var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fresearch.seas.ucla.edu%2Flicos%2Ffiles%2F2023%2F02%2Fpublicactions_v1.bib&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&filter=tags:(WNIF|DetApprox|WiNetInfFlow)&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fresearch.seas.ucla.edu%2Flicos%2Ffiles%2F2023%2F02%2Fpublicactions_v1.bib&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&filter=tags:(WNIF|DetApprox|WiNetInfFlow)&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fresearch.seas.ucla.edu%2Flicos%2Ffiles%2F2023%2F02%2Fpublicactions_v1.bib&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&filter=tags:(WNIF|DetApprox|WiNetInfFlow)&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2020\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Sebastian; and S. N. Diggavi.\n\n\n \n \n \n \n Generalized Degrees Freedom of Noncoherent MIMO Channels With Asymmetric Link Strengths.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 66(7): 4431-4448. July 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{9023963,\n abstract = {We study the generalized degrees of freedom (gDoF) of block-fading noncoherent multiple input multiple output (MIMO) channels with asymmetric distributions of link strengths and a coherence time of T symbol durations. We derive the optimal signaling structure for communication for the asymmetric MIMO channel, which is distinct from that for the MIMO channel with independent and identically distributed (i.i.d.) links. We extend the existing results for the single input multiple output (SIMO) channel with i.i.d. links to the asymmetric case, proving that selecting the statistically best antenna is gDoFoptimal. Using the gDoF result for the SIMO channel, we prove that for T = 1, the gDoF is zero for MIMO channels with arbitrary link strengths. We show that selecting the statistically best antenna is gDoF-optimal for the multiple input single output (MISO) channel. We also derive the gDoF for the 2 x 2 MIMO channel with different exponents in the direct and cross links. In this setting, we show that it is always necessary to use both the antennas to achieve the gDoF, in contrast to the results for the 2 x 2 MIMO channel with i.i.d. links. We show that having weaker crosslinks, gives gDoF gain compared to the case with i.i.d. links. For the noncoherent MIMO channel with i.i.d. links, the traditional method of training each transmit antenna independently is degrees of freedom (DoF) optimal, whereas we observe that for the asymmetric 2 x 2 MIMO channel, the traditional training is not gDoF-optimal. We extend this observation to a larger MxM MIMO channel by demonstrating a strategy that can achieve larger gDoF than a traditional trainingbased method.},\n author = {J. {Sebastian} and S. N. {Diggavi}},\n doi = {10.1109/TIT.2020.2978183},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {MIMO communication;MISO communication;SIMO communication;transmitting antennas;generalized degrees freedom;noncoherent MIMO channel;asymmetric link strengths;block-fading noncoherent multiple input multiple output channels;asymmetric distributions;optimal signaling structure;asymmetric MIMO channel;single input multiple output channel;asymmetric case;SIMO channel;arbitrary link strengths;multiple input single output channel;direct links;cross links;gDoF gain;degrees of freedom optimal;MxM MIMO channel;MIMO communication;Signal to noise ratio;Fading channels;Transmitting antennas;Coherence;MISO communication;Degrees of freedom (DoF);multiple antennas;time-varying channels;noncoherent communication},\n month = {July},\n number = {7},\n pages = {4431-4448},\n tags = {journal,IT,ANIT,WiNetnew,NCWN,WNIF},\n title = {Generalized Degrees Freedom of Noncoherent MIMO Channels With Asymmetric Link Strengths},\n type = {2},\n volume = {66},\n year = {2020}\n}\n\n
\n
\n\n\n
\n We study the generalized degrees of freedom (gDoF) of block-fading noncoherent multiple input multiple output (MIMO) channels with asymmetric distributions of link strengths and a coherence time of T symbol durations. We derive the optimal signaling structure for communication for the asymmetric MIMO channel, which is distinct from that for the MIMO channel with independent and identically distributed (i.i.d.) links. We extend the existing results for the single input multiple output (SIMO) channel with i.i.d. links to the asymmetric case, proving that selecting the statistically best antenna is gDoFoptimal. Using the gDoF result for the SIMO channel, we prove that for T = 1, the gDoF is zero for MIMO channels with arbitrary link strengths. We show that selecting the statistically best antenna is gDoF-optimal for the multiple input single output (MISO) channel. We also derive the gDoF for the 2 x 2 MIMO channel with