

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Achaleshwar Sahai Department of ECE, Rice University, Houston, TX 775. as27@rice.edu Vaneet Aggarwal Department of

More information

Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel

Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Jun Chen Dept. of Electrical and Computer Engr. McMaster University Hamilton, Ontario, Canada Chao Tian AT&T Labs-Research 80 Park

More information

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel Achaleshwar Sahai, Vaneet Aggarwal, Melda Yuksel and Ashutosh Sabharwal 1 Abstract arxiv:1104.4805v3 [cs.it]

More information

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,

More information

On the Secrecy Capacity of the Z-Interference Channel

On the Secrecy Capacity of the Z-Interference Channel On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer

More information

Interference Decoding for Deterministic Channels Bernd Bandemer, Student Member, IEEE, and Abbas El Gamal, Fellow, IEEE

Interference Decoding for Deterministic Channels Bernd Bandemer, Student Member, IEEE, and Abbas El Gamal, Fellow, IEEE 2966 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 Interference Decoding for Deterministic Channels Bernd Bemer, Student Member, IEEE, Abbas El Gamal, Fellow, IEEE Abstract An inner

More information

Approximate Capacity of Fast Fading Interference Channels with no CSIT

Approximate Capacity of Fast Fading Interference Channels with no CSIT Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called

More information

On the Applications of the Minimum Mean p th Error to Information Theoretic Quantities

On the Applications of the Minimum Mean p th Error to Information Theoretic Quantities On the Applications of the Minimum Mean p th Error to Information Theoretic Quantities Alex Dytso, Ronit Bustin, Daniela Tuninetti, Natasha Devroye, H. Vincent Poor, and Shlomo Shamai (Shitz) Outline Notation

More information

Approximate Ergodic Capacity of a Class of Fading Networks

Approximate Ergodic Capacity of a Class of Fading Networks Approximate Ergodic Capacity of a Class of Fading Networks Sang-Woon Jeon, Chien-Yi Wang, and Michael Gastpar School of Computer and Communication Sciences EPFL Lausanne, Switzerland {sangwoon.jeon, chien-yi.wang,

More information

Coding over Interference Channels: An Information-Estimation View

Coding over Interference Channels: An Information-Estimation View Coding over Interference Channels: An Information-Estimation View Shlomo Shamai Department of Electrical Engineering Technion - Israel Institute of Technology Information Systems Laboratory Colloquium

More information

Communication Games on the Generalized Gaussian Relay Channel

Communication Games on the Generalized Gaussian Relay Channel Communication Games on the Generalized Gaussian Relay Channel Dileep M. alathil Department of Electrical Engineering University of Southern California manisser@usc.edu Rahul Jain EE & ISE Departments University

More information

An Outer Bound for the Gaussian. Interference channel with a relay.

An Outer Bound for the Gaussian. Interference channel with a relay. An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il

More information

Multicoding Schemes for Interference Channels

Multicoding Schemes for Interference Channels Multicoding Schemes for Interference Channels 1 Ritesh Kolte, Ayfer Özgür, Haim Permuter Abstract arxiv:1502.04273v1 [cs.it] 15 Feb 2015 The best known inner bound for the 2-user discrete memoryless interference

More information

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Stefano Rini, Ernest Kurniawan and Andrea Goldsmith Technische Universität München, Munich, Germany, Stanford University,

More information

On Multiple User Channels with State Information at the Transmitters

On Multiple User Channels with State Information at the Transmitters On Multiple User Channels with State Information at the Transmitters Styrmir Sigurjónsson and Young-Han Kim* Information Systems Laboratory Stanford University Stanford, CA 94305, USA Email: {styrmir,yhk}@stanford.edu

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Cognitive Multiple Access Networks

Cognitive Multiple Access Networks Cognitive Multiple Access Networks Natasha Devroye Email: ndevroye@deas.harvard.edu Patrick Mitran Email: mitran@deas.harvard.edu Vahid Tarokh Email: vahid@deas.harvard.edu Abstract A cognitive radio can

