The Degrees of Freedom of Compute-and-Forward

Size: px
Start display at page:

Download "The Degrees of Freedom of Compute-and-Forward"

Transcription

1 The Degrees of Freedom of Compute-and-Forward Urs Niesen Jointly with Phil Whiting Bell Labs, Alcatel-Lucent

2 Problem Setting m 1 Encoder m 2 Encoder K transmitters, messages m 1,...,m K, power constraint P

3 Problem Setting z 1 m 1 Encoder h 2,1 h 1,1 h 1,2 m 2 Encoder h 2,2 z 2 K transmitters, messages m 1,...,m K, power constraint P Gaussian channel with constant gains H = {h l,k }

4 Problem Setting z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) z 2 K transmitters, messages m 1,...,m K, power constraint P Gaussian channel with constant gains H = {h l,k } Decode any deterministic function a l of the messages m 1,...,m K

5 Problem Setting z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 K transmitters, messages m 1,...,m K, power constraint P Gaussian channel with constant gains H = {h l,k } Decode any deterministic function a l of the messages m 1,...,m K Invert all computed functions a 1,...,a K to recover the messages m 1,...,m K

6 Problem Setting z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 Computation capacity C(P, H, {a l }) for fixed function {a l }

7 Problem Setting z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 Computation capacity C(P, H, {a l }) for fixed function {a l } C(P, H, A) for linear function {a l }

8 Problem Setting z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 Computation capacity C(P, H, {a l }) for fixed function {a l } C(P, H, A) for linear function {a l } Computation capacity C(P, H) max {a l } C(P, H, {a l}) with maximization over all invertible functions {a l }

9 Computation Capacity Some Special Cases and Bounds z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 Identity function A = I C(P, H, I) is the capacity of the K -user interference channel

10 Computation Capacity Some Special Cases and Bounds z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 Identity function A = I C(P, H, I) is the capacity of the K -user interference channel C(P, H) C(P, H, I)

11 Computation Capacity Some Special Cases and Bounds z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 Identity function A = I C(P, H, I) is the capacity of the K -user interference channel (Motahari et al. 2009) C(P, H) C(P, H, I) = K log(p) + o(log(p)) 4

12 Computation Capacity Some Special Cases and Bounds z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 Identity function A = I C(P, H, I) is the capacity of the K -user interference channel (Motahari et al. 2009) C(P, H) C(P, H) C(P, H, I) lim K/2 P 1 2 log(p)

13 Computation Capacity Some Special Cases and Bounds z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 Identity function A = I C(P, H, I) is the capacity of the K -user interference channel (Motahari et al. 2009) C(P, H) C(P, H) C(P, H, I) lim P K/2 1 2 log(p) Allow cooperation among transmitters and among receivers K K MIMO channel

14 Computation Capacity Some Special Cases and Bounds z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 Identity function A = I C(P, H, I) is the capacity of the K -user interference channel (Motahari et al. 2009) C(P, H) C(P, H) C(P, H, I) lim P K/2 1 2 log(p) Allow cooperation among transmitters and among receivers K K MIMO channel (Telatar 1999) C(P, H) max Q 1 2 log det(i + HQHT )

15 Computation Capacity Some Special Cases and Bounds z 1 m 1 Encoder h 1,1 Decoder a 1 (m 1, m 2 ) m 1 h 2,1 h 1,2 m 2 Encoder h 2,2 Decoder a 2 (m 1, m 2 ) Inverter m 2 z 2 Identity function A = I C(P, H, I) is the capacity of the K -user interference channel (Motahari et al. 2009) C(P, H) C(P, H) C(P, H, I) lim K/2 P 1 2 log(p) Allow cooperation among transmitters and among receivers K K MIMO channel (Telatar 1999) 1 C(P, H) max 2 log det(i + C(P, H) Q HQHT ) lim P 1 2 log(p) K

16 Computation Capacity Lattice Codes Nazer and Gastpar (2009) Two transmitters, one receiver, h = (1, 1)

17 Computation Capacity Lattice Codes Nazer and Gastpar (2009) 1 1 Two transmitters, one receiver, h = (1, 1)

18 Computation Capacity Lattice Codes Nazer and Gastpar (2009) 1 1 Two transmitters, one receiver, h = (1, 1)

19 Computation Capacity Lattice Codes Nazer and Gastpar (2009) 1 1 Two transmitters, one receiver, h = (1, 1)

20 Computation Capacity Lattice Codes Nazer and Gastpar (2009) 1 1 Two transmitters, one receiver, h = (1, 1)

21 Computation Capacity Lattice Codes Nazer and Gastpar (2009) 1 1 Two transmitters, one receiver, h = (1, 1) Decode a = (1, 1)

22 Computation Capacity Lattice Codes Nazer and Gastpar (2009) Two transmitters, one receiver, h = (1, 0.5)

23 Computation Capacity Lattice Codes Nazer and Gastpar (2009) Two transmitters, one receiver, h = (1, 0.5)

24 Computation Capacity Lattice Codes Nazer and Gastpar (2009) Two transmitters, one receiver, h = (1, 0.5) Scale output by β = 2, decode a = (2, 1)

25 Computation Capacity Lattice Codes Nazer and Gastpar (2009) h 1 h 2 K transmitters, one receiver, h R K

26 Computation Capacity Lattice Codes Nazer and Gastpar (2009) h 1 h 2 K transmitters, one receiver, h R K Scale output by β R, decode a Z K

27 Computation Capacity Lattice Codes Nazer and Gastpar (2009) h 1 h 2 K transmitters, one receiver, h R K Scale output by β R, decode a Z K ( ) 1 C(P, h, a) max β 2 log P β 2 + P βh a 2

28 Computation Capacity Lattice Codes Nazer and Gastpar (2009) h 1 h 2 K transmitters, one receiver, h R K Scale output by β R, decode a Z K ( ) C(P, h, a) 1 2 log 1 + P h 2 a 2 + P ( a 2 h 2 (h T a) 2)

