Articles with "capacity region" as a keyword



Photo from wikipedia

Fourier Analysis of MAC Polarization

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Information Theory"

DOI: 10.1109/isit.2015.7282691

Abstract: One problem with multiple access channel (MAC) polar codes that are based on MAC polarization is that they may not achieve the entire capacity region. The reason behind this problem is that MAC polarization sometimes… read more here.

Keywords: capacity region; analysis mac; polarization; fourier analysis ... See more keywords

Capacity Region of ALOHA Protocol for Heterogeneous IoT Networks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2920161

Abstract: In an Internet of Things (IoT) network, heterogeneous users with different priorities and service requirements will co-exist. This makes scheduling access to the shared communication medium a major challenge. To tackle this challenge, we consider… read more here.

Keywords: network; capacity; iot networks; capacity region ... See more keywords
Photo from wikipedia

Approximate Capacity Region of the Two-User Gaussian Interference Channel With Noisy Channel-Output Feedback

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2018.2827076

Abstract: In this paper, the capacity region of the linear deterministic interference channel with noisy channel-output feedback (LD-IC-NF) is fully characterized. The proof of achievability is based on random coding arguments and rate splitting, block-Markov superposition… read more here.

Keywords: capacity region; channel; interference channel; noisy channel ... See more keywords
Photo by paoalchapar from unsplash

Superadditivity in Trade-Off Capacities of Quantum Channels

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2018.2889082

Abstract: In this paper, we investigate the additivity phenomenon in the quantum dynamic capacity region of a quantum channel for trading the resources of classical communication, quantum communication, and entanglement. Understanding such an additivity property is… read more here.

Keywords: resource capacity; capacity; capacity region; quantum channels ... See more keywords
Photo from wikipedia

Capacity Region of the Symmetric Injective $K$ -User Deterministic Interference Channel

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2019.2906242

Abstract: We characterize the capacity region of the symmetric injective $K$ -user deterministic interference channel for all channel parameters. The achievable rate region is derived by first projecting the achievable rate region of Han–Kobayashi (HK) scheme,… read more here.

Keywords: region; rate; capacity region; region symmetric ... See more keywords

Secret Key-Enabled Authenticated-Capacity Region, Part I: Average Authentication

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2022.3185933

Abstract: This paper investigates the secret-key-authenticated-capacity region, where information-theoretic authentication is defined by the ability of the decoder to accept and decode messages originating from a valid encoder while rejecting messages from other invalid sources. The… read more here.

Keywords: authentication; authenticated capacity; secret key; capacity region ... See more keywords
Photo from wikipedia

Secret Key-Enabled Authenticated-Capacity Region, Part—II: Typical-Authentication

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2022.3186443

Abstract: This paper investigates the secret key-authenticated-capacity region, where information-theoretic authentication is defined by the ability of the decoder to accept and decode messages originating from a valid encoder while rejecting messages from other invalid sources.… read more here.

Keywords: authentication; secret key; capacity region;