\n \n \n
\n
\n\n \n \n S. Mohajer; S N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Capacity of Deterministic Z-Chain Relay-Interference Network.\n \n \n \n\n\n \n\n\n\n In
IEEE Information Theory Workshop (ITW), Volos, Greece, pages 331–335, June 2009. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MDFSj09,\n author = {S. Mohajer and S N. Diggavi and C. Fragouli and D. Tse},\n booktitle = {IEEE Information Theory Workshop (ITW), Volos, Greece},\n month = {June},\n note = {},\n pages = {331--335},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt},\n title = {Capacity of Deterministic Z-Chain Relay-Interference Network},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n S. Mohajer; and S N. Diggavi.\n\n\n \n \n \n \n Deterministic approach to wireless network error correction.\n \n \n \n\n\n \n\n\n\n In
IEEE Information Theory Workshop (ITW), Volos, Greece, pages 5–9, June 2009. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MDj09,\n author = {S. Mohajer and S N. Diggavi},\n booktitle = {IEEE Information Theory Workshop (ITW), Volos, Greece},\n month = {June},\n note = {},\n pages = {5--9},\n tags = {conf,DetApprox,WiNet,IT,WiNetInfFlow,WiNetErrCorr,Byzantine},\n title = {Deterministic approach to wireless network error correction},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n S. Mohajer; S N. Diggavi; and D. Tse.\n\n\n \n \n \n \n Approximate Capacity of a Class of Gaussian Relay-Interference Networks.\n \n \n \n\n\n \n\n\n\n In
IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, pages 31–35, June 2009. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MDTj09,\n author = {S. Mohajer and S N. Diggavi and D. Tse},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Seoul, Korea},\n month = {June},\n note = {},\n pages = {31--35},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt,LatticeChan},\n title = {Approximate Capacity of a Class of Gaussian Relay-Interference Networks},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n E. Perron; S N. Diggavi; and E. Telatar.\n\n\n \n \n \n \n On noise insertion strategies for wireless network secrecy.\n \n \n \n\n\n \n\n\n\n In
Information Theory and Applications workshop (ITA), UCSD, San Diego, California, pages 77–84, February 2009. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{PDTc09d,\n abstract = {This paper studies the idea of noise insertion by authenticated relays through friendly jamming. We develop the secrecy rate achievable in arbitrary (deterministic) networks when there are relays actively helping secrecy.},\n author = {E. Perron and S N. Diggavi and E. Telatar,},\n booktitle = {Information Theory and Applications workshop (ITA), UCSD, San Diego, California},\n file = {:papers:pdtita09final.pdf},\n label = {pdtc09d},\n month = {February},\n note = {},\n pages = {77--84},\n tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,ITapprox,WiNet},\n title = {On noise insertion strategies for wireless network secrecy},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n This paper studies the idea of noise insertion by authenticated relays through friendly jamming. We develop the secrecy rate achievable in arbitrary (deterministic) networks when there are relays actively helping secrecy.\n
\n\n\n
\n\n\n
\n
\n\n \n \n E. Perron; S N. Diggavi; and E. Telatar.\n\n\n \n \n \n \n On the interference-multiple-access channel.\n \n \n \n\n\n \n\n\n\n In
IEEE International Conference on Communications (ICC), Dresden, Germany, pages 31–35, June 2009. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{PDTj09c,\n abstract = {We introduce the interference-multiple-access channel,\nwhich is a discrete memoryless channel with two transmitters\nand two receivers, similar to the interference channel. One\nreceiver is required to decode the information encoded at one\ntransmitter, the other receiver is required to decode the messages\nfrom both transmitters. We provide an inner bound on the\ncapacity region of this channel, as well as an outer bound for a\nspecial class of such channels. For this class, we also quantify the\ngap between inner and outer bound and show that the bounds\nmatch for a semi-deterministic channel, providing a complete\ncharacterization. For the Gaussian case, we show that the gap is\nat most 1 bit, yielding an approximate characterization.