More information

The Capacity Region of a Class of Discrete Degraded Interference Channels

The Capacity Region of a Class of Discrete Degraded Interference Channels The Capacity Region of a Class of Discrete Degraded Interference Channels Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@umd.edu

More information

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel

More information

Random Access: An Information-Theoretic Perspective

Random Access: An Information-Theoretic Perspective Random Access: An Information-Theoretic Perspective Paolo Minero, Massimo Franceschetti, and David N. C. Tse Abstract This paper considers a random access system where each sender can be in two modes of

More information

Variable Length Codes for Degraded Broadcast Channels

Variable Length Codes for Degraded Broadcast Channels Variable Length Codes for Degraded Broadcast Channels Stéphane Musy School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland Email: stephane.musy@ep.ch Abstract This paper investigates

More information

Lecture 5 Channel Coding over Continuous Channels

Lecture 5 Channel Coding over Continuous Channels Lecture 5 Channel Coding over Continuous Channels I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw November 14, 2014 1 / 34 I-Hsiang Wang NIT Lecture 5 From

More information

The two-user Gaussian interference channel: a deterministic view

The two-user Gaussian interference channel: a deterministic view EUROPEA TRASACTIOS O TELECOMMUICATIOS Eur. Trans. Telecomms. 2008; 9:333 354 Published online 9 April 2008 in Wiley InterScience (www.interscience.wiley.com.287 The two-user Gaussian interference channel:

More information

A Summary of Multiple Access Channels

A Summary of Multiple Access Channels A Summary of Multiple Access Channels Wenyi Zhang February 24, 2003 Abstract In this summary we attempt to present a brief overview of the classical results on the information-theoretic aspects of multiple

More information

L interférence dans les réseaux non filaires

L interférence dans les réseaux non filaires L interférence dans les réseaux non filaires Du contrôle de puissance au codage et alignement Jean-Claude Belfiore Télécom ParisTech 7 mars 2013 Séminaire Comelec Parts Part 1 Part 2 Part 3 Part 4 Part

More information

THE practical bottleneck of today s communication networks

THE practical bottleneck of today s communication networks 1 Interference Channel with Generalized Feedback (a.k.a. with source cooperation: Part I: Achievable Region Shuang (Echo Yang and Daniela Tuninetti Abstract An Interference Channel with Generalized Feedback

More information

Cut-Set Bound and Dependence Balance Bound

Cut-Set Bound and Dependence Balance Bound Cut-Set Bound and Dependence Balance Bound Lei Xiao lxiao@nd.edu 1 Date: 4 October, 2006 Reading: Elements of information theory by Cover and Thomas [1, Section 14.10], and the paper by Hekstra and Willems

More information

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca

More information

On the Duality between Multiple-Access Codes and Computation Codes

On the Duality between Multiple-Access Codes and Computation Codes On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch

More information

Joint Source-Channel Coding for the Multiple-Access Relay Channel

Joint Source-Channel Coding for the Multiple-Access Relay Channel Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il

More information

A New Metaconverse and Outer Region for Finite-Blocklength MACs

A New Metaconverse and Outer Region for Finite-Blocklength MACs A New Metaconverse Outer Region for Finite-Blocklength MACs Pierre Moulin Dept of Electrical Computer Engineering University of Illinois at Urbana-Champaign Urbana, IL 680 Abstract An outer rate region

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

Distributed Lossless Compression. Distributed lossless compression system

Distributed Lossless Compression. Distributed lossless compression system Lecture #3 Distributed Lossless Compression (Reading: NIT 10.1 10.5, 4.4) Distributed lossless source coding Lossless source coding via random binning Time Sharing Achievability proof of the Slepian Wolf

More information

Information Dimension

Information Dimension Information Dimension Mina Karzand Massachusetts Institute of Technology November 16, 2011 1 / 26 2 / 26 Let X would be a real-valued random variable. For m N, the m point uniform quantized version of

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Capacity of Fading Broadcast Channels with Limited-Rate Feedback

Capacity of Fading Broadcast Channels with Limited-Rate Feedback Capacity of Fading Broadcast Channels wi Limited-Rate Feedback Rajiv Agarwal and John Cioffi Department of Electrical Engineering Stanford University, CA-94305 Abstract In is paper, we study a fading broadcast

