2018
DOI: 10.1109/tit.2018.2872053
|View full text |Cite
|
Sign up to set email alerts
|

A Joint Typicality Approach to Compute–Forward

Abstract: This paper presents a joint typicality framework for encoding and decoding nested linear codes in multiuser networks. This framework provides a new perspective on compute-forward within the context of discrete memoryless networks. In particular, it establishes an achievable rate region for computing a linear combination over a discrete memoryless multiple-access channel (MAC). When specialized to the Gaussian MAC, this rate region recovers and improves upon the lattice-based compute-forward rate region of Naze… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
34
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

4
2

Authors

Journals

citations
Cited by 23 publications
(35 citation statements)
references
References 59 publications
1
34
0
Order By: Relevance
“…The aim of this paper was to create a unified framework that captures techniques (e.g., unequal power allocation, successive decoding) that are useful in these settings. Follow-up efforts have employed this expanded framework to develop a notion of uplink-downlink duality for integer-forcing [17] as well as investigate compute-and-forward for discrete memoryless networks [18].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The aim of this paper was to create a unified framework that captures techniques (e.g., unequal power allocation, successive decoding) that are useful in these settings. Follow-up efforts have employed this expanded framework to develop a notion of uplink-downlink duality for integer-forcing [17] as well as investigate compute-and-forward for discrete memoryless networks [18].…”
Section: Discussionmentioning
confidence: 99%
“…It is sometimes convenient to replace the condition in (18) with the stricter condition that σ 2 succ (H, a 1 ) ≤ σ 2 succ (H, a 2 |A 1 ) ≤ · · · ≤ σ 2 succ (H, a L |A L−1 ) . ♦ Remark 10: For any channel matrix H and power matrix P, there always exists a unimodular matrix A and multiple-access mapping I with permutation π for which Theorem 5 applies.…”
Section: Remarkmentioning
confidence: 99%
See 1 more Smart Citation
“…code ensembles, e.g. the multiple-access channel coding theorem proof in [7] and the hybrid coding scheme in [9], except that we use specialized joint typicality lemmas and a Markov lemma developed specifically for nested linear code ensembles [41,Lemma 12]. Ideally, we would like to upper bound the probability term P{(W n…”
Section: Further Definementioning
confidence: 99%
“…This follows directly from the R LMAC evaluation from the proof of Corollary 1 in Appendix A.Remark 5. Let R LMAC,old denote the rate region in[41, Theorem 5] and recall the region R MAC in(15). For a…”
mentioning
confidence: 99%