var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fresearch.seas.ucla.edu%2Flicos%2Ffiles%2F2023%2F02%2Fpublicactions_v1.bib&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&filter=tags:(ANIT|approxIT|ITapprox)&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fresearch.seas.ucla.edu%2Flicos%2Ffiles%2F2023%2F02%2Fpublicactions_v1.bib&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&filter=tags:(ANIT|approxIT|ITapprox)&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fresearch.seas.ucla.edu%2Flicos%2Ffiles%2F2023%2F02%2Fpublicactions_v1.bib&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&filter=tags:(ANIT|approxIT|ITapprox)&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2020\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Sebastian; and S. N. Diggavi.\n\n\n \n \n \n \n Generalized Degrees Freedom of Noncoherent MIMO Channels With Asymmetric Link Strengths.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 66(7): 4431-4448. July 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{9023963,\n abstract = {We study the generalized degrees of freedom (gDoF) of block-fading noncoherent multiple input multiple output (MIMO) channels with asymmetric distributions of link strengths and a coherence time of T symbol durations. We derive the optimal signaling structure for communication for the asymmetric MIMO channel, which is distinct from that for the MIMO channel with independent and identically distributed (i.i.d.) links. We extend the existing results for the single input multiple output (SIMO) channel with i.i.d. links to the asymmetric case, proving that selecting the statistically best antenna is gDoFoptimal. Using the gDoF result for the SIMO channel, we prove that for T = 1, the gDoF is zero for MIMO channels with arbitrary link strengths. We show that selecting the statistically best antenna is gDoF-optimal for the multiple input single output (MISO) channel. We also derive the gDoF for the 2 x 2 MIMO channel with different exponents in the direct and cross links. In this setting, we show that it is always necessary to use both the antennas to achieve the gDoF, in contrast to the results for the 2 x 2 MIMO channel with i.i.d. links. We show that having weaker crosslinks, gives gDoF gain compared to the case with i.i.d. links. For the noncoherent MIMO channel with i.i.d. links, the traditional method of training each transmit antenna independently is degrees of freedom (DoF) optimal, whereas we observe that for the asymmetric 2 x 2 MIMO channel, the traditional training is not gDoF-optimal. We extend this observation to a larger MxM MIMO channel by demonstrating a strategy that can achieve larger gDoF than a traditional trainingbased method.},\n author = {J. {Sebastian} and S. N. {Diggavi}},\n doi = {10.1109/TIT.2020.2978183},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {MIMO communication;MISO communication;SIMO communication;transmitting antennas;generalized degrees freedom;noncoherent MIMO channel;asymmetric link strengths;block-fading noncoherent multiple input multiple output channels;asymmetric distributions;optimal signaling structure;asymmetric MIMO channel;single input multiple output channel;asymmetric case;SIMO channel;arbitrary link strengths;multiple input single output channel;direct links;cross links;gDoF gain;degrees of freedom optimal;MxM MIMO channel;MIMO communication;Signal to noise ratio;Fading channels;Transmitting antennas;Coherence;MISO communication;Degrees of freedom (DoF);multiple antennas;time-varying channels;noncoherent communication},\n month = {July},\n number = {7},\n pages = {4431-4448},\n tags = {journal,IT,ANIT,WiNetnew,NCWN,WNIF},\n title = {Generalized Degrees Freedom of Noncoherent MIMO Channels With Asymmetric Link Strengths},\n type = {2},\n volume = {66},\n year = {2020}\n}\n\n
\n
\n\n\n
\n We study the generalized degrees of freedom (gDoF) of block-fading noncoherent multiple input multiple output (MIMO) channels with asymmetric distributions of link strengths and a coherence time of T symbol durations. We derive the optimal signaling structure for communication for the asymmetric MIMO channel, which is distinct from that for the MIMO channel with independent and identically distributed (i.i.d.) links. We extend the existing results for the single input multiple output (SIMO) channel with i.i.d. links to the asymmetric case, proving that selecting the statistically best antenna is gDoFoptimal. Using the gDoF result for the SIMO channel, we prove that for T = 1, the gDoF is zero for MIMO channels with arbitrary link strengths. We show that selecting the statistically best antenna is gDoF-optimal for the multiple input single output (MISO) channel. We also derive the gDoF for the 2 x 2 MIMO channel with different exponents in the direct and cross links. In this setting, we show that it is always necessary to use both the antennas to achieve the gDoF, in contrast to the results for the 2 x 2 MIMO channel with i.i.d. links. We show that having weaker crosslinks, gives gDoF gain compared to the case with i.i.d. links. For the noncoherent MIMO channel with i.i.d. links, the traditional method of training each transmit antenna independently is degrees of freedom (DoF) optimal, whereas we observe that for the asymmetric 2 x 2 MIMO channel, the traditional training is not gDoF-optimal. We extend this observation to a larger MxM MIMO channel by demonstrating a strategy that can achieve larger gDoF than a traditional trainingbased method.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Sebastian; and S. Diggavi.\n\n\n \n \n \n \n \n Generalized Degrees of Freedom of Noncoherent Diamond Networks.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 66(8): 5228-5260. Aug 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Generalized arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{9046857,\n abstract = {We study the generalized degrees of freedom (gDoF) of the noncoherent diamond (parallel relay) wireless network with asymmetric distributions of link strengths. We use the noncoherent block-fading model introduced by Marzetta and Hochwald, where no channel state information is available at the transmitters or at the receivers and the channels remain constant for a coherence time of T symbol durations. We first derive an upper bound for the capacity of this channel and then derive the optimal structure for the solution of the upper bound optimization problem. Using the optimal structure, we solve the upper bound optimization problem in terms of its gDoF. Using insights from our upper bound signaling solution, we devise an achievability strategy based on a novel scheme that we call train-scale quantize-map-forward (TS-QMF). This scheme uses training in the links from the source to the relays, scaling and quantizing at the relays combined with nontraining-based schemes. We show the optimality of this scheme by comparing it to the upper bound in terms of the gDoF. In noncoherent point-to-point multiple-input-multiple-output (MIMO) channels, where the fading realization is unknown to the transmitter and the receiver, an important tradeoff between communication and channel learning was revealed by Zheng and Tse, by demonstrating that not all the available antennas might be used, as it is suboptimal to learn all their channel parameters. Our results in this paper for the diamond network demonstrate that in certain regimes of relative channel strengths, the gDoF-optimal scheme uses a subnetwork, demonstrating a similar tradeoff between channel learning and communication. In some regimes, it is gDoF-optimal to do relay selection, i.e., use a part of the network. In the other regimes, even when it is essential to use the entire network, it is suboptimal to learn the channel states for all the links in the network, i.e., traditional training-based schemes are suboptimal in these regimes.