More information

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu

More information

Capacity Bounds for. the Gaussian Interference Channel

Capacity Bounds for. the Gaussian Interference Channel Capacity Bounds for the Gaussian Interference Channel Abolfazl S. Motahari, Student Member, IEEE, and Amir K. Khandani, Member, IEEE Coding & Signal Transmission Laboratory www.cst.uwaterloo.ca {abolfazl,khandani}@cst.uwaterloo.ca

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

The Gallager Converse

The Gallager Converse The Gallager Converse Abbas El Gamal Director, Information Systems Laboratory Department of Electrical Engineering Stanford University Gallager s 75th Birthday 1 Information Theoretic Limits Establishing

More information

Gaussian Relay Channel Capacity to Within a Fixed Number of Bits

Gaussian Relay Channel Capacity to Within a Fixed Number of Bits Gaussian Relay Channel Capacity to Within a Fixed Number of Bits Woohyuk Chang, Sae-Young Chung, and Yong H. Lee arxiv:.565v [cs.it] 23 Nov 2 Abstract In this paper, we show that the capacity of the threenode

More information

Interference Alignment at Finite SNR for TI channels

Interference Alignment at Finite SNR for TI channels Interference Alignment at Finite SNR for Time-Invariant channels Or Ordentlich Joint work with Uri Erez EE-Systems, Tel Aviv University ITW 20, Paraty Background and previous work The 2-user Gaussian interference

More information

The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference

The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference Soheyl Gherekhloo, Anas Chaaban, and Aydin Sezgin Chair of Communication Systems RUB, Germany Email: {soheyl.gherekhloo,

More information

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu

More information

arxiv: v1 [cs.it] 4 Jun 2018

arxiv: v1 [cs.it] 4 Jun 2018 State-Dependent Interference Channel with Correlated States 1 Yunhao Sun, 2 Ruchen Duan, 3 Yingbin Liang, 4 Shlomo Shamai (Shitz) 5 Abstract arxiv:180600937v1 [csit] 4 Jun 2018 This paper investigates

More information

Amobile satellite communication system, like Motorola s

Amobile satellite communication system, like Motorola s I TRANSACTIONS ON INFORMATION THORY, VOL. 45, NO. 4, MAY 1999 1111 Distributed Source Coding for Satellite Communications Raymond W. Yeung, Senior Member, I, Zhen Zhang, Senior Member, I Abstract Inspired

More information

Approximate Capacity of the MIMO Relay Channel

Approximate Capacity of the MIMO Relay Channel 04 IEEE International Symposium on Information Theory Approximate Capacity of the MIMO Relay Channel Xianglan Jin Department of Electrical and Computer Engineering Pusan National University Busan 609-735

More information

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview AN INTRODUCTION TO SECRECY CAPACITY BRIAN DUNN. Overview This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits

More information

Generalized Writing on Dirty Paper

Generalized Writing on Dirty Paper Generalized Writing on Dirty Paper Aaron S. Cohen acohen@mit.edu MIT, 36-689 77 Massachusetts Ave. Cambridge, MA 02139-4307 Amos Lapidoth lapidoth@isi.ee.ethz.ch ETF E107 ETH-Zentrum CH-8092 Zürich, Switzerland

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

A Graph-based Framework for Transmission of Correlated Sources over Multiple Access Channels

A Graph-based Framework for Transmission of Correlated Sources over Multiple Access Channels A Graph-based Framework for Transmission of Correlated Sources over Multiple Access Channels S. Sandeep Pradhan a, Suhan Choi a and Kannan Ramchandran b, a {pradhanv,suhanc}@eecs.umich.edu, EECS Dept.,

More information

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of

More information

Dispersion of the Gilbert-Elliott Channel

Dispersion of the Gilbert-Elliott Channel Dispersion of the Gilbert-Elliott Channel Yury Polyanskiy Email: ypolyans@princeton.edu H. Vincent Poor Email: poor@princeton.edu Sergio Verdú Email: verdu@princeton.edu Abstract Channel dispersion plays

More information

Decentralized K-User Gaussian Multiple Access Channels

Decentralized K-User Gaussian Multiple Access Channels Decentralized K-User Gaussian Multiple Access Channels Selma Belhadj Amor, Samir Perlaza To cite this version: Selma Belhadj Amor, Samir Perlaza. Decentralized K-User Gaussian Multiple Access Channels.