different exponents in the direct and cross links. In this setting, we show that it is always necessary to use both the antennas to achieve the gDoF, in contrast to the results for the 2 x 2 MIMO channel with i.i.d. links. We show that having weaker crosslinks, gives gDoF gain compared to the case with i.i.d. links. For the noncoherent MIMO channel with i.i.d. links, the traditional method of training each transmit antenna independently is degrees of freedom (DoF) optimal, whereas we observe that for the asymmetric 2 x 2 MIMO channel, the traditional training is not gDoF-optimal. We extend this observation to a larger MxM MIMO channel by demonstrating a strategy that can achieve larger gDoF than a traditional trainingbased method.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Sebastian; and S. Diggavi.\n\n\n \n \n \n \n \n Generalized Degrees of Freedom of Noncoherent Diamond Networks.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 66(8): 5228-5260. Aug 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Generalized arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{9046857,\n abstract = {We study the generalized degrees of freedom (gDoF) of the noncoherent diamond (parallel relay) wireless network with asymmetric distributions of link strengths. We use the noncoherent block-fading model introduced by Marzetta and Hochwald, where no channel state information is available at the transmitters or at the receivers and the channels remain constant for a coherence time of T symbol durations. We first derive an upper bound for the capacity of this channel and then derive the optimal structure for the solution of the upper bound optimization problem. Using the optimal structure, we solve the upper bound optimization problem in terms of its gDoF. Using insights from our upper bound signaling solution, we devise an achievability strategy based on a novel scheme that we call train-scale quantize-map-forward (TS-QMF). This scheme uses training in the links from the source to the relays, scaling and quantizing at the relays combined with nontraining-based schemes. We show the optimality of this scheme by comparing it to the upper bound in terms of the gDoF. In noncoherent point-to-point multiple-input-multiple-output (MIMO) channels, where the fading realization is unknown to the transmitter and the receiver, an important tradeoff between communication and channel learning was revealed by Zheng and Tse, by demonstrating that not all the available antennas might be used, as it is suboptimal to learn all their channel parameters. Our results in this paper for the diamond network demonstrate that in certain regimes of relative channel strengths, the gDoF-optimal scheme uses a subnetwork, demonstrating a similar tradeoff between channel learning and communication. In some regimes, it is gDoF-optimal to do relay selection, i.e., use a part of the network. In the other regimes, even when it is essential to use the entire network, it is suboptimal to learn the channel states for all the links in the network, i.e., traditional training-based schemes are suboptimal in these regimes.},\n author = {J. {Sebastian} and S. {Diggavi}},\n doi = {10.1109/TIT.2020.2983169},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {channel capacity;fading channels;learning (artificial intelligence);MIMO communication;optimisation;quantisation (signal);radio receivers;radio transmitters;relay networks (telecommunication);telecommunication computing;noncoherent point-to-point MIMO channel;noncoherent point-to-point multiple-input-multiple-output channel;TS-QMF;bound signaling solution;bound optimization problem;channel capacity;Hochwald;Marzetta;block-fading model;asymmetric distribution;noncoherent diamond wireless network;generalized degrees of freedom;noncoherent diamond network;gDoF-optimal scheme;train-scale quantize-map-forward;channel state information;Signal to noise ratio;Relays;Diamond;MIMO communication;Upper bound;Fading channels;Wireless networks;Noncoherent communication;degrees of freedom (DoF);relay channels;diamond network;time-varying channels},\n month = {Aug},\n number = {8},\n pages = {5228-5260},\n tags = {journal,IT,ANIT,WiNetnew,NCWN,WNIF},\n title = {Generalized Degrees of Freedom of Noncoherent Diamond Networks},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1802.02667},\n volume = {66},\n year = {2020}\n}\n\n
\n
\n\n\n