},\n author = {J. {Sebastian} and S. {Diggavi}},\n doi = {10.1109/TIT.2020.2983169},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {channel capacity;fading channels;learning (artificial intelligence);MIMO communication;optimisation;quantisation (signal);radio receivers;radio transmitters;relay networks (telecommunication);telecommunication computing;noncoherent point-to-point MIMO channel;noncoherent point-to-point multiple-input-multiple-output channel;TS-QMF;bound signaling solution;bound optimization problem;channel capacity;Hochwald;Marzetta;block-fading model;asymmetric distribution;noncoherent diamond wireless network;generalized degrees of freedom;noncoherent diamond network;gDoF-optimal scheme;train-scale quantize-map-forward;channel state information;Signal to noise ratio;Relays;Diamond;MIMO communication;Upper bound;Fading channels;Wireless networks;Noncoherent communication;degrees of freedom (DoF);relay channels;diamond network;time-varying channels},\n month = {Aug},\n number = {8},\n pages = {5228-5260},\n tags = {journal,IT,ANIT,WiNetnew,NCWN,WNIF},\n title = {Generalized Degrees of Freedom of Noncoherent Diamond Networks},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1802.02667},\n volume = {66},\n year = {2020}\n}\n\n
\n
\n\n\n
\n We study the generalized degrees of freedom (gDoF) of the noncoherent diamond (parallel relay) wireless network with asymmetric distributions of link strengths. We use the noncoherent block-fading model introduced by Marzetta and Hochwald, where no channel state information is available at the transmitters or at the receivers and the channels remain constant for a coherence time of T symbol durations. We first derive an upper bound for the capacity of this channel and then derive the optimal structure for the solution of the upper bound optimization problem. Using the optimal structure, we solve the upper bound optimization problem in terms of its gDoF. Using insights from our upper bound signaling solution, we devise an achievability strategy based on a novel scheme that we call train-scale quantize-map-forward (TS-QMF). This scheme uses training in the links from the source to the relays, scaling and quantizing at the relays combined with nontraining-based schemes. We show the optimality of this scheme by comparing it to the upper bound in terms of the gDoF. In noncoherent point-to-point multiple-input-multiple-output (MIMO) channels, where the fading realization is unknown to the transmitter and the receiver, an important tradeoff between communication and channel learning was revealed by Zheng and Tse, by demonstrating that not all the available antennas might be used, as it is suboptimal to learn all their channel parameters. Our results in this paper for the diamond network demonstrate that in certain regimes of relative channel strengths, the gDoF-optimal scheme uses a subnetwork, demonstrating a similar tradeoff between channel learning and communication. In some regimes, it is gDoF-optimal to do relay selection, i.e., use a part of the network. In the other regimes, even when it is essential to use the entire network, it is suboptimal to learn the channel states for all the links in the network, i.e., traditional training-based schemes are suboptimal in these regimes.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 3\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Hachem; U. Niesen; and S. Diggavi.\n\n\n \n \n \n \n Caching for Interference Networks: A Separation Architecture.\n \n \n \n\n\n \n\n\n\n Edge Caching for Mobile Networks. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hachem2020caching,\n author = {Hachem, J. and Niesen, U. and Diggavi, S.},\n editor = {Poor, Vince and Chen, Wei},\n journal = {Edge Caching for Mobile Networks},\n publisher = {Institute of Engineering and Technology (IET) Press},\n tags = {BookChap,CCWN,IT,ANIT,WiNetnew,SCS},\n title = {Caching for Interference Networks: A Separation Architecture},\n type = {3},\n year = {2020}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 1\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Joyson Sebastian; and Suhas Diggavi.\n\n\n \n \n \n \n \n On the Generalized Degrees of Freedom of Noncoherent Interference Channel.\n \n \n \n \n\n\n \n\n\n\n arXiv preprint arXiv:1812.03579. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"On arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{sebastian2018generalized,\n abstract = {We study the generalized degrees of freedom (gDoF) of the block-fading noncoherent 2-user interference channel (IC) with a coherence time of T symbol durations and symmetric fading statistics. We demonstrate that a natural training-based scheme, to operate the noncoherent IC, is suboptimal in several regimes. As an alternate scheme, we propose a new noncoherent rate-splitting scheme. We also consider treating interference-as-noise (TIN) scheme and a time division multiplexing (TDM) scheme. We observe that a standard training-based scheme for IC is outperformed by one of these schemes in several regimes: our results demonstrate that for low average interference-to-noise ratio (INR), TIN is best; for high INR, TDM and the noncoherent rate-splitting give better performance. We also study the noncoherent IC with feedback and propose a noncoherent rate-splitting scheme. Again for the feedback case as well, our results demonstrate that a natural training-based scheme can be outperformed by other schemes.