29 Computation Capacity Lattice Codes Nazer and Gastpar (2009) h 1 h 2 K transmitters, one receiver, h R K Scale output by β R, decode a Z K ( ) C(P, h, a) 1 2 log 1 + P h 2 a 2 + P ( a 2 h 2 (h T a) 2) R L (P, h, a)

30 Computation Capacity Lattice Codes Nazer and Gastpar (2009) h 1 h 2 K transmitters, K receivers, H R K K Decode A Z K K

31 Decode A Z K K C(P, H, A) R L (P, H, A) Computation Capacity Lattice Codes Nazer and Gastpar (2009) h 1 h 2 K transmitters, K receivers, H R K K

32 Computation Capacity Lattice Codes Nazer and Gastpar (2009) h 1 h 2 K transmitters, K receivers, H R K K Decode A Z K K max A C(P, H, A) max R L(P, H, A) A

33 Decode A Z K K C(P, H) R L (P, H) Computation Capacity Lattice Codes Nazer and Gastpar (2009) h 1 h 2 K transmitters, K receivers, H R K K

34 Questions We already know that the computation capacity satisfies C(P, H) K/2 lim P 1 2 log(p) K

35 Questions We already know that the computation capacity satisfies C(P, H) K/2 lim P 1 2 log(p) K What are the degrees of freedom of compute-and-forward C(P, H) lim P 1 2 log(p) =?

36 Questions We already know that the computation capacity satisfies C(P, H) K/2 lim P 1 2 log(p) K What are the degrees of freedom of compute-and-forward C(P, H) lim P 1 2 log(p) =? What are the degrees of freedom achieved by lattice codes R lim L (P, H) P 1 2 log(p) =?

37 Performance of Lattice Codes ( ) R L (P, h, a) 1 2 log 1 + P h 2 a 2 + P ( a 2 h 2 (h T a) 2)

38 Performance of Lattice Codes ( ) R L (P, h, a) 1 2 log 1 + P h 2 a 2 + P ( a 2 h 2 (h T a) 2) Integer channel gains H Z K K

39 Performance of Lattice Codes ( ) R L (P, h, a) 1 2 log 1 + P h 2 a 2 + P ( a 2 h 2 (h T a) 2) Integer channel gains H Z K K Set A = H Z K K R L (P, H) lim P 1 2 log(p) = K

40 Performance of Lattice Codes ( ) R L (P, h, a) 1 2 log 1 + P h 2 a 2 + P ( a 2 h 2 (h T a) 2) Integer channel gains H Z K K Set A = H Z K K R L (P, H) lim P 1 2 log(p) = K Rational channel gains H Q K K

41 Performance of Lattice Codes ( ) R L (P, h, a) 1 2 log 1 + P h 2 a 2 + P ( a 2 h 2 (h T a) 2) Integer channel gains H Z K K Set A = H Z K K R L (P, H) lim P 1 2 log(p) = K Rational channel gains H Q K K Set A = qh Z K K R L (P, H) lim P 1 2 log(p) = K

42 Performance of Lattice Codes ( ) R L (P, h, a) 1 2 log 1 + P h 2 a 2 + P ( a 2 h 2 (h T a) 2) Integer channel gains H Z K K Set A = H Z K K R L (P, H) lim P 1 2 log(p) = K Rational channel gains H Q K K Set A = qh Z K K R L (P, H) lim P 1 2 log(p) = K Real channel gains H R K K

43 Performance of Lattice Codes ( ) R L (P, h, a) 1 2 log 1 + P h 2 a 2 + P ( a 2 h 2 (h T a) 2) Integer channel gains H Z K K Set A = H Z K K R L (P, H) lim P 1 2 log(p) = K Rational channel gains H Q K K Set A = qh Z K K R L (P, H) lim P 1 2 log(p) = K Real channel gains H R K K?

44 Performance of Lattice Codes Two transmitters, one receiver, h = (1, h 2 )

45 Performance of Lattice Codes Two transmitters, one receiver, h = (1, h 2 ) Optimize over coefficients a Z 2 \ {0}

46 Performance of Lattice Codes 1 P = 10dB h Two transmitters, one receiver, h = (1, h 2 ) Optimize over coefficients a Z 2 \ {0} max a R L (P, h, a) 1 2 log(1 + h 2 P)

47 Performance of Lattice Codes 1 P = 20dB h Two transmitters, one receiver, h = (1, h 2 ) Optimize over coefficients a Z 2 \ {0} max a R L (P, h, a) 1 2 log(1 + h 2 P)

48 Performance of Lattice Codes 1 P = 30dB h Two transmitters, one receiver, h = (1, h 2 ) Optimize over coefficients a Z 2 \ {0} max a R L (P, h, a) 1 2 log(1 + h 2 P)

49 Performance of Lattice Codes 1 P = 40dB h Two transmitters, one receiver, h = (1, h 2 ) Optimize over coefficients a Z 2 \ {0} max a R L (P, h, a) 1 2 log(1 + h 2 P)

50 Performance of Lattice Codes 1 P = 50dB h Two transmitters, one receiver, h = (1, h 2 ) Optimize over coefficients a Z 2 \ {0} max a R L (P, h, a) 1 2 log(1 + h 2 P)

51 Performance of Lattice Codes Theorem 1 For any K 2 and almost every H R K K R lim L (H, P) P 1 2 log(p) /K 2.

52 Performance of Lattice Codes Theorem 1 For any K 2 and almost every H R K K R lim L (H, P) P 1 2 log(p) /K 2. Compare to: MIMO upper bound of K on the degrees of freedom of compute-and-forward

53 Performance of Lattice Codes Theorem 1 For any K 2 and almost every H R K K R lim L (H, P) P 1 2 log(p) /K 2. Compare to: MIMO upper bound of K on the degrees of freedom of compute-and-forward Decode-and-forward lower bound of K/2 on the degrees of freedom compute-and-forward

54 Degrees of Freedom of Compute-and-Forward Is compute-and-forward useful at high SNR?

55 Degrees of Freedom of Compute-and-Forward Is compute-and-forward useful at high SNR? Yes!

56 Degrees of Freedom of Compute-and-Forward Is compute-and-forward useful at high SNR? Yes! Theorem 2 For any K 2 and almost every H R K K C(H, P) lim = K. P 1 2 log(p)