\n We study the generalized degrees of freedom (gDoF) of the noncoherent diamond (parallel relay) wireless network with asymmetric distributions of link strengths. We use the noncoherent block-fading model introduced by Marzetta and Hochwald, where no channel state information is available at the transmitters or at the receivers and the channels remain constant for a coherence time of T symbol durations. We first derive an upper bound for the capacity of this channel and then derive the optimal structure for the solution of the upper bound optimization problem. Using the optimal structure, we solve the upper bound optimization problem in terms of its gDoF. Using insights from our upper bound signaling solution, we devise an achievability strategy based on a novel scheme that we call train-scale quantize-map-forward (TS-QMF). This scheme uses training in the links from the source to the relays, scaling and quantizing at the relays combined with nontraining-based schemes. We show the optimality of this scheme by comparing it to the upper bound in terms of the gDoF. In noncoherent point-to-point multiple-input-multiple-output (MIMO) channels, where the fading realization is unknown to the transmitter and the receiver, an important tradeoff between communication and channel learning was revealed by Zheng and Tse, by demonstrating that not all the available antennas might be used, as it is suboptimal to learn all their channel parameters. Our results in this paper for the diamond network demonstrate that in certain regimes of relative channel strengths, the gDoF-optimal scheme uses a subnetwork, demonstrating a similar tradeoff between channel learning and communication. In some regimes, it is gDoF-optimal to do relay selection, i.e., use a part of the network. In the other regimes, even when it is essential to use the entire network, it is suboptimal to learn the channel states for all the links in the network, i.e., traditional training-based schemes are suboptimal in these regimes.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Sebastian; C. Karakus; and S. Diggavi.\n\n\n \n \n \n \n \n Approximate Capacity of Fast Fading Interference Channels With no Instantaneous CSIT.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Communications, 66(12): 6015-6027. Dec 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Approximate arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{8429509,\n abstract = {We develop a characterization of fading models, which assigns a number called logarithmic Jensen's gap to a given fading model. We show that as a consequence of a finite logarithmic Jensen's gap, an approximate capacity region can be obtained for fast fading interference channels (FF-ICs) for several scenarios. We illustrate three instances where a constant capacity gap can be obtained as a function of the logarithmic Jensen's gap. First, for an FF-IC with neither feedback nor instantaneous channel state information at transmitter (CSIT), if the fading distribution has finite logarithmic Jensen's gap, we show that a rate-splitting scheme based on the average interference-to-noise ratio can achieve its approximate capacity. Second, we show that a similar scheme can achieve the approximate capacity of FF-IC with feedback and delayed CSIT, if the fading distribution has finite logarithmic Jensen's gap. Third, when this condition holds, we show that point-to-point codes can achieve approximate capacity for a class of FF-ICs with feedback. We prove that the logarithmic Jensen's gap is finite for common fading models, including Rayleigh and Nakagami fading, thereby obtaining the approximate capacity region of FF-IC with these fading models.},\n author = {J. {Sebastian} and C. {Karakus} and S. {Diggavi}},\n doi = {10.1109/TCOMM.2018.2864266},\n issn = {1558-0857},\n journal = {IEEE Transactions on Communications},\n keywords = {approximation theory;channel capacity;diversity reception;fading channels;Gaussian channels;MIMO communication;Nakagami channels;radio transmitters;radiofrequency interference;Rayleigh channels;fast fading interference channels;finite logarithmic Jensen's gap;approximate capacity region;FF-IC;constant capacity gap;instantaneous channel state information;fading distribution;common fading models;Rayleigh channels;Receivers;Transmitters;Integrated circuit modeling;Interference;Interference channels;fast fading;capacity region;rate-splitting},\n month = {Dec},\n number = {12},\n pages = {6015-6027},\n tags = {journal,ANIT,WiNetnew,NCWN,WNIF},\n title = {Approximate Capacity of Fast Fading Interference Channels With no Instantaneous CSIT},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1706.03659},\n volume = {66},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We develop a characterization of fading models, which assigns a number called logarithmic Jensen's gap to a given fading model. We show that as a consequence of a finite logarithmic Jensen's gap, an approximate capacity region can be obtained for fast fading interference channels (FF-ICs) for several scenarios. We illustrate three instances where a constant capacity gap can be obtained as a function of the logarithmic