},\n author = {Sebastian, Joyson and Diggavi, Suhas},\n journal = {arXiv preprint arXiv:1812.03579},\n tags = {journalSub,IT,ANIT,WiNetnew,NCWN},\n title = {On the Generalized Degrees of Freedom of Noncoherent Interference Channel},\n type = {1},\n url_arxiv = {https://arxiv.org/abs/1812.03579},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We study the generalized degrees of freedom (gDoF) of the block-fading noncoherent 2-user interference channel (IC) with a coherence time of T symbol durations and symmetric fading statistics. We demonstrate that a natural training-based scheme, to operate the noncoherent IC, is suboptimal in several regimes. As an alternate scheme, we propose a new noncoherent rate-splitting scheme. We also consider treating interference-as-noise (TIN) scheme and a time division multiplexing (TDM) scheme. We observe that a standard training-based scheme for IC is outperformed by one of these schemes in several regimes: our results demonstrate that for low average interference-to-noise ratio (INR), TIN is best; for high INR, TDM and the noncoherent rate-splitting give better performance. We also study the noncoherent IC with feedback and propose a noncoherent rate-splitting scheme. Again for the feedback case as well, our results demonstrate that a natural training-based scheme can be outperformed by other schemes.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Hachem; U. Niesen; and S. Diggavi.\n\n\n \n \n \n \n \n Energy-Efficiency Gains of Caching for Interference Channels.\n \n \n \n \n\n\n \n\n\n\n IEEE Communications Letters, 22(7): 1434-1437. July 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Energy-Efficiency arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{8335768,\n abstract = {This letter initiates the study of energy-efficiency gains provided by caching. We focus on the cache-aided Gaussian interference channel in the low-SNR regime. We propose a strategy that creates content overlaps at the transmitter caches to allow for co-operation between the transmitters. This co-operation yields a beamforming gain, which has to be traded off against a multicasting gain. We evaluate the performance of this strategy and show its approximate optimality in both the single-receiver case and the single-transmitter case.},\n author = {J. {Hachem} and U. {Niesen} and S. {Diggavi}},\n doi = {10.1109/LCOMM.2018.2822694},\n issn = {1558-2558},\n journal = {IEEE Communications Letters},\n keywords = {array signal processing;cache storage;channel capacity;energy conservation;Gaussian channels;multicast communication;radio networks;radiofrequency interference;telecommunication power management;wireless channels;energy-efficiency gains;cache-aided Gaussian interference channel;low-SNR regime;transmitter caches;co-operation yields;beamforming gain;multicasting gain;Transmitters;Receivers;Multicast communication;Array signal processing;Libraries;Interference channels;Network coding;wireless networks;content distribution networks},\n month = {July},\n number = {7},\n pages = {1434-1437},\n tags = {journal,CCWN,IT,ANIT,WiNetnew,SCS},\n title = {Energy-Efficiency Gains of Caching for Interference Channels},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1808.00653},\n volume = {22},\n year = {2018}\n}\n\n
\n
\n\n\n
\n This letter initiates the study of energy-efficiency gains provided by caching. We focus on the cache-aided Gaussian interference channel in the low-SNR regime. We propose a strategy that creates content overlaps at the transmitter caches to allow for co-operation between the transmitters. This co-operation yields a beamforming gain, which has to be traded off against a multicasting gain. We evaluate the performance of this strategy and show its approximate optimality in both the single-receiver case and the single-transmitter case.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Sebastian; C. Karakus; and S. Diggavi.\n\n\n \n \n \n \n \n Approximate Capacity of Fast Fading Interference Channels With no Instantaneous CSIT.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Communications, 66(12): 6015-6027. Dec 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Approximate arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{8429509,\n abstract = {We develop a characterization of fading models, which assigns a number called logarithmic Jensen's gap to a given fading model. We show that as a consequence of a finite logarithmic Jensen's gap, an approximate capacity region can be obtained for fast fading interference channels (FF-ICs) for several scenarios. We illustrate three instances where a constant capacity gap can be obtained as a function of the logarithmic Jensen's gap. First, for an FF-IC with neither feedback nor instantaneous channel state information at transmitter (CSIT), if the fading distribution has finite logarithmic Jensen's gap, we show that a rate-splitting scheme based on the average interference-to-noise ratio can achieve its approximate capacity. Second, we show that a similar scheme can achieve the approximate capacity of FF-IC with feedback and delayed CSIT, if the fading distribution has finite logarithmic Jensen's gap. Third, when this condition holds, we show that point-to-point codes can achieve approximate capacity for a class of FF-ICs with feedback. We prove that the logarithmic Jensen's gap is finite for common fading models, including Rayleigh and Nakagami fading, thereby obtaining the approximate capacity region of FF-IC with these fading models.},\n author = {J. {Sebastian} and C. {Karakus} and S. {Diggavi}},\n doi = {10.1109/TCOMM.2018.2864266},\n issn = {1558-0857},\n journal = {IEEE Transactions on Communications},\n keywords = {approximation theory;channel capacity;diversity reception;fading channels;Gaussian channels;MIMO communication;Nakagami channels;radio transmitters;radiofrequency interference;Rayleigh channels;fast fading interference channels;finite logarithmic Jensen's gap;approximate capacity region;FF-IC;constant capacity gap;instantaneous channel state information;fading distribution;common fading models;Rayleigh channels;Receivers;Transmitters;Integrated circuit modeling;Interference;Interference channels;fast fading;capacity region;rate-splitting},\n month = {Dec},\n number = {12},\n pages = {6015-6027},\n tags = {journal,ANIT,WiNetnew,NCWN,WNIF},\n title = {Approximate Capacity of Fast Fading Interference Channels With no Instantaneous CSIT},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1706.03659},\n volume = {66},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We develop a characterization of fading models, which assigns a number called logarithmic Jensen's gap to a given fading model. We show that as a consequence of a finite logarithmic Jensen's gap, an approximate capacity region can be obtained for fast fading interference channels (FF-ICs) for several scenarios. We illustrate three instances where a constant capacity gap can be obtained as a function of the logarithmic Jensen's gap. First, for an FF-IC with neither feedback nor instantaneous channel state information at transmitter (CSIT), if the fading distribution has finite logarithmic Jensen's gap, we show that a rate-splitting scheme based on the average interference-to-noise ratio can achieve its approximate capacity. Second, we show that a similar scheme can achieve the approximate capacity of FF-IC with feedback and delayed CSIT, if the fading distribution has finite logarithmic Jensen's gap. Third, when this condition holds, we show that point-to-point codes can achieve approximate capacity for a class of FF-ICs with feedback. We prove that the logarithmic Jensen's gap is finite for common fading models, including Rayleigh and Nakagami fading, thereby obtaining the approximate capacity region of FF-IC with these fading models.\n