57 Degrees of Freedom of Compute-and-Forward Is compute-and-forward useful at high SNR? Yes! Theorem 2 For any K 2 and almost every H R K K C(H, P) lim = K. P 1 2 log(p) Compute-and-forward achieves MIMO upper bound of K degrees of freedom Invertible functions can be encoded/decoded distributedly at same asymptotic rate as the centralized scheme

58 Degrees of Freedom of Compute-and-Forward Is compute-and-forward useful at high SNR? Yes! Theorem 2 For any K 2 and almost every H R K K C(H, P) lim = K. P 1 2 log(p) Compute-and-forward achieves MIMO upper bound of K degrees of freedom Invertible functions can be encoded/decoded distributedly at same asymptotic rate as the centralized scheme Compute-and-forward achieves twice the degrees of freedom of decode-and-forward

59 Degrees of Freedom of Compute-and-Forward Is compute-and-forward useful at high SNR? Yes! Theorem 2 For any K 2 and almost every H R K K O ( log K 2 /(1+K 2) (P) ) C(H, P) 1 2K log(p) O(1). Compute-and-forward achieves MIMO upper bound of K degrees of freedom Invertible functions can be encoded/decoded distributedly at same asymptotic rate as the centralized scheme Compute-and-forward achieves twice the degrees of freedom of decode-and-forward

60 Lower Bound in Theorem 2 Channel computes noisy linear combinations with real coefficients

61 Lower Bound in Theorem 2 Channel computes noisy linear combinations with real coefficients Lattice codes transform this into a system computing noiseless linear combinations with integer coefficients

62 Lower Bound in Theorem 2 Channel computes noisy linear combinations with real coefficients Lattice codes transform this into a system computing noiseless linear combinations with integer coefficients The achievable scheme in Theorem 2 opts instead to implement these two functions separately

63 Lower Bound in Theorem 2 Channel computes noisy linear combinations with real coefficients Lattice codes transform this into a system computing noiseless linear combinations with integer coefficients The achievable scheme in Theorem 2 opts instead to implement these two functions separately Use signal alignment to transform real linear combinations into integer linear combinations

64 Lower Bound in Theorem 2 Channel computes noisy linear combinations with real coefficients Lattice codes transform this into a system computing noiseless linear combinations with integer coefficients The achievable scheme in Theorem 2 opts instead to implement these two functions separately Use signal alignment to transform real linear combinations into integer linear combinations Use a linear outer code to transform noisy linear combinations into noiseless linear combinations

65 Lower Bound in Theorem 2 Outline Channel computes noisy linear combinations with real coefficients h 1,1 m 1 + h 1,2 m 2 + z 1

66 Lower Bound in Theorem 2 Outline Channel computes noisy linear combinations with real coefficients h 1,1 m 1 + h 1,2 m 2 + z 1 Use signal alignment to transform real linear combinations into integer linear combinations a 1,1 m 1 + a 1,2 m 2 + z 1

67 Lower Bound in Theorem 2 Outline Channel computes noisy linear combinations with real coefficients h 1,1 m 1 + h 1,2 m 2 + z 1 Use signal alignment to transform real linear combinations into integer linear combinations a 1,1 m 1 + a 1,2 m 2 + z 1 Split each message into several submessages Use tools from Diophantine approximation

68 Lower Bound in Theorem 2 Outline Channel computes noisy linear combinations with real coefficients h 1,1 m 1 + h 1,2 m 2 + z 1 Use signal alignment to transform real linear combinations into integer linear combinations a 1,1 m 1 + a 1,2 m 2 + z 1 Split each message into several submessages Use tools from Diophantine approximation Use a linear outer code to transform noisy linear combinations into noiseless linear combinations a 1,1 m 1 + a 1,2 m 2

69 Lower Bound in Theorem 2 Preliminaries Groshev s Theorem For any ε > 0, and almost all (h 1, h 2,...,h K ) R K, min h 1 q h K q K Ω ( (max i q i ) 1 K ε). q i Z

70 Lower Bound in Theorem 2 Preliminaries Groshev s Theorem For any ε > 0, and almost all (h 1, h 2,...,h K ) R K, min h 1 q h K q K Ω ( (max i q i ) 1 K ε). q i Z Let x k = Aq k with q k { Q, Q + 1,...,Q 1, Q}

71 Lower Bound in Theorem 2 Preliminaries Groshev s Theorem For any ε > 0, and almost all (h 1, h 2,...,h K ) R K, min h 1 q h K q K Ω ( (max i q i ) 1 K ε). q i Z Let x k = Aq k with q k { Q, Q + 1,...,Q 1, Q} Assume we observe y = h 1 x h K x K + z

72 Lower Bound in Theorem 2 Preliminaries Groshev s Theorem For any ε > 0, and almost all (h 1, h 2,...,h K ) R K, min h 1 q h K q K Ω ( (max i q i ) 1 K ε). q i Z Let x k = Aq k with q k { Q, Q + 1,...,Q 1, Q} Assume we observe y = h 1 x h K x K + z Minimum distance between (x 1,...,x K ) (x 1,...,x K )

73 Lower Bound in Theorem 2 Preliminaries Groshev s Theorem For any ε > 0, and almost all (h 1, h 2,...,h K ) R K, min h 1 q h K q K Ω ( (max i q i ) 1 K ε). q i Z Let x k = Aq k with q k { Q, Q + 1,...,Q 1, Q} Assume we observe y = h 1 x h K x K + z Minimum distance between (x 1,...,x K ) (x 1,...,x K ) K k=1 h k(x k x k )

74 Lower Bound in Theorem 2 Preliminaries Groshev s Theorem For any ε > 0, and almost all (h 1, h 2,...,h K ) R K, min h 1 q h K q K Ω ( (max i q i ) 1 K ε). q i Z Let x k = Aq k with q k { Q, Q + 1,...,Q 1, Q} Assume we observe y = h 1 x h K x K + z Minimum distance between (x 1,...,x K ) (x 1,...,x K ) K k=1 h k(x k x k ) = A K k=1 h k(q k q k )