Jensen's gap. First, for an FF-IC with neither feedback nor instantaneous channel state information at transmitter (CSIT), if the fading distribution has finite logarithmic Jensen's gap, we show that a rate-splitting scheme based on the average interference-to-noise ratio can achieve its approximate capacity. Second, we show that a similar scheme can achieve the approximate capacity of FF-IC with feedback and delayed CSIT, if the fading distribution has finite logarithmic Jensen's gap. Third, when this condition holds, we show that point-to-point codes can achieve approximate capacity for a class of FF-ICs with feedback. We prove that the logarithmic Jensen's gap is finite for common fading models, including Rayleigh and Nakagami fading, thereby obtaining the approximate capacity region of FF-IC with these fading models.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Mishra; I. Wang; and S. N. Diggavi.\n\n\n \n \n \n \n Harnessing Bursty Interference in Multicarrier Systems With Output Feedback.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 63(7): 4430-4452. July 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{7911284,\n abstract = {We study parallel two-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated independent and identically distributed (i.i.d.) over time. For the linear deterministic setup with symmetric interference in each subcarrier, we give a complete characterization of the capacity region. For the analogous setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism, which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali.},\n author = {S. {Mishra} and I. {Wang} and S. N. {Diggavi}},\n doi = {10.1109/TIT.2017.2697866},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {Gaussian noise;probability;radio networks;radiofrequency interference;harnessing bursty interference;multicarrier systems;output feedback;interference channels;respective receivers;memoryless Bernoulli random state;arbitrary joint distribution;probability;symmetric interference;capacity region;Gaussian noise;subset entropy inequality;wireless networks;Receivers;Interference channels;Output feedback;Encoding;Channel models;Niobium;Interference channel;bursty interference;feedback;multicarrier systems},\n month = {July},\n number = {7},\n pages = {4430-4452},\n tags = {journal,IT,ANIT,WNIF},\n title = {Harnessing Bursty Interference in Multicarrier Systems With Output Feedback},\n type = {2},\n volume = {63},\n year = {2017}\n}\n\n
\n
\n\n\n
\n We study parallel two-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated independent and identically distributed (i.i.d.) over time. For the linear deterministic setup with symmetric interference in each subcarrier, we give a complete characterization of the capacity region. For the analogous setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism, which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n Can Karakus; I-Hsiang Wang; and Suhas N. Diggavi.\n\n\n \n \n \n \n \n Gaussian Interference Channel With Intermittent Feedback.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 61(9): 4663–4699. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"Gaussian arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tit/KarakusWD15,\n abstract = {We investigate how to exploit intermittent feedback for interference management by studying the two-user Gaussian interference channel (IC). We approximately characterize (within a universal constant) the capacity region for the Gaussian IC with intermittent feedback. We exactly characterize the the capacity region of the linear deterministic version of the problem, which gives us insight into the Gaussian problem. We find that the characterization only depends on the forward channel parameters and the marginal probability distribution of each feedback link. The result shows that passive and unreliable feedback can be harnessed to provide multiplicative capacity gain in Gaussian interference channels. We find that when the feedback links are active with sufficiently large probabilities, the perfect feedback sum-capacity is achieved to within a constant gap. In contrast to other schemes developed for interference channel with feedback, our achievable scheme makes use of quantize-map-and-forward to relay the information obtained through feedback, performs forward decoding, and does not use structured codes. We also develop new outer bounds enabling us to obtain the (approximate) characterization of the capacity region.},\n author = {Can Karakus and\nI-Hsiang Wang and\nSuhas N. Diggavi},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/journals/tit/KarakusWD15},\n doi = {10.1109/TIT.2015.2452915},\n file = {:papers:kwd_it15.pdf},\n journal = {IEEE Transactions on Information Theory},\n number = {9},\n pages = {4663--4699},\n tags = {journal,WiIntMgmt,IT,WiNet,WNIF},\n timestamp = {Thu, 20 Aug 2015 14:54:38 +0200},\n title = {Gaussian Interference Channel With Intermittent Feedback},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1408.4590},\n volume = {61},\n year = {2015}\n}\n\n