},\n author = {E. Perron and S N. Diggavi and E. Telatar},\n booktitle = {IEEE International Conference on Communications (ICC), Dresden, Germany},\n file = {:papers:pdt_icc09.pdf},\n month = {June},\n note = {},\n pages = {31--35},\n tags = {conf,ITapprox,WiNet,IT,WiNetInfFlow,IntChan,SelConf},\n title = {On the interference-multiple-access channel},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n We introduce the interference-multiple-access channel, which is a discrete memoryless channel with two transmitters and two receivers, similar to the interference channel. One receiver is required to decode the information encoded at one transmitter, the other receiver is required to decode the messages from both transmitters. We provide an inner bound on the capacity region of this channel, as well as an outer bound for a special class of such channels. For this class, we also quantify the gap between inner and outer bound and show that the bounds match for a semi-deterministic channel, providing a complete characterization. For the Gaussian case, we show that the gap is at most 1 bit, yielding an approximate characterization.\n
\n\n\n
\n\n\n
\n
\n\n \n \n E. Perron; S N. Diggavi; and I E. Telatar.\n\n\n \n \n \n \n On cooperative wireless network secrecy.\n \n \n \n\n\n \n\n\n\n In
IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{PDTp09,\n abstract = {In this paper we consider\nsecret communication between two special nodes (“source” and\n“destination”) in a wireless network with authenticated relays:\nthe message communicated to the destination is to be kept\ninformation-theoretically (unconditionally) secret from any eavesdropper\nwithin a class. Since the transmissions are broadcast and\ninterfere with each other, complex signal interactions occur. We\ndevelop cooperative schemes which utilize these interactions in\nwireless communication over networks with arbitrary topology,\nand give provable unconditional secrecy guarantees.},\n author = {E. Perron and S N. Diggavi and I E. Telatar},\n booktitle = {IEEE INFOCOM 2009, Rio de Janeiro, Brazil},\n file = {:papers:pdtwireless_net_secrecy08.pdf},\n label = {pdt_c09a},\n month = {April},\n note = {},\n pages = {},\n tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,WiNet,SelConf},\n title = {On cooperative wireless network secrecy},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n In this paper we consider secret communication between two special nodes (“source” and “destination”) in a wireless network with authenticated relays: the message communicated to the destination is to be kept information-theoretically (unconditionally) secret from any eavesdropper within a class. Since the transmissions are broadcast and interfere with each other, complex signal interactions occur. We develop cooperative schemes which utilize these interactions in wireless communication over networks with arbitrary topology, and give provable unconditional secrecy guarantees.\n
\n\n\n
\n\n\n
\n
\n\n \n \n S. Saeedi; S N. Diggavi; C. Fragouli; and V. Prabhakaran.\n\n\n \n \n \n \n On degraded two message set broadcasting.\n \n \n \n\n\n \n\n\n\n In
IEEE Information Theory Workshop (ITW) Taormina, Italy, pages 406–410, October 2009. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{SDFPp09,\n abstract = {Abstract—We consider the two message set problem, where a\nsource broadcasts a common message W1 to an arbitrary set of\nreceivers U and a private message W2 to a subset of the receivers\nP !U . Transmissions occur over linear deterministic channels.\nFor the case where at most two receivers do not require the\nprivate message, we give an exact characterization of the capacity\nregion, where achievability is through linear coding.},\n author = {S. Saeedi and S N. Diggavi and C. Fragouli and V. Prabhakaran},\n booktitle = {IEEE Information Theory Workshop (ITW) Taormina, Italy},\n file = {:papers:sdfpitw09.pdf},\n month = {October},\n note = {},\n pages = {406--410},\n tags = {conf,DetApprox,IT,DegMsgSet,OppComm,SelConf},\n title = {On degraded two message set broadcasting},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n Abstract—We consider the two message set problem, where a source broadcasts a common message W1 to an arbitrary set of receivers U and a private message W2 to a subset of the receivers P !U . Transmissions occur over linear deterministic channels. For the case where at most two receivers do not require the private message, we give an exact characterization of the capacity region, where achievability is through linear coding.\n
\n\n\n
\n\n\n\n\n\n