75 Lower Bound in Theorem 2 Preliminaries Groshev s Theorem For any ε > 0, and almost all (h 1, h 2,...,h K ) R K, min h 1 q h K q K Ω ( (max i q i ) 1 K ε). q i Z Let x k = Aq k with q k { Q, Q + 1,...,Q 1, Q} Assume we observe y = h 1 x h K x K + z Minimum distance between (x 1,...,x K ) (x 1,...,x K ) K k=1 h k(x k x k ) = A K k=1 h k(q k q k ) AΩ(Q 1 K )

76 Lower Bound in Theorem 2 Preliminaries Groshev s Theorem For any ε > 0, and almost all (h 1, h 2,...,h K ) R K, min h 1 q h K q K Ω ( (max i q i ) 1 K ε). q i Z Let x k = Aq k with q k { Q, Q + 1,...,Q 1, Q} Assume we observe y = h 1 x h K x K + z Minimum distance between (x 1,...,x K ) (x 1,...,x K ) K k=1 h k(x k x k ) = A K k=1 h k(q k q k ) AΩ(Q 1 K ) For A P (K 1)/2K and Q P 1/2K satisfy power constraint and can remove noise

77 Lower Bound in Theorem 2 Signal Alignment Consider a simple interference channel without noise y 1 = x 1 + x 2 y 2 = x 1 + hx 2

78 Lower Bound in Theorem 2 Signal Alignment Consider a simple interference channel without noise y 1 = x 1 + x 2 y 2 = x 1 + hx 2 Set x 1 /A = q 11 x 2 /A = q 21

79 Lower Bound in Theorem 2 Signal Alignment Consider a simple interference channel without noise y 1 = x 1 + x 2 y 2 = x 1 + hx 2 Set x 1 /A = q 11 x 2 /A = q 21 This is received as y 1 /A = (q 11 + q 21 ) y 2 /A = q 11 + hq 21

80 Lower Bound in Theorem 2 Signal Alignment Consider a simple interference channel without noise y 1 = x 1 + x 2 y 2 = x 1 + hx 2 Set x 1 /A = q 11 + hq 12 x 2 /A = q 21 + hq 22 This is received as y 1 /A = (q 11 + q 21 ) y 2 /A = q 11 + hq 21

81 Lower Bound in Theorem 2 Signal Alignment Consider a simple interference channel without noise y 1 = x 1 + x 2 y 2 = x 1 + hx 2 Set x 1 /A = q 11 + hq 12 x 2 /A = q 21 + hq 22 This is received as y 1 /A = (q 11 + q 21 ) + h(q 12 + q 22 ) y 2 /A = q 11 + h(q 21 + q 12 ) + h 2 q 22

82 Lower Bound in Theorem 2 Signal Alignment Consider a simple interference channel without noise y 1 = x 1 + x 2 y 2 = x 1 + hx 2 Set x 1 /A = q 11 + hq x 2 /A = q 21 + hq This is received as y 1 /A = (q 11 + q 21 ) + h(q 12 + q 22 ) +... y 2 /A = q 11 + h(q 21 + q 12 ) + h 2 q

83 Lower Bound in Theorem 2 Signal Alignment Consider a simple interference channel without noise y 1 = x 1 + x 2 y 2 = x 1 + hx 2 Set x 1 /A = q 11 + hq x 2 /A = q 21 + hq This is received as y 1 /A = (q 11 + q 21 ) + h(q 12 + q 22 ) +... y 2 /A = q 11 + h(q 21 + q 12 ) + h 2 q Groshev s Theorem to separate equations

84 Lower Bound in Theorem 2 Signal Alignment Consider a simple interference channel without noise y 1 = x 1 + x 2 y 2 = x 1 + hx 2 Set x 1 /A = q 11 + hq x 2 /A = q 21 + hq This is received as y 1 /A = (q 11 + q 21 ) + h(q 12 + q 22 ) +... y 2 /A = q 11 + h(q 21 + q 12 ) + h 2 q Groshev s Theorem to separate equations Linear outer code to drive probability of error to zero

85 Summary Compute-and-forward as communication strategy for wireless networks

86 Summary Compute-and-forward as communication strategy for wireless networks Lattice codes achieve at most 2 degrees of freedom over a K K channel

87 Summary Compute-and-forward as communication strategy for wireless networks Lattice codes achieve at most 2 degrees of freedom over a K K channel However, a different implementation of compute-and-forward achieves K degrees of freedom

88 Summary Compute-and-forward as communication strategy for wireless networks Lattice codes achieve at most 2 degrees of freedom over a K K channel However, a different implementation of compute-and-forward achieves K degrees of freedom Matches MIMO upper bound of K degrees of freedom

89 Summary Compute-and-forward as communication strategy for wireless networks Lattice codes achieve at most 2 degrees of freedom over a K K channel However, a different implementation of compute-and-forward achieves K degrees of freedom Matches MIMO upper bound of K degrees of freedom Compute-and-forward achieves twice the degrees of freedom of decode-and-forward

Degrees of Freedom in Wireless Networks

Degrees of Freedom in Wireless Networks Degrees of Freedom in Wireless Networks Zhiyu Cheng Department of Electrical and Computer Engineering University of Illinois at Chicago Chicago, IL 60607, USA Email: zcheng3@uic.edu Abstract This paper

More information

Capacity Limits of MIMO Channels

Capacity Limits of MIMO Channels Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References

More information

THE problems of characterizing the fundamental limits

THE problems of characterizing the fundamental limits Beamforming and Aligned Interference Neutralization Achieve the Degrees of Freedom Region of the 2 2 2 MIMO Interference Network (Invited Paper) Chinmay S. Vaze and Mahesh K. Varanasi Abstract We study

More information

Coded Bidirectional Relaying in Wireless Networks

Coded Bidirectional Relaying in Wireless Networks Coded Bidirectional Relaying in Wireless Networks Petar Popovski and Toshiaki Koike - Akino Abstract The communication strategies for coded bidirectional (two way) relaying emerge as a result of successful

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 Multinode Cooperative Communications in Wireless Networks Ahmed K. Sadek, Student Member, IEEE, Weifeng Su, Member, IEEE, and K.

