期刊
IEEE TRANSACTIONS ON INFORMATION THEORY
卷 67, 期 6, 页码 3847-3872出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIT.2021.3069756
关键词
Encoding; Channel coding; Integrated circuits; Task analysis; Correlation; Interference channels; Tools; Shannon theory; joint source-channel coding; inner bound; achievability; sufficient conditions; correlated sources; constant composition codes
资金
- Center for Science of Information (CSoI), an NSF Science and Technology Center [CCF-0939370]
- University of Tennessee's startup funds
In this work, a Shannon-theoretic study of communicating correlated sources over multiple access and interference channels is presented. The fixed block-length coding technique is enhanced by incorporating the technique of inducing source correlation onto channel inputs. New single-letter characterizations for sufficient conditions are derived for both scenarios, and simple 'plug-in' approaches are proposed to further weaken the derived conditions. Subsuming Dueck's findings and going beyond in the example considered therein are made possible by the findings.
We present the second part of our work on communicating correlated sources over multiple access (MAC) and interference channels (IC). Specifically, we undertake a Shannon-theoretic study of the above scenarios and focus on characterizing sufficient conditions for lossless recoverability of the sources at the decoder(s). We enhance the fixed block-length (B-L) coding technique by incorporating the technique of inducing source correlation onto channel inputs, originally discovered by Cover, El Gamal and Salehi. In contrast to the first part, performance analysis of a joint source-channel decoder poses new challenges. We enhance the earlier developed suite of coding and analytical tools to overcome these challenges and derive (simplified) single-letter characterizations for a new set of sufficient conditions for both scenarios. For both the MAC and IC problems, the derived sufficient conditions are (i) subsumed in the current known tightest, and (ii) strictly weaker for identified examples. Lastly, we propose simple 'plug-in' approaches that can further weaken the derived sufficient conditions. Our findings enable us to subsume Dueck's findings (1981) and go even further for the example considered therein.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据