\n\n\n
\n\n\n
\n \n\n \n \n Jad Hachem; Urs Niesen; and Suhas N Diggavi.\n\n\n \n \n \n \n \n Degrees of freedom of cache-aided wireless interference networks.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 64(7): 5359–5380. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Degrees arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hachem2018degrees,\n abstract = {We study the role of caches in wireless interference networks. We focus on content caching and delivery across a Gaussian interference network, where both transmitters and receivers are equipped with caches. We provide a constant-factor approximation of the system's degrees of freedom (DoF), for arbitrary number of transmitters, number of receivers, content library size, receiver cache size, and transmitter cache size (as long as the transmitters combined can store the entire content library among them). We demonstrate approximate optimality with respect to information-theoretic bounds that do not impose any restrictions on the caching and delivery strategies. Our characterization reveals three key insights. First, the approximate DoF is achieved using a strategy that separates the physical and network layers. This separation architecture is thus approximately optimal. Second, we show that increasing transmitter cache memory beyond what is needed to exactly store the entire library between all transmitters does not provide more than a constant-factor benefit to the DoF. A consequence is that transmit zero-forcing is not needed for approximate optimality. Third, we derive an interesting tradeoff between the receiver memory and the number of transmitters needed for approximately maximal performance. In particular, if each receiver can store a constant fraction of the content library, then only a constant number of transmitters are needed. Our solution to the caching problem requires formulating and solving a new communication problem, the symmetric multiple multicast X-channel, for which we provide an exact DoF characterization.},\n author = {Hachem, Jad and Niesen, Urs and Diggavi, Suhas N},\n journal = {IEEE Transactions on Information Theory},\n number = {7},\n pages = {5359--5380},\n publisher = {IEEE},\n tags = {journal,CCWN,IT,WiNetnew,SCS,ANIT},\n title = {Degrees of freedom of cache-aided wireless interference networks},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1606.03175},\n doi = {10.1109/TIT.2018.2825321},\n volume = {64},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We study the role of caches in wireless interference networks. We focus on content caching and delivery across a Gaussian interference network, where both transmitters and receivers are equipped with caches. We provide a constant-factor approximation of the system's degrees of freedom (DoF), for arbitrary number of transmitters, number of receivers, content library size, receiver cache size, and transmitter cache size (as long as the transmitters combined can store the entire content library among them). We demonstrate approximate optimality with respect to information-theoretic bounds that do not impose any restrictions on the caching and delivery strategies. Our characterization reveals three key insights. First, the approximate DoF is achieved using a strategy that separates the physical and network layers. This separation architecture is thus approximately optimal. Second, we show that increasing transmitter cache memory beyond what is needed to exactly store the entire library between all transmitters does not provide more than a constant-factor benefit to the DoF. A consequence is that transmit zero-forcing is not needed for approximate optimality. Third, we derive an interesting tradeoff between the receiver memory and the number of transmitters needed for approximately maximal performance. In particular, if each receiver can store a constant fraction of the content library, then only a constant number of transmitters are needed. Our solution to the caching problem requires formulating and solving a new communication problem, the symmetric multiple multicast X-channel, for which we provide an exact DoF characterization.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Mishra; I. Wang; and S. N. Diggavi.\n\n\n \n \n \n \n Harnessing Bursty Interference in Multicarrier Systems With Output Feedback.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 63(7): 4430-4452. July 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{7911284,\n abstract = {We study parallel two-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated independent and identically distributed (i.i.d.) over time. For the linear deterministic setup with symmetric interference in each subcarrier, we give a complete characterization of the capacity region. For the analogous setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism, which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali.},\n author = {S. {Mishra} and I. {Wang} and S. N. {Diggavi}},\n doi = {10.1109/TIT.2017.2697866},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {Gaussian noise;probability;radio networks;radiofrequency interference;harnessing bursty interference;multicarrier systems;output feedback;interference channels;respective receivers;memoryless Bernoulli random state;arbitrary joint distribution;probability;symmetric interference;capacity region;Gaussian noise;subset entropy inequality;wireless networks;Receivers;Interference channels;Output feedback;Encoding;Channel models;Niobium;Interference channel;bursty interference;feedback;multicarrier systems},\n month = {July},\n number = {7},\n pages = {4430-4452},\n tags = {journal,IT,ANIT,WNIF},\n title = {Harnessing Bursty Interference in Multicarrier Systems With Output Feedback},\n type = {2},\n volume = {63},\n year = {2017}\n}\n\n
\n
\n\n\n
