Multiple access channels with arbitrarily correlated sources
نویسندگان
چکیده
Manuscript received November 28, 1978; revised February 28, 1980. This work was supported in part by the National Science Foundation under Grant ENG 76-23334, in part by the Stanford Research Institute under International Contract D/&C-15-C-0187, and in part by the Joint Scientific Enaineerina Program under Contracts NO001475-C-0601 and F44620-76-C&01. This paper was presented at the 1979 IEEE Intemational Symposium on Information Theory, Grignano, Italy, June 25-29, 1979. T. M. Cover is with the Departments of Electrical Engineering and Statistics, Stanford University, Durand Building, Room 121, Stanford, CA 94305. A. El Gamal was with the Department of Electrical Engineering, University of Southern California, University Park, Los Angeles, CA. He is now with the Department of Electrical Engineering, Stanford University, Stanford, CA 94305. M. Salehi was with the Department of Electrical Engineering, Stanford University, Stanford, CA. He is now with the Department of Electrical Engineering, University of Isfahan, Isfahan, Iran. and I’ can be sent over the multiple access channel if, for some AxI, ~~)=Ax&(x2)~ H(U)<Z(X,; YIX,),
منابع مشابه
Outage Probability Bound and Diversity Gain for Ultra-Wideband Multiple-Access Relay Channels with Correlated Noises
In this paper, Ultra-wideband (UWB) multiple access relay channel with correlated noises at the relay and receiver is investigated. We obtain outer and inner bounds for the IEEE 802.15.3a UWB multiple access relay channel, and also, a diversity gain bound. Finally, we evaluate some results numerically and show that noise correlation coefficients play important role in determining relay position.
متن کاملTransmission of Correlated Sources Over Multi-user Channels
Source and channel coding over multi-user channels in which receivers have access to correlated source side information, is considered. For several simple multi-user channels necessary and sufficient conditions are characterized for lossless transmission under certain source-channel structures. In particular, the multiple access channels, the compound multiple access channels and the interferen...
متن کاملBounds for Multiple-Access Relay Channels with Feedback via Two-way Relay Channel
In this study, we introduce a new two-way relay channel and obtain an inner bound and an outer bound for the discrete and memoryless multiple access relay channels with receiver-source feedback via two-way relay channel in which end nodes exchange signals by a relay node. And we extend these results to the Gaussian case. By numerical computing, we show that our inner bound is the same with o...
متن کاملComments on "broadcast channels with arbitrarily correlated sources"
The Marton-Gelfand-Pinsker inner bound on the capacity region of broadcast channels was extended by HanCosta to include arbitrarily correlated sources where the capacity region is replaced by an admissible source region. The main arguments of Han-Costa are correct but unfortunately the authors overlooked an inequality in their derivation. The corrected region is presented and the absence of the...
متن کاملExtension of the Coverage Region of Multiple Access Channels by Using a Relay
From practical and theoretical viewpoints, performance analysis of communication systems by using information-theoretic results is important. In this paper, based on our previous work on Multiple Access Channel (MAC) and Multiple Access Relay Channel (MARC), we analyze the impact of a relay on the fundamental wireless communications concept, i.e., coverage region of MARC, as a basic model for u...
متن کاملSecure distributed lossless compression with side information at the eavesdropper
This paper investigates the problem of secure distributed lossless compression in the presence of arbitrarily correlated side information at an eavesdropper. This scenario consists of two encoders (referred to as Alice and Charlie) that wish to reliably transmit their respective (correlated) sources to a legitimate receiver (referred to as Bob) while satisfying some requirement on the equivocat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Trans. Information Theory
دوره 26 شماره
صفحات -
تاریخ انتشار 1980