2018
DOI: 10.1109/tit.2018.2791589
|View full text |Cite
|
Sign up to set email alerts
|

Uplink-Downlink Duality for Integer-Forcing

Abstract: Abstract-Consider a Gaussian multiple-input multiple-output (MIMO) multiple-access channel (MAC) with channel matrix H and a Gaussian MIMO broadcast channel (BC) with channel matrix H T . For the MIMO MAC, the integer-forcing architecture consists of first decoding integer-linear combinations of the transmitted codewords, which are then solved for the original messages. For the MIMO BC, the integer-forcing architecture consists of pre-inverting the integer-linear combinations at the transmitter so that each re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
18
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 19 publications
(20 citation statements)
references
References 63 publications
0
18
0
2
Order By: Relevance
“…UEs can share a total power budget which is the upper bound performance of each UE's power constraint as their total maximum allowable transmit power [29]. Besides, ( 19) is handled at the CPU since the…”
Section: B Parallel Computationmentioning
confidence: 99%
“…UEs can share a total power budget which is the upper bound performance of each UE's power constraint as their total maximum allowable transmit power [29]. Besides, ( 19) is handled at the CPU since the…”
Section: B Parallel Computationmentioning
confidence: 99%
“…LRA precoding was introduced in [139,143,119]. IF schemes for the downlink were proposed in [62] and [56]. Meanwhile, a (weakened) uplink/downlink duality was proved for the IF architecture [57].…”
Section: Introductionmentioning
confidence: 99%
“…that the compute-forward framework can serve as a building block in many other scenarios, such as multiple-antenna transceiver architectures [35]- [38], interference alignment [12], multiple-access strategies [12], [36], [39], [40], and distributed source coding [41]. The initial Gaussian compute-forward framework [27] utilized "single-user" decoding (i.e., decoding to the closest nested lattice codeword), and follow-up work generalized this framework to allow for sequential decoding [39] (i.e., utilizing recovered linear combinations as side information to reduce the effective noise).…”
mentioning
confidence: 99%