\n We study parallel two-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated independent and identically distributed (i.i.d.) over time. For the linear deterministic setup with symmetric interference in each subcarrier, we give a complete characterization of the capacity region. For the analogous setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism, which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 5\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n A Salman Avestimehr; Suhas N Diggavi; Chao Tian; and David NC Tse.\n\n\n \n \n \n \n An approximation approach to network information theory.\n \n \n \n\n\n \n\n\n\n Foundations and Trends in Communications and Information Theory, 12(1-2): 1–183. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{avestimehr2015approximation,\n author = {Avestimehr, A Salman and Diggavi, Suhas N and Tian, Chao and Tse, David NC},\n journal = {Foundations and Trends in Communications and Information Theory},\n number = {1-2},\n pages = {1--183},\n publisher = {Now Publishers Inc. Hanover, MA, USA},\n tags = {monograph,ANIT},\n title = {An approximation approach to network information theory},\n type = {5},\n volume = {12},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n U. Niesen; and S.N. Diggavi.\n\n\n \n \n \n \n \n The Approximate Capacity of the Gaussian n-Relay Diamond Network.\n \n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 59(2): 845-859. Feb 2013.\n \n\n\n\n
\n\n\n\n \n \n \"The arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{6304926,\n abstract = {We consider the Gaussian “diamond” or parallel relay network, in which a source node transmits a message to a destination node with the help of N relays. Even for the symmetric setting, in which the channel gains to the relays are identical and the channel gains from the relays are identical, the capacity of this channel is unknown in general. The best known capacity approximation is up to an additive gap of order N bits and up to a multiplicative gap of order N2, with both gaps independent of the channel gains. In this paper, we approximate the capacity of the symmetric Gaussian N-relay diamond network up to an additive gap of 1.8 bits and up to a multiplicative gap of a factor 14. Both gaps are independent of the channel gains and, unlike the best previously known result, are also independent of the number of relays N in the network. Achievability is based on bursty amplify-and-forward, showing that this simple scheme is uniformly approximately optimal, both in the low-rate as well as in the high-rate regimes. The upper bound on capacity is based on a careful evaluation of the cut-set bound. We also present approximation results for the asymmetric Gaussian N-relay diamond network. In particular, we show that bursty amplify-and-forward combined with optimal relay selection achieves a rate within a factor O(log4(N)) of capacity with preconstant in the order notation independent of the channel gains.},\n author = {Niesen, U. and Diggavi, S.N.},\n doi = {10.1109/TIT.2012.2219154},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n month = {Feb},\n number = {2},\n pages = {845-859},\n tags = {journal,WiNet,IT,approxIT},\n title = {The Approximate Capacity of the Gaussian n-Relay Diamond Network},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1008.3813},\n volume = {59},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We consider the Gaussian “diamond” or parallel relay network, in which a source node transmits a message to a destination node with the help of N relays. Even for the symmetric setting, in which the channel gains to the relays are identical and the channel gains from the relays are identical, the capacity of this channel is unknown in general. The best known capacity approximation is up to an additive gap of order N bits and up to a multiplicative gap of order N2, with both gaps independent of the channel gains. In this paper, we approximate the capacity of the symmetric Gaussian N-relay diamond network up to an additive gap of 1.8 bits and up to a multiplicative gap of a factor 14. Both gaps are independent of the channel gains and, unlike the best previously known result, are also independent of the number of relays N in the network. Achievability is based on bursty amplify-and-forward, showing that this simple scheme is uniformly approximately optimal, both in the low-rate as well as in the high-rate regimes. The upper bound on capacity is based on a careful evaluation of the cut-set bound. We also present approximation results for the asymmetric Gaussian N-relay diamond network. In particular, we show that bursty amplify-and-forward combined with optimal relay selection achieves a rate within a factor O(log4(N)) of capacity with preconstant in the order notation independent of the channel gains.\n
\n\n\n
\n\n\n
\n \n\n \n \n A Ozgur; and S.N. Diggavi.\n\n\n \n \n \n \n Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes.\n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 59(12): 8275-8294. Dec 2013.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{6587830,\n abstract = {Recently, a new relaying strategy, quantize-map-and-forward (QMF) scheme, has been demonstrated to approximately achieve (within an additive constant number of bits) the Gaussian relay network capacity, universally, i.e., for arbitrary topologies, channel gains, and SNRs. This was established using Gaussian codebooks for transmission and random mappings at the relays. In this paper, we develop structured lattice codes that implement the QMF strategy. The main result of this paper is that such structured lattice codes can approximately achieve the Gaussian relay network capacity universally, again within an additive constant. In addition, we establish a similar result for half-duplex networks, where we demonstrate that one can approximately achieve the capacity using fixed transmit-receive (TX-RX) schedules for the relays with no transmit power optimization across the different TX-RX states of the network.},\n author = {Ozgur, A and Diggavi, S.N.},\n doi = {10.1109/TIT.2013.2280167},\n file = {:papers:lattice_qmf.pdf},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n month = {Dec},\n number = {12},\n pages = {8275-8294},\n tags = {journal,approxIT,WiNet,IT,WiNetInfFlow},\n title = {Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes},\n type = {2},\n volume = {59},\n year = {2013}\n}\n\n
\n
\n\n\n
