Results 1  10
of
113
Broadcast Channels with Cooperating Decoders
, 2006
"... We consider the problem of communicating over the general discrete memoryless broadcast channel (BC) with partially cooperating receivers. In our setup, receivers are able to exchange messages over noiseless conference links of finite capacities, prior to decoding the messages sent from the transmi ..."
Abstract

Cited by 59 (4 self)
 Add to MetaCart
(Show Context)
We consider the problem of communicating over the general discrete memoryless broadcast channel (BC) with partially cooperating receivers. In our setup, receivers are able to exchange messages over noiseless conference links of finite capacities, prior to decoding the messages sent from the transmitter. In this paper we formulate the general problem of broadcast with cooperation. We first find the capacity region for the case where the BC is physically degraded. Then, we give achievability results for the general broadcast channel, for both the two independent messages case and the single common message case.
On interference channels with generalized feedback
 In Proceedings of IEEE Int. Symp. on Inform. Theory, ISIT2007
, 2007
"... An Interference Channel with Generalized Feedback (IFCGF) is a model for a wireless network where several sourcedestination pairs compete for the same channel resources, and where the sources have the ability to sense the current channel activity. The signal overheard from the channel provides inf ..."
Abstract

Cited by 48 (8 self)
 Add to MetaCart
An Interference Channel with Generalized Feedback (IFCGF) is a model for a wireless network where several sourcedestination pairs compete for the same channel resources, and where the sources have the ability to sense the current channel activity. The signal overheard from the channel provides information about the activity of the other users, and thus furnishes the basis for cooperation. In this twopart paper we study achievable strategies and outer bounds for a general IFCGF with two sourcedestination pairs. We then evaluate the proposed regions for the Gaussian channel. Part I: Achievable Region. We propose that the generalized feedback is used to gain knowledge about the message sent by the other user and then exploited in two ways: (a) to relay the messages that can be decoded at both destinations–thus realizing the gains of beamforming of a distributed multiantenna system–and (b) to hide the messages that can not be decoded at the nonintended destination–thus leveraging the interference “precancellation” property of dirtypapertype coding. We show that our achievable region generalizes several known achievable regions for IFCGF and that it reduces
Capacity of cognitive interference channels with and without secrecy
, 2009
"... Like the conventional twouser interference channel, the cognitive interference channel consists of two transmitters whose signals interfere at two receivers. It is assumed that there is a common message (message 1) known to both transmitters, and an additional independent message (message 2) known ..."
Abstract

Cited by 40 (7 self)
 Add to MetaCart
Like the conventional twouser interference channel, the cognitive interference channel consists of two transmitters whose signals interfere at two receivers. It is assumed that there is a common message (message 1) known to both transmitters, and an additional independent message (message 2) known only to the cognitive transmitter (transmitter 2). The cognitive receiver (receiver 2) needs to decode messages 1 and 2, while the noncognitive receiver (receiver 1) should decode only message 1. Furthermore, message 2 is assumed to be a confidential message which needs to be kept as secret as possible from receiver 1, which is viewed as an eavesdropper with regard to message 2. The level of secrecy is measured by the equivocation rate. In this paper, a singleletter expression for the capacityequivocation region of the discrete memoryless cognitive interference channel is obtained. The capacityequivocation region for the Gaussian cognitive interference channel is also obtained explicitly. Moreover, particularizing the capacityequivocation region to the case without a secrecy constraint, the capacity region for the twouser cognitive interference channel is obtained, by providing a converse theorem.
Inner and outer bounds for the Gaussian cognitive interference channel and new capacity results
 IEEE Trans. Inf. Theory
"... Abstract—The capacity of the Gaussian cognitive interference channel, a variation of the classical twouser interference channel where one of the transmitters (referred to as cognitive) has knowledge of both messages, is known in several parameter regimes but remains unknown in general. This paper ..."
Abstract

Cited by 30 (13 self)
 Add to MetaCart
(Show Context)
Abstract—The capacity of the Gaussian cognitive interference channel, a variation of the classical twouser interference channel where one of the transmitters (referred to as cognitive) has knowledge of both messages, is known in several parameter regimes but remains unknown in general. This paper provides a comparative overview of this channel model as it proceeds through the following contributions. First, several outer bounds are presented: a) a new outer bound based on the idea of a broadcast channel with degraded message sets, and b) an outer bound obtained by transforming the channel into channels with known capacity. Next, a compact Fourier–Motzkin eliminated version of the largest known inner bound derived for the discrete memoryless cognitive interference channel is presented and specialized to the Gaussian noise case, where several simplified schemes with jointly Gaussian input are evaluated in closed form and later used to prove a number of results. These include a new set of capacity results for: a) the “primary decodes cognitive ” regime, a subset of the “strong interference ” regime that is not included in the “very strong interference” regime for which capacity was known, and b) the “Schannel in strong interference ” in which the primary transmitter does not interfere with the cognitive receiver and the primary receiver experiences strong interference. Next, for a general Gaussian channel the capacity is determined to within one bit/s/Hz and to within a factor two regardless of the channel parameters, thus establishing rate performance guarantees at high and low SNR, respectively. The paper concludes with numerical evaluations and comparisons of the various simplified achievable rate regions and outer bounds in parameter regimes where capacity is unknown, leading to further insight on the capacity region. Index Terms—Broadcast channel with degraded message sets, capacity in the primary decodes cognitive regime, capacity for the Zchannel in strong interference, capacity to within one bit, capacity to within a factor of two, cognitive interference channel, inner bound, outer bound. I.
About Priority Encoding Transmission
, 2000
"... Recently, Albanese et al. introduced Priority Encoding Transmission (pet) for sending hierarchically organized messages over lossy packetbased computer networks [1]. In a pet system, each symbol in the message is assigned a priority which determines the minimal number of codeword symbols that is re ..."
Abstract