More information

8 MIMO II: capacity and multiplexing

8 MIMO II: capacity and multiplexing CHAPTER 8 MIMO II: capacity and multiplexing architectures In this chapter, we will look at the capacity of MIMO fading channels and discuss transceiver architectures that extract the promised multiplexing

More information

Interference Alignment and the Degrees of Freedom of Wireless X Networks

Interference Alignment and the Degrees of Freedom of Wireless X Networks Interference Alignment and the Degrees of Freedom of Wireless X Networs Vivec R. Cadambe, Syed A. Jafar Center for Pervasive Communications and Computing Electrical Engineering and Computer Science University

More information

Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels,

Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels, 203 IEEE. Reprinted, with permission, from Johannes Richter, Elke Franz, Sabrina Gerbracht, Stefan Pfennig, and Eduard A. Jorswieck, Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels,

More information

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 8, AUGUST 2008 3425. 1 If the capacity can be expressed as C(SNR) =d log(snr)+o(log(snr))

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 8, AUGUST 2008 3425. 1 If the capacity can be expressed as C(SNR) =d log(snr)+o(log(snr)) IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 8, AUGUST 2008 3425 Interference Alignment and Degrees of Freedom of the K-User Interference Channel Viveck R Cadambe, Student Member, IEEE, and Syed

More information

Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel

Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 2, FEBRUARY 2002 359 Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel Lizhong Zheng, Student

More information

MIMO CHANNEL CAPACITY

MIMO CHANNEL CAPACITY MIMO CHANNEL CAPACITY Ochi Laboratory Nguyen Dang Khoa (D1) 1 Contents Introduction Review of information theory Fixed MIMO channel Fading MIMO channel Summary and Conclusions 2 1. Introduction The use

More information

A New Interpretation of Information Rate

A New Interpretation of Information Rate A New Interpretation of Information Rate reproduced with permission of AT&T By J. L. Kelly, jr. (Manuscript received March 2, 956) If the input symbols to a communication channel represent the outcomes

More information

Coding and decoding with convolutional codes. The Viterbi Algor

Coding and decoding with convolutional codes. The Viterbi Algor Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition

More information

Diversity and Degrees of Freedom in Wireless Communications

Diversity and Degrees of Freedom in Wireless Communications 1 Diversity and Degrees of Freedom in Wireless Communications Mahesh Godavarti Altra Broadband Inc., godavarti@altrabroadband.com Alfred O. Hero-III Dept. of EECS, University of Michigan hero@eecs.umich.edu

More information

MIMO: What shall we do with all these degrees of freedom?

MIMO: What shall we do with all these degrees of freedom? MIMO: What shall we do with all these degrees of freedom? Helmut Bölcskei Communication Technology Laboratory, ETH Zurich June 4, 2003 c H. Bölcskei, Communication Theory Group 1 Attributes of Future Broadband

More information

IEOR 4404 Homework #2 Intro OR: Deterministic Models February 14, 2011 Prof. Jay Sethuraman Page 1 of 5. Homework #2

IEOR 4404 Homework #2 Intro OR: Deterministic Models February 14, 2011 Prof. Jay Sethuraman Page 1 of 5. Homework #2 IEOR 4404 Homework # Intro OR: Deterministic Models February 14, 011 Prof. Jay Sethuraman Page 1 of 5 Homework #.1 (a) What is the optimal solution of this problem? Let us consider that x 1, x and x 3

More information

4932 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 11, NOVEMBER 2009

4932 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 11, NOVEMBER 2009 4932 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 11, NOVEMBER 2009 The Degrees-of-Freedom of the K-User Gaussian Interference Channel Is Discontinuous at Rational Channel Coefficients Raúl H Etkin,

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications Physical Layer Security in Wireless Communications Dr. Zheng Chang Department of Mathematical Information Technology zheng.chang@jyu.fi Outline Fundamentals of Physical Layer Security (PLS) Coding for

More information

Full- or Half-Duplex? A Capacity Analysis with Bounded Radio Resources

Full- or Half-Duplex? A Capacity Analysis with Bounded Radio Resources Full- or Half-Duplex? A Capacity Analysis with Bounded Radio Resources Vaneet Aggarwal AT&T Labs - Research, Florham Park, NJ 7932. vaneet@research.att.com Melissa Duarte, Ashutosh Sabharwal Rice University,

More information

Source Transmission over Relay Channel with Correlated Relay Side Information

Source Transmission over Relay Channel with Correlated Relay Side Information Source Transmission over Relay Channel with Correlated Relay Side Information Deniz Gündüz, Chris T. K. Ng, Elza Erkip and Andrea J. Goldsmith Dept. of Electrical and Computer Engineering, Polytechnic

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Signal Detection. Outline. Detection Theory. Example Applications of Detection Theory

Signal Detection. Outline. Detection Theory. Example Applications of Detection Theory Outline Signal Detection M. Sami Fadali Professor of lectrical ngineering University of Nevada, Reno Hypothesis testing. Neyman-Pearson (NP) detector for a known signal in white Gaussian noise (WGN). Matched

More information

Diversity and Multiplexing: A Fundamental Tradeoff in Multiple-Antenna Channels

Diversity and Multiplexing: A Fundamental Tradeoff in Multiple-Antenna Channels IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 5, MAY 2003 1073 Diversity Multiplexing: A Fundamental Tradeoff in Multiple-Antenna Channels Lizhong Zheng, Member, IEEE, David N C Tse, Member, IEEE

More information

On Secure Communication over Wireless Erasure Networks

On Secure Communication over Wireless Erasure Networks On Secure Communication over Wireless Erasure Networks Andrew Mills Department of CS amills@cs.utexas.edu Brian Smith bsmith@ece.utexas.edu T. Charles Clancy University of Maryland College Park, MD 20472

More information

Polarization codes and the rate of polarization

Polarization codes and the rate of polarization Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,

More information

EECS 556 Image Processing W 09. Interpolation. Interpolation techniques B splines