\n Recently, a new relaying strategy, quantize-map-and-forward (QMF) scheme, has been demonstrated to approximately achieve (within an additive constant number of bits) the Gaussian relay network capacity, universally, i.e., for arbitrary topologies, channel gains, and SNRs. This was established using Gaussian codebooks for transmission and random mappings at the relays. In this paper, we develop structured lattice codes that implement the QMF strategy. The main result of this paper is that such structured lattice codes can approximately achieve the Gaussian relay network capacity universally, again within an additive constant. In addition, we establish a similar result for half-duplex networks, where we demonstrate that one can approximately achieve the capacity using fixed transmit-receive (TX-RX) schedules for the relays with no transmit power optimization across the different TX-RX states of the network.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n \n Wireless network information flow: a deterministic approach.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 57(4). April 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Wireless arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ADTj10,\n abstract = {This paper approximately resolves the information flow over wireless (Gaussian) relay networks to within a constant number of bits. It introduced the linear deterministic model and established a max-flow min-cut result for linear deterministic networks. The insights from the deterministic approach led to the approximate max-flow min-cut characterization for noisy Gaussian networks, through the introduction of a new relaying\nstrategy called {\\em quantize-map-forward} (QMF).},\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n file = {:papers:wirelessnetinfflow.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {adtj10},\n month = {April},\n note = {},\n number = {4},\n pages = {},\n tags = {journal,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Wireless network information flow: a deterministic approach},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0906.5394},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n
\n This paper approximately resolves the information flow over wireless (Gaussian) relay networks to within a constant number of bits. It introduced the linear deterministic model and established a max-flow min-cut result for linear deterministic networks. The insights from the deterministic approach led to the approximate max-flow min-cut characterization for noisy Gaussian networks, through the introduction of a new relaying strategy called \\em quantize-map-forward (QMF).\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n \n Approximate capacity region for a class of relay-interference networks.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 57(5): 2837-2864. May 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Approximate arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{MDFTj10,\n abstract = {In this paper we study  two-stage Gaussian \nrelay-interference networks where there are weak cross-links, causing the networks to behave like a chain\nof Z Gaussian channels. Our main result is an approximate characterization of the capacity region for  such networks. We propose a new interference management scheme, termed interference\nneutralization, which is implemented using structured lattice codes. This scheme allows for over-the-air\ninterference removal, without the transmitters having complete access the interfering signals.},\n author = {S. Mohajer and S N. Diggavi and C. Fragouli and D. Tse},\n file = {:papers:relayinterference_revised.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {mdft_js10},\n month = {May},\n note = {},\n number = {5},\n pages = {2837-2864},\n tags = {journal,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt,LatticeChan},\n title = {Approximate capacity region for a class of relay-interference networks},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1005.0404},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n
\n In this paper we study two-stage Gaussian relay-interference networks where there are weak cross-links, causing the networks to behave like a chain of Z Gaussian channels. Our main result is an approximate characterization of the capacity region for such networks. We propose a new interference management scheme, termed interference neutralization, which is implemented using structured lattice codes. This scheme allows for over-the-air interference removal, without the transmitters having complete access the interfering signals.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n U. Niesen; and S. Diggavi.\n\n\n \n \n \n \n The approximate capacity of the Gaussian N-relay diamond network.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on, pages 259-263, July 2011. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6034040,\n abstract = {We consider the Gaussian “diamond” or parallel relay network, in which a source node transmits a message to a destination node with the help of N relays. Even for the symmetric setting, in which the channel gains to the relays are identical and the channel gains from the relays are identical, the capacity of this channel is unknown in general. The best known capacity approximation is up to an additive gap of order N bits and up to a multiplicative gap of order N2, with both gaps independent of the channel gains. In this paper, we approximate the capacity of the symmetric Gaussian N-relay diamond network up to an additive gap of 1.8 bits and up to a multiplicative gap of a factor 14. Both gaps are independent of the channel gains, and, unlike the best previously known result, are also independent of the number of relays N in the network. Achievability is based on bursty amplify-and-forward, showing that this simple scheme is uniformly approximately optimal, both in the low-rate as well as high-rate regimes. The upper bound on capacity is based on a careful evaluation of the cut-set bound.},\n author = {Niesen, U. and Diggavi, S.},\n booktitle = {Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on},\n doi = {10.1109/ISIT.2011.6034040},\n file = {:papers:nrelay_diamond_isit.pdf},\n issn = {2157-8095},\n month = {July},\n pages = {259-263},\n tags = {conf,approxIT,IT,WiNet},\n title = {The approximate capacity of the Gaussian N-relay diamond network},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We consider the Gaussian “diamond” or parallel relay network, in which a source node transmits a message to a destination node with the help of N relays. Even for the symmetric setting, in which the channel gains to the relays are identical and the channel gains from the relays are identical, the capacity of this channel is unknown in general. The best known capacity approximation is up to an additive gap of order N bits and up to a multiplicative gap of order N2, with both gaps independent of the channel gains. In this paper, we approximate the capacity of the symmetric Gaussian N-relay diamond network up to an additive gap of 1.8 bits and up to a multiplicative gap of a factor 14. Both gaps are independent of the channel gains, and, unlike the best previously known result, are also independent of the number of relays N in the network. Achievability is based on bursty amplify-and-forward, showing that this simple scheme is uniformly approximately optimal, both in the low-rate as well as high-rate regimes. The upper bound on capacity is based on a careful evaluation of the cut-set bound.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Mohajer; C. Tian; and S.N. Diggavi.\n\n\n \n \n \n \n On source transmission over deterministic relay networks.