Cited by 30 (0 self)
 Add to MetaCart
Recently, Albanese et al. introduced Priority Encoding Transmission (pet) for sending hierarchically organized messages over lossy packetbased computer networks [1]. In a pet system, each symbol in the message is assigned a priority which determines the minimal number of codeword symbols that is required to recover that symbol. This note revisits the pet approach using tools from Network Information Theory. We rst outline that Priority Encoding Transmission is intimately related with the Broadcast Erasure Channel with Degraded Message Set. Using the information spectrum approach, we provide an informational characterization of the capacity region of general Broadcast Channels with Degraded Message Set. We show that the pet inequality has an informationtheoretical counterpart: the inequality de ning the capacity region of the broadcast erasure channel with degraded message sets. Hence the pet approach which consists in timesharing and interleaving classical erasure resilient codes achieves the capacity region of this channel. Moreover, we show that the PET approach may achieve the sphere packing exponents. Finally we observe that on some simple nonstationary broadcast channels, timesharing may be outperformed. The impact of memory on the optimality of the PET approach remains elusive.
Evaluation of Marton’s Inner Bound for the General Broadcast Channel
"... Abstract—The best known inner bound on the tworeceiver general broadcast channel without a common message is due to Marton [3]. This result was subsequently generalized in [2, p. 391, Problem 10(c)] and [4] to broadcast channels with a common message. However the latter region is not computable (ex ..."
Abstract

Cited by 28 (13 self)
 Add to MetaCart
Abstract—The best known inner bound on the tworeceiver general broadcast channel without a common message is due to Marton [3]. This result was subsequently generalized in [2, p. 391, Problem 10(c)] and [4] to broadcast channels with a common message. However the latter region is not computable (except in certain special cases) as no bounds on the cardinality of its auxiliary random variables exist. Nor is it even clear that the inner bound is a closed set. The main obstacle in proving cardinality bounds is the fact that the Carathéodory theorem, the main known tool for proving cardinality bounds, does not yield a finite cardinality result. Our new tool is based on an identity that relates the second derivative of the Shannon entropy of a discrete random variable (under a certain perturbation) to the corresponding Fisher information. In order to go beyond the traditional Carathéodory type arguments, we identify certain properties that the auxiliary random variables corresponding to the extreme points of the inner bound satisfy. These properties are then used to establish cardinality bounds on the auxiliary random variables of the inner bound, thereby proving the computability of the region, and its closedness. Although existence of cardinality bounds renders Marton’s inner bound computable, it is still hard to evaluate the region. It is however shown that the computation can be significantly simplified if we further assume that Marton’s inner bound and the recent outer bound of Nair and El Gamal match at the given particular channel. In order to demonstrate this, we consider a large class of binary input broadcast channels and compute maximum of the sum rate of private messages assuming that the inner and the outer bound match at the given broadcast channel. We also show that the inner and the outer bound do not match for some broadcast channels, thus establishing a conjecture of [15]. I.
On the capacity of 1tok broadcast packet erasure channels with channel output feedback
 IEEE Transactions on Information Theory
, 2012
"... ar ..."
(Show Context)
A graphbased framework for transmission of correlated sources over broadcast channels
 IEEE TRANS. INFORM. THEORY
, 2006
"... ..."
(Show Context)
The Capacity Region of a Class of 3Receiver Broadcast Channels with Degraded Message Sets
"... Körner and Marton established the capacity region for the 2receiver broadcast channel with degraded message sets. Recent results and conjectures suggest that a straightforward extension of the KörnerMarton region to more than 2 receivers is optimal. This paper shows that this is not the case. We e ..."
Abstract

Cited by 24 (1 self)
 Add to MetaCart
Körner and Marton established the capacity region for the 2receiver broadcast channel with degraded message sets. Recent results and conjectures suggest that a straightforward extension of the KörnerMarton region to more than 2 receivers is optimal. This paper shows that this is not the case. We establish the capacity region for a class of 3receiver broadcast channels with 2degraded message sets and show that it can be strictly larger than the straightforward extension of the KörnerMarton region. The idea is to split the private message into two parts, superimpose one part onto the “cloud center ” representing the common message, and superimpose the second part onto the resulting “satellite codeword”. One of the receivers finds the common message directly by decoding the “cloud center, ” a second receiver finds it indirectly by decoding a satellite codeword, and a third receiver by jointly decoding the transmitted codeword. This idea is then used to establish new inner and outer bounds on the capacity region of the general 3receiver broadcast channel with two and three degraded message sets. We show that these bounds are tight for some nontrivial cases. The results suggest that finding the capacity region of the 3receiver broadcast channel with degraded message sets is as at least as hard finding as the capacity region of the general 2receiver broadcast channel with common and private message.
The capacity region of multiway relay channels over finite fields with full data exchange
 IEEE Trans. Inf. Theory
, 2011
"... ar ..."
(Show Context)