EECS 556 Image Processing W 09. Interpolation. Interpolation techniques B splines EECS 556 Image Processing W 09 Interpolation Interpolation techniques B splines What is image processing? Image processing is the application of 2D signal processing methods to images Image representation

More information

CARLETON UNIVERSITY Department of Systems and Computer Engineering. SYSC4700 Telecommunications Engineering Winter 2014. Term Exam 13 February 2014

CARLETON UNIVERSITY Department of Systems and Computer Engineering. SYSC4700 Telecommunications Engineering Winter 2014. Term Exam 13 February 2014 CARLETON UNIVERSITY Department of Systems and Computer Engineering SYSC4700 Telecommunications Engineering Winter 2014 Term Exam 13 February 2014 Duration: 75 minutes Instructions: 1. Closed-book exam

More information

Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks

Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks Mostafa Dehghan, Dennis L. Goeckel, Majid Ghaderi, and Zhiguo Ding Department of Electrical and Computer Engineering, University

More information

MIMO Antenna Systems in WinProp

MIMO Antenna Systems in WinProp MIMO Antenna Systems in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen mail@awe-communications.com Issue Date Changes V1.0 Nov. 2010 First version of document V2.0 Feb. 2011

More information

Optimization in R n Introduction

Optimization in R n Introduction Optimization in R n Introduction Rudi Pendavingh Eindhoven Technical University Optimization in R n, lecture Rudi Pendavingh (TUE) Optimization in R n Introduction ORN / 4 Some optimization problems designing

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed

More information

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error

More information

Teaching Convolutional Coding using MATLAB in Communication Systems Course. Abstract

Teaching Convolutional Coding using MATLAB in Communication Systems Course. Abstract Section T3C2 Teaching Convolutional Coding using MATLAB in Communication Systems Course Davoud Arasteh Department of Electronic Engineering Technology, LA 70813, USA Abstract Convolutional codes are channel

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction 1. Shannon s Information Theory 2. Source Coding theorem 3. Channel Coding Theory 4. Information Capacity Theorem 5. Introduction to Error Control Coding Appendix A : Historical

More information

Implementation of Digital Signal Processing: Some Background on GFSK Modulation

Implementation of Digital Signal Processing: Some Background on GFSK Modulation Implementation of Digital Signal Processing: Some Background on GFSK Modulation Sabih H. Gerez University of Twente, Department of Electrical Engineering s.h.gerez@utwente.nl Version 4 (February 7, 2013)

More information

Zeros of Polynomial Functions

Zeros of Polynomial Functions Review: Synthetic Division Find (x 2-5x - 5x 3 + x 4 ) (5 + x). Factor Theorem Solve 2x 3-5x 2 + x + 2 =0 given that 2 is a zero of f(x) = 2x 3-5x 2 + x + 2. Zeros of Polynomial Functions Introduction

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

A Practical Scheme for Wireless Network Operation

A Practical Scheme for Wireless Network Operation A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving

More information

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA

More information

Wireless Networks with Symmetric Demands

Wireless Networks with Symmetric Demands Wireless Networks with Symmetric Demands Sudeep Kamath EECS Dept., UC Berkeley Berkeley, CA 94720 Email: sudeep@eecs.berkeley.edu Sreeram Kannan CSL and Dept. of ECE UIUC, IL 680 Email: kannan@illinois.edu

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

Designing Wireless Broadband Access for Energy Efficiency

Designing Wireless Broadband Access for Energy Efficiency Designing Wireless Broadband Access for Energy Efficiency Are Small Cells the Only Answer? Emil Björnson 1, Luca Sanguinetti 2,3, Marios Kountouris 3,4 1 Linköping University, Linköping, Sweden 2 University

More information

On the Degrees of Freedom of time correlated MISO broadcast channel with delayed CSIT

On the Degrees of Freedom of time correlated MISO broadcast channel with delayed CSIT On the Degrees of Freedom of time correlated MISO broadcast channel with delayed CSI Mari Kobayashi, Sheng Yang SUPELEC Gif-sur-Yvette, France {mari.kobayashi, sheng.yang}@supelec.fr David Gesbert, Xinping

More information

Capacity Limits of MIMO Systems

Capacity Limits of MIMO Systems 1 Capacity Limits of MIMO Systems Andrea Goldsmith, Syed Ali Jafar, Nihar Jindal, and Sriram Vishwanath 2 I. INTRODUCTION In this chapter we consider the Shannon capacity limits of single-user and multi-user

More information

Capacity of the Multiple Access Channel in Energy Harvesting Wireless Networks

Capacity of the Multiple Access Channel in Energy Harvesting Wireless Networks Capacity of the Multiple Access Channel in Energy Harvesting Wireless Networks R.A. Raghuvir, Dinesh Rajan and M.D. Srinath Department of Electrical Engineering Southern Methodist University Dallas, TX

More information

1. (Ungraded) A noiseless 2-kHz channel is sampled every 5 ms. What is the maximum data rate?

1. (Ungraded) A noiseless 2-kHz channel is sampled every 5 ms. What is the maximum data rate? Homework 2 Solution Guidelines CSC 401, Fall, 2011 1. (Ungraded) A noiseless 2-kHz channel is sampled every 5 ms. What is the maximum data rate? 1. In this problem, the channel being sampled gives us the

More information

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of

More information

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving

More information

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2

More information

Cooperative Communication for Spatial Frequency Reuse Multihop Wireless Networks under Slow Rayleigh Fading

Cooperative Communication for Spatial Frequency Reuse Multihop Wireless Networks under Slow Rayleigh Fading his full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Cooperative Communication for Spatial Frequency

More information

Degrees of Freedom for MIMO Two-Way X Relay Channel

Degrees of Freedom for MIMO Two-Way X Relay Channel 1 Degrees of Freedom for MIMO Two-Way X Relay Channel Zhengzheng Xiang, Meixia Tao, Senior Member, IEEE, Jianhua Mo, and Xiaodong Wang, Fellow, IEEE Abstract We study the degrees of freedom (DOF) of a

More information

A Numerical Study on the Wiretap Network with a Simple Network Topology

A Numerical Study on the Wiretap Network with a Simple Network Topology A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng and Vincent Tan Department of Electrical and Computer Engineering National University of Singapore Mathematical Tools of