More information

WIRELESS networks with multiple users are interference-limited

WIRELESS networks with multiple users are interference-limited 4170 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 7, JULY 2014 On the Capacity and Degrees of Freedom Regions of Two-User MIMO Interference Channels With Limited Receiver Cooperation Mehdi Ashraphijuo,

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Polar codes for the m-user MAC and matroids

Polar codes for the m-user MAC and matroids Research Collection Conference Paper Polar codes for the m-user MAC and matroids Author(s): Abbe, Emmanuel; Telatar, Emre Publication Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-005997169

More information

A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model

A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model M. Anand, Student Member, IEEE, and P. R. Kumar, Fellow, IEEE Abstract For every Gaussian

More information

arxiv: v2 [cs.it] 27 Aug 2016

arxiv: v2 [cs.it] 27 Aug 2016 GDoF of the MISO BC: Bridging the Gap between Finite Precision and Perfect CSIT arxiv:1602.02203v2 [cs.it 27 Aug 2016 Arash Gholami Davoodi, Bofeng Yuan and Syed A. Jafar Center for Pervasive Communications

More information

Bounds and Capacity Results for the Cognitive Z-interference Channel

Bounds and Capacity Results for the Cognitive Z-interference Channel Bounds and Capacity Results for the Cognitive Z-interference Channel Nan Liu nanliu@stanford.edu Ivana Marić ivanam@wsl.stanford.edu Andrea J. Goldsmith andrea@wsl.stanford.edu Shlomo Shamai (Shitz) Technion

More information

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing Lecture 7 Agenda for the lecture M-ary hypothesis testing and the MAP rule Union bound for reducing M-ary to binary hypothesis testing Introduction of the channel coding problem 7.1 M-ary hypothesis testing

More information

The Capacity Region for Multi-source Multi-sink Network Coding

The Capacity Region for Multi-source Multi-sink Network Coding The Capacity Region for Multi-source Multi-sink Network Coding Xijin Yan Dept. of Electrical Eng. - Systems University of Southern California Los Angeles, CA, U.S.A. xyan@usc.edu Raymond W. Yeung Dept.

More information

EE 4TM4: Digital Communications II Scalar Gaussian Channel

EE 4TM4: Digital Communications II Scalar Gaussian Channel EE 4TM4: Digital Communications II Scalar Gaussian Channel I. DIFFERENTIAL ENTROPY Let X be a continuous random variable with probability density function (pdf) f(x) (in short X f(x)). The differential

More information

Capacity Region of the Permutation Channel

Capacity Region of the Permutation Channel Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes

More information

Capacity bounds for multiple access-cognitive interference channel

Capacity bounds for multiple access-cognitive interference channel Mirmohseni et al. EURASIP Journal on Wireless Communications and Networking, :5 http://jwcn.eurasipjournals.com/content///5 RESEARCH Open Access Capacity bounds for multiple access-cognitive interference

More information

Channel Dependent Adaptive Modulation and Coding Without Channel State Information at the Transmitter

Channel Dependent Adaptive Modulation and Coding Without Channel State Information at the Transmitter Channel Dependent Adaptive Modulation and Coding Without Channel State Information at the Transmitter Bradford D. Boyle, John MacLaren Walsh, and Steven Weber Modeling & Analysis of Networks Laboratory

More information

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Silas Fong (Joint work with Vincent Tan) Department of Electrical & Computer Engineering National University

More information

On the Duality of Gaussian Multiple-Access and Broadcast Channels

On the Duality of Gaussian Multiple-Access and Broadcast Channels On the Duality of Gaussian ultiple-access and Broadcast Channels Xiaowei Jin I. INTODUCTION Although T. Cover has been pointed out in [] that one would have expected a duality between the broadcast channel(bc)

More information