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Cairo, January 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MTDp10,\n abstract = {Lossless transmission of a set of correlated sources\nover a deterministic relay network is considered for two traffic\nrequirements. In distributed multicast, the set of sources are\nto be delivered to a set of destinations. The source exchange\nrequires all the nodes with access to sources to be able to\nreconstruct all other sources observed at other nodes. We develop\nachievable regions and outer bounds for both these situations. For\nlinear deterministic networks, these bounds coincide, yielding a\ncharacterization.},\n author = {S. Mohajer and C. Tian and S.N. Diggavi},\n booktitle = {IEEE Information Theory Workshop (ITW) Cairo},\n file = {:papers:mtd_itw10_final.pdf},\n month = {January},\n note = {},\n pages = {},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,SrcChan,SrcChanSep,NDC,InfExch,SelConf},\n title = {On source transmission over deterministic relay networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n Lossless transmission of a set of correlated sources over a deterministic relay network is considered for two traffic requirements. In distributed multicast, the set of sources are to be delivered to a set of destinations. The source exchange requires all the nodes with access to sources to be able to reconstruct all other sources observed at other nodes. We develop achievable regions and outer bounds for both these situations. For linear deterministic networks, these bounds coincide, yielding a characterization.\n
\n\n\n
\n\n\n
\n \n\n \n \n A. Ozgur; and S N. Diggavi.\n\n\n \n \n \n \n \n Approximately achieving Gaussian relay network capacity with lattice codes.\n \n \n \n \n\n\n \n\n\n\n In Proc. of IEEE ISIT 2010, Austin, Texas, pages 669–673, June 2010. \n \n\n\n\n
\n\n\n\n \n \n \"Approximately arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ODp10,\n abstract = {An approximate max-flow min-cut result for arbitrary wireless relay\nnetwork was recently established using Gaussian codebooks for\ntransmission and random mappings at the relays. In this paper,\nwe show that the approximation result can be established\nby using lattices for transmission and quantization along with\nstructured mappings at the relays. This also extended the original scalar quantizer\nanalysis to vector quantizers and obtained a slightly better approximation constant.},\n author = {A. Ozgur and S N. Diggavi},\n booktitle = {Proc. of IEEE ISIT 2010, Austin, Texas},\n file = {:papers:od_isit10.pdf},\n month = {June},\n note = {},\n pages = {669--673},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,SelConf,LatticeChan},\n title = {Approximately achieving Gaussian relay network capacity with lattice codes},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1005.1284},\n year = {2010}\n}\n\n
\n
\n\n\n
\n An approximate max-flow min-cut result for arbitrary wireless relay network was recently established using Gaussian codebooks for transmission and random mappings at the relays. In this paper, we show that the approximation result can be established by using lattices for transmission and quantization along with structured mappings at the relays. This also extended the original scalar quantizer analysis to vector quantizers and obtained a slightly better approximation constant.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; J. Chen; S N. Diggavi; and S. Shamai.\n\n\n \n \n \n \n Optimality and approximate optimality of source-channel separation in networks.\n \n \n \n\n\n \n\n\n\n In Proc. of IEEE ISIT 2010, Austin, Texas, pages 495–499, June 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TCDSc10a,\n author = {C. Tian and  J. Chen and S N. Diggavi and S. Shamai},\n booktitle = {Proc. of IEEE ISIT 2010, Austin, Texas},\n month = {June},\n note = {},\n pages = {495--499},\n tags = {conf,SrcChan,ITapprox,NDC,IT},\n title = {Optimality and approximate optimality of source-channel \nseparation in networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; J. Chen; S N. Diggavi; and S. Shamai.\n\n\n \n \n \n \n On source-channel separation in networks.\n \n \n \n\n\n \n\n\n\n In International Conference on Signal Processing and Communications (SPCOM), pages 1–5, June 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TCDSc10b,\n abstract = {We consider the source-channel separation architecture\nfor lossy source coding in communication networks. It\nis shown that the separation approach is optimal when the\nmemoryless sources at source nodes are arbitrarily correlated,\neach of which is to be reconstructed at possibly multiple\ndestinations within certain distortions, and the channels in this\nnetwork are synchronized, orthogonal and memoryless (i.e., noisy\ngraphs).},\n author = {C. Tian and  J. Chen and S N. Diggavi and S. Shamai},\n booktitle = {International Conference on Signal Processing and Communications (SPCOM)},\n file = {:papers:tcdsspcom10.pdf},\n month = {June},\n note = {},\n pages = {1--5},\n tags = {conf,SrcChan,ITapprox,NDC,IT,SelConf},\n title = {On source-channel separation in networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n We consider the source-channel separation architecture for lossy source coding in communication networks. It is shown that the separation approach is optimal when the memoryless sources at source nodes are arbitrarily correlated, each of which is to be reconstructed at possibly multiple destinations within certain distortions, and the channels in this network are synchronized, orthogonal and memoryless (i.e., noisy graphs).\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Mohajer; S N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Capacity of Deterministic Z-Chain Relay-Interference Network.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), Volos, Greece, pages 331–335, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDFSj09,\n author = {S. Mohajer and S N. Diggavi and C. Fragouli and D. Tse},\n booktitle = {IEEE Information Theory Workshop (ITW), Volos, Greece},\n month = {June},\n note = {},\n pages = {331--335},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt},\n title = {Capacity of Deterministic Z-Chain Relay-Interference Network},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S N. Diggavi; and D. Tse.\n\n\n \n \n \n \n Approximate Capacity of a Class of Gaussian Relay-Interference Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, pages 31–35, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDTj09,\n author = {S. Mohajer and S N. Diggavi and D. Tse},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Seoul, Korea},\n month = {June},\n note = {},\n pages = {31--35},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt,LatticeChan},\n title = {Approximate Capacity of a Class of Gaussian Relay-Interference Networks},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and E. Telatar.\n\n\n \n \n \n \n On noise insertion strategies for wireless network secrecy.