Sciweavers

TIT
2011
132views more  TIT 2011»
12 years 12 months ago
Interference Channels With Destination Cooperation
Vinod M. Prabhakaran, Pramod Viswanath
TIT
2011
128views more  TIT 2011»
12 years 12 months ago
Secure Network Coding on a Wiretap Network
—In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the netw...
Ning Cai, Raymond W. Yeung
TIT
2011
141views more  TIT 2011»
12 years 12 months ago
Near-Complementary Sequences With Low PMEPR for Peak Power Control in Multicarrier Communications
New families of near-complementary sequences are presented for peak power control in multicarrier communications. A framework for near-complementary sequences is given by the expl...
Nam Yul Yu, Guang Gong
TIT
2011
169views more  TIT 2011»
12 years 12 months ago
Network Coding Theory Via Commutative Algebra
—The fundamental result of linear network coding asserts the existence of optimal codes over acyclic networks when the symbol field is sufficiently large. The restriction to just...
Shuo-Yen Robert Li, Qifu Tyler Sun
TIT
2011
116views more  TIT 2011»
12 years 12 months ago
Approximate Characterizations for the Gaussian Source Broadcast Distortion Region
We consider the joint source-channel coding problem of sending a Gaussian source over a K-user Gaussian broadcast channel with bandwidth mismatch. A new outer bound to the achieva...
Chao Tian, Suhas N. Diggavi, Shlomo Shamai
TIT
2011
124views more  TIT 2011»
12 years 12 months ago
On the Equivalence of Two Achievable Regions for the Broadcast Channel
—A recent inner bound on the capacity region of the two-receiver discrete memoryless broadcast channel is shown to be equivalent to the Marton-Gelfand-Pinsker region. The proof m...
Yingbin Liang, Gerhard Kramer, H. Vincent Poor
TIT
2011
149views more  TIT 2011»
12 years 12 months ago
Network Coding for Computing: Cut-Set Bounds
Abstract—The following network computing problem is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a tar...
Rathinakumar Appuswamy, Massimo Franceschetti, Nik...
TIT
2011
101views more  TIT 2011»
12 years 12 months ago
Interference Channels With Source Cooperation
Vinod M. Prabhakaran, Pramod Viswanath
TIT
2011
157views more  TIT 2011»
12 years 12 months ago
Decentralized Sequential Hypothesis Testing Using Asynchronous Communication
—An asymptotically optimum test for the problem of decentralized sequential hypothesis testing is presented. The induced communication between sensors and fusion center is asynch...
Georgios Fellouris, George V. Moustakides
TIT
2011
116views more  TIT 2011»
12 years 12 months ago
Convex Programming Upper Bounds on the Capacity of 2-D Constraints
—The capacity of 1-D constraints is given by the entropy of a corresponding stationary maxentropic Markov chain. Namely, the entropy is maximized over a set of probability distri...
Ido Tal, Ron M. Roth