More information

Dynamic TCP Acknowledgement: Penalizing Long Delays

Dynamic TCP Acknowledgement: Penalizing Long Delays Dynamic TCP Acknowledgement: Penalizing Long Delays Karousatou Christina Network Algorithms June 8, 2010 Karousatou Christina (Network Algorithms) Dynamic TCP Acknowledgement June 8, 2010 1 / 63 Layout

More information

Zeros of Polynomial Functions

Zeros of Polynomial Functions Zeros of Polynomial Functions The Rational Zero Theorem If f (x) = a n x n + a n-1 x n-1 + + a 1 x + a 0 has integer coefficients and p/q (where p/q is reduced) is a rational zero, then p is a factor of

More information

Cooperative Communications in. Mobile Ad-Hoc Networks: Rethinking

Cooperative Communications in. Mobile Ad-Hoc Networks: Rethinking Chapter 1 Cooperative Communications in Mobile Ad-Hoc Networks: Rethinking the Link Abstraction Anna Scaglione, Dennis L. Goeckel and J. Nicholas Laneman Cornell University, University of Massachusetts

More information

FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN

FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN DISCRETE "ICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN Roberto Togneri Christopher J.S. desilva CHAPMAN & HALL/CRC A CRC Press Company Boca

More information

Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas

Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas Nihar Jindal ECE Department University of Minnesota nihar@umn.edu Jeffrey G. Andrews ECE Department University

More information

CONTRIBUTIONS ON NETWORKING TECHNIQUES FOR WIRELESS RELAY CHANNELS. Smrati Gupta Supervisor: Dr. M. A. Vázquez-Castro

CONTRIBUTIONS ON NETWORKING TECHNIQUES FOR WIRELESS RELAY CHANNELS. Smrati Gupta Supervisor: Dr. M. A. Vázquez-Castro CONTRIBUTIONS ON NETWORKING TECHNIQUES FOR WIRELESS RELAY CHANNELS Smrati Gupta Supervisor: Dr. M. A. Vázquez-Castro PhD Programme in Telecommunications and Systems Engineering Department of Telecommunications

More information

LECTURE 4. Last time: Lecture outline

LECTURE 4. Last time: Lecture outline LECTURE 4 Last time: Types of convergence Weak Law of Large Numbers Strong Law of Large Numbers Asymptotic Equipartition Property Lecture outline Stochastic processes Markov chains Entropy rate Random

More information

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System Digital Modulation David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh http://www.tele.pitt.edu/tipper.html Typical Communication System Source

More information

MIMO detector algorithms and their implementations for LTE/LTE-A

MIMO detector algorithms and their implementations for LTE/LTE-A GIGA seminar 11.01.2010 MIMO detector algorithms and their implementations for LTE/LTE-A Markus Myllylä and Johanna Ketonen 11.01.2010 2 Outline Introduction System model Detection in a MIMO-OFDM system

More information

Division algebras for coding in multiple antenna channels and wireless networks

Division algebras for coding in multiple antenna channels and wireless networks Division algebras for coding in multiple antenna channels and wireless networks Frédérique Oggier frederique@systems.caltech.edu California Institute of Technology Cornell University, School of Electrical

More information

Introduction to Support Vector Machines. Colin Campbell, Bristol University

Introduction to Support Vector Machines. Colin Campbell, Bristol University Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.

More information

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber

More information

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Ron Steinfeld (Macquarie University, Australia) (email: rons@ics.mq.edu.au) Joint work with: Huaxiong Wang (Macquarie University)

More information

Public Switched Telephone System

Public Switched Telephone System Public Switched Telephone System Structure of the Telephone System The Local Loop: Modems, ADSL Structure of the Telephone System (a) Fully-interconnected network. (b) Centralized switch. (c) Two-level

More information

Vector Bin-and-Cancel for MIMO Distributed Full-Duplex

Vector Bin-and-Cancel for MIMO Distributed Full-Duplex Vector Bin-and-Cancel for MIMO Distributed Full-Duplex Jingwen Bai, Chris Dick and Ashutosh Sabharwal, Fellow, IEEE 1 arxiv:1402.0614v3 [cs.it] 16 Jan 2015 Abstract In a multi-input multi-output (MIMO)

More information

On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information

On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information Finance 400 A. Penati - G. Pennacchi Notes on On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information by Sanford Grossman This model shows how the heterogeneous information

More information

Digital Transmission of Analog Data: PCM and Delta Modulation

Digital Transmission of Analog Data: PCM and Delta Modulation Digital Transmission of Analog Data: PCM and Delta Modulation Required reading: Garcia 3.3.2 and 3.3.3 CSE 323, Fall 200 Instructor: N. Vlajic Digital Transmission of Analog Data 2 Digitization process

More information

Half-Duplex or Full-Duplex Relaying: A Capacity Analysis under Self-Interference

Half-Duplex or Full-Duplex Relaying: A Capacity Analysis under Self-Interference Half-Duplex or Full-Duplex elaying: A Capacity Analysis under Self-Interference Nirmal Shende Department of ECE, Polytechnic Institute of NYU Brooklyn, NY 0 Email: nvs5@students.poly.edu Ozgur Gurbuz Faculty

More information

An Introduction to Neural Networks

An Introduction to Neural Networks An Introduction to Vincent Cheung Kevin Cannons Signal & Data Compression Laboratory Electrical & Computer Engineering University of Manitoba Winnipeg, Manitoba, Canada Advisor: Dr. W. Kinsner May 27,

More information

Big Data Interpolation: An Effcient Sampling Alternative for Sensor Data Aggregation

Big Data Interpolation: An Effcient Sampling Alternative for Sensor Data Aggregation Big Data Interpolation: An Effcient Sampling Alternative for Sensor Data Aggregation Hadassa Daltrophe, Shlomi Dolev, Zvi Lotker Ben-Gurion University Outline Introduction Motivation Problem definition

More information

Network Coding for Distributed Storage

Network Coding for Distributed Storage Network Coding for Distributed Storage Alex Dimakis USC Overview Motivation Data centers Mobile distributed storage for D2D Specific storage problems Fundamental tradeoff between repair communication and