\n \n \n \n\n\n \n\n\n\n In Information Theory and Applications workshop (ITA), UCSD, San Diego, California, pages 77–84, February 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTc09d,\n abstract = {This paper studies the idea of noise insertion by authenticated relays through friendly jamming. We develop the secrecy rate achievable in arbitrary (deterministic) networks when there are relays actively helping secrecy.},\n author = {E. Perron and S N. Diggavi and E. Telatar,},\n booktitle = {Information Theory and Applications workshop (ITA), UCSD, San Diego, California},\n file = {:papers:pdtita09final.pdf},\n label = {pdtc09d},\n month = {February},\n note = {},\n pages = {77--84},\n tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,ITapprox,WiNet},\n title = {On noise insertion strategies for wireless network secrecy},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n This paper studies the idea of noise insertion by authenticated relays through friendly jamming. We develop the secrecy rate achievable in arbitrary (deterministic) networks when there are relays actively helping secrecy.\n
\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and E. Telatar.\n\n\n \n \n \n \n On the interference-multiple-access channel.\n \n \n \n\n\n \n\n\n\n In IEEE International Conference on Communications (ICC), Dresden, Germany, pages 31–35, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTj09c,\n abstract = {We introduce the interference-multiple-access channel,\nwhich is a discrete memoryless channel with two transmitters\nand two receivers, similar to the interference channel. One\nreceiver is required to decode the information encoded at one\ntransmitter, the other receiver is required to decode the messages\nfrom both transmitters. We provide an inner bound on the\ncapacity region of this channel, as well as an outer bound for a\nspecial class of such channels. For this class, we also quantify the\ngap between inner and outer bound and show that the bounds\nmatch for a semi-deterministic channel, providing a complete\ncharacterization. For the Gaussian case, we show that the gap is\nat most 1 bit, yielding an approximate characterization.},\n author = {E. Perron and S N. Diggavi and E. Telatar},\n booktitle = {IEEE International Conference on Communications (ICC), Dresden, Germany},\n file = {:papers:pdt_icc09.pdf},\n month = {June},\n note = {},\n pages = {31--35},\n tags = {conf,ITapprox,WiNet,IT,WiNetInfFlow,IntChan,SelConf},\n title = {On the interference-multiple-access channel},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n We introduce the interference-multiple-access channel, which is a discrete memoryless channel with two transmitters and two receivers, similar to the interference channel. One receiver is required to decode the information encoded at one transmitter, the other receiver is required to decode the messages from both transmitters. We provide an inner bound on the capacity region of this channel, as well as an outer bound for a special class of such channels. For this class, we also quantify the gap between inner and outer bound and show that the bounds match for a semi-deterministic channel, providing a complete characterization. For the Gaussian case, we show that the gap is at most 1 bit, yielding an approximate characterization.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Approximate characterization of capacity in Gaussian relay networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Crete, Greece, pages 56–61, August 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj08a,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse, },\n booktitle = {IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Crete, Greece},\n month = {August},\n note = {},\n pages = {56--61},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Approximate characterization of capacity in Gaussian relay networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Approximate Capacity of Gaussian Relay Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Toronto, Canada, pages 474–478, July 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj08b,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Toronto, Canada},\n month = {July},\n note = {},\n pages = {474--478},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Approximate Capacity of Gaussian Relay Networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Information flow over compound wireless relay networks.\n \n \n \n\n\n \n\n\n\n In IEEE Zurich Seminar on Communications (IZS), Zurich, Switzerland, pages 92, March 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj08c,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {IEEE Zurich Seminar on Communications (IZS), Zurich, Switzerland},\n month = {March},\n note = {},\n pages = {92},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Information flow over compound wireless relay networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Transmission techniques for relay-interference networks.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, pages 464–474, September 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDFTj08,\n author = {S. Mohajer and S N. Diggavi and C. Fragouli and D. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n month = {September},\n note = {},\n pages = {464--474},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt},\n title = {Transmission techniques for relay-interference networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n A deterministic model for wireless relay networks and its capacity.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Bergen, Norway, pages 6–11, July 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj07,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {IEEE Information Theory Workshop (ITW) Bergen, Norway},\n month = {July},\n note = {},\n pages = {6--11},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {A deterministic model for wireless relay networks and its capacity},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Wireless network information flow.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, September 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj07a,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n label = {adt_allerton07a},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Wireless network information flow},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n A Deterministic Approach to Wireless Relay Networks.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, Sept 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj07b,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n label = {adt_allerton07b},\n month = {Sept},\n note = {},\n pages = {},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {A Deterministic Approach to Wireless Relay Networks},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);