More information

EECC694 - Shaaban. Transmission Channel

EECC694 - Shaaban. Transmission Channel The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,

More information

is the power reference: Specifically, power in db is represented by the following equation, where P0 P db = 10 log 10

is the power reference: Specifically, power in db is represented by the following equation, where P0 P db = 10 log 10 RF Basics - Part 1 This is the first article in the multi-part series on RF Basics. We start the series by reviewing some basic RF concepts: Decibels (db), Antenna Gain, Free-space RF Propagation, RF Attenuation,

More information

Time and Frequency Domain Equalization

Time and Frequency Domain Equalization Time and Frequency Domain Equalization Presented By: Khaled Shawky Hassan Under Supervision of: Prof. Werner Henkel Introduction to Equalization Non-ideal analog-media such as telephone cables and radio

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property

A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property Venkat Chandar March 1, 2008 Abstract In this note, we prove that matrices whose entries are all 0 or 1 cannot achieve

More information

a 1 x + a 0 =0. (3) ax 2 + bx + c =0. (4)

a 1 x + a 0 =0. (3) ax 2 + bx + c =0. (4) ROOTS OF POLYNOMIAL EQUATIONS In this unit we discuss polynomial equations. A polynomial in x of degree n, where n 0 is an integer, is an expression of the form P n (x) =a n x n + a n 1 x n 1 + + a 1 x

More information

Zero: If P is a polynomial and if c is a number such that P (c) = 0 then c is a zero of P.

Zero: If P is a polynomial and if c is a number such that P (c) = 0 then c is a zero of P. MATH 11011 FINDING REAL ZEROS KSU OF A POLYNOMIAL Definitions: Polynomial: is a function of the form P (x) = a n x n + a n 1 x n 1 + + a x + a 1 x + a 0. The numbers a n, a n 1,..., a 1, a 0 are called

More information

Transportation Polytopes: a Twenty year Update

Transportation Polytopes: a Twenty year Update Transportation Polytopes: a Twenty year Update Jesús Antonio De Loera University of California, Davis Based on various papers joint with R. Hemmecke, E.Kim, F. Liu, U. Rothblum, F. Santos, S. Onn, R. Yoshida,

More information

Degrees of Freedom of the Interference Channel: a General Formula

Degrees of Freedom of the Interference Channel: a General Formula 0 IEEE International Symposium on Information Theory Proceedings Degrees of Freedom of the Interference Channel: a General Formula Yihong Wu Princeton University Princeton, NJ 08544, USA Email: yihongwu@princeton.edu

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

DSL Spectrum Management

DSL Spectrum Management DSL Spectrum Management Dr. Jianwei Huang Department of Electrical Engineering Princeton University Guest Lecture of ELE539A March 2007 Jianwei Huang (Princeton) DSL Spectrum Management March 2007 1 /

More information

Arithmetic Coding: Introduction

Arithmetic Coding: Introduction Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation

More information

EDA ad hoc B program. CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC

EDA ad hoc B program. CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC EDA ad hoc B program CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC Learning algorithms for power and frequency allocation in clustered ad hoc networks Luca ROSE,

More information

Zeros of Polynomial Functions

Zeros of Polynomial Functions Zeros of Polynomial Functions Objectives: 1.Use the Fundamental Theorem of Algebra to determine the number of zeros of polynomial functions 2.Find rational zeros of polynomial functions 3.Find conjugate

More information

1 Solving LPs: The Simplex Algorithm of George Dantzig

1 Solving LPs: The Simplex Algorithm of George Dantzig Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.

More information

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University

More information

T-79.7001 Postgraduate Course in Theoretical Computer Science T-79.5401 Special Course in Mobility Management: Ad hoc networks (2-10 cr) P V

T-79.7001 Postgraduate Course in Theoretical Computer Science T-79.5401 Special Course in Mobility Management: Ad hoc networks (2-10 cr) P V T-79.7001 Postgraduate Course in Theoretical Computer Science T-79.5401 Special Course in Mobility Management: Ad hoc networks (2-10 cr) P V professor Hannu H. Kari Laboratory for Theoretical Computer

More information

The Cooperative DPC Rate Region And Network Power Allocation

The Cooperative DPC Rate Region And Network Power Allocation Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith and Urbashi Mitra Dept. of Electrical Engineering, Stanford University, Stanford, CA 94305

More information

Classification - Examples

Classification - Examples Lecture 2 Scheduling 1 Classification - Examples 1 r j C max given: n jobs with processing times p 1,...,p n and release dates r 1,...,r n jobs have to be scheduled without preemption on one machine taking

More information

STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION

STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION Adiel Ben-Shalom, Michael Werman School of Computer Science Hebrew University Jerusalem, Israel. {chopin,werman}@cs.huji.ac.il

More information

Optimizing the SINR operating point of spatial networks

Optimizing the SINR operating point of spatial networks Optimizing the SIR operating point of spatial networks ihar Jindal ECE Department University of Minnesota nihar@umn.edu Jeffrey G. Andrews ECE Department University of Texas at Austin jandrews@ece.utexas.edu

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

Alternative proof for claim in [1]

Alternative proof for claim in [1] Alternative proof for claim in [1] Ritesh Kolte and Ayfer Özgür Aydin The problem addressed in [1] is described in Section 1 and the solution is given in Section. In the proof in [1], it seems that obtaining

More information

TTT4120 Digital Signal Processing Suggested Solution to Exam Fall 2008

TTT4120 Digital Signal Processing Suggested Solution to Exam Fall 2008 Norwegian University of Science and Technology Department of Electronics and Telecommunications TTT40 Digital Signal Processing Suggested Solution to Exam Fall 008 Problem (a) The input and the input-output

More information

Speech Signal Processing: An Overview

Speech Signal Processing: An Overview Speech Signal Processing: An Overview S. R. M. Prasanna Department of Electronics and Electrical Engineering Indian Institute of Technology Guwahati December, 2012 Prasanna (EMST Lab, EEE, IITG) Speech

More information