\n
\n\n\n
\n We investigate how to exploit intermittent feedback for interference management by studying the two-user Gaussian interference channel (IC). We approximately characterize (within a universal constant) the capacity region for the Gaussian IC with intermittent feedback. We exactly characterize the the capacity region of the linear deterministic version of the problem, which gives us insight into the Gaussian problem. We find that the characterization only depends on the forward channel parameters and the marginal probability distribution of each feedback link. The result shows that passive and unreliable feedback can be harnessed to provide multiplicative capacity gain in Gaussian interference channels. We find that when the feedback links are active with sufficiently large probabilities, the perfect feedback sum-capacity is achieved to within a constant gap. In contrast to other schemes developed for interference channel with feedback, our achievable scheme makes use of quantize-map-and-forward to relay the information obtained through feedback, performs forward decoding, and does not use structured codes. We also develop new outer bounds enabling us to obtain the (approximate) characterization of the capacity region.\n
\n\n\n
\n\n\n
\n \n\n \n \n Ritesh Kolte; Ayfer Özgür; and Suhas Diggavi.\n\n\n \n \n \n \n When are dynamic relaying strategies necessary in half-duplex wireless networks?.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 61(4): 1720–1738. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kolte2015dynamic,\n author = {Kolte, Ritesh and {\\"O}zg{\\"u}r, Ayfer and Diggavi, Suhas},\n journal = {IEEE Transactions on Information Theory},\n number = {4},\n pages = {1720--1738},\n publisher = {IEEE},\n tags = {journal,WiNet,WNIF},\n title = {When are dynamic relaying strategies necessary in half-duplex wireless networks?},\n type = {2},\n volume = {61},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Brahma; M. Duarte; A Sengupta; I-Hsiang Wang; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying.\n \n \n \n\n\n \n\n\n\n In INFOCOM, 2014 Proceedings IEEE, pages 2508-2516, April 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6848197,\n abstract = {Physical layer cooperation of a source with a relay can significantly boost the performance of a wireless connection. However, the best practical relaying scheme can vary depending on the relative strengths of the channels that connect the source, relay and destination. This paper proposes and evaluates QUILT, a system for physical-layer relaying that seamlessly adapts to the underlying network configuration to achieve competitive or better performance as compared to the best current approaches. QUILT combines on-demand, opportunistic use of Decode-Forward (DF) or Quantize-Map-Forward (QMF) followed by interleaving at the relay, with hybrid decoding at the destination that extracts information from received frames even if these are not decodable. We theoretically quantify how our design choices for QUILT affect the system performance. We also deploy QUILT on the WarpLab software radio platform, and show through over-the-air experiments up to 5 times FER improvement over the next best cooperative protocol.},\n author = {Brahma, S. and Duarte, M. and Sengupta, A and I-Hsiang Wang and Fragouli, C. and Diggavi, S.},\n booktitle = {INFOCOM, 2014 Proceedings IEEE},\n doi = {10.1109/INFOCOM.2014.6848197},\n file = {:papers:quilt.pdf},\n month = {April},\n pages = {2508-2516},\n tags = {conf,WiNet,WiNetInfFlow},\n title = {QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying},\n type = {4},\n year = {2014}\n}\n\n
\n
\n\n\n
\n Physical layer cooperation of a source with a relay can significantly boost the performance of a wireless connection. However, the best practical relaying scheme can vary depending on the relative strengths of the channels that connect the source, relay and destination. This paper proposes and evaluates QUILT, a system for physical-layer relaying that seamlessly adapts to the underlying network configuration to achieve competitive or better performance as compared to the best current approaches. QUILT combines on-demand, opportunistic use of Decode-Forward (DF) or Quantize-Map-Forward (QMF) followed by interleaving at the relay, with hybrid decoding at the destination that extracts information from received frames even if these are not decodable. We theoretically quantify how our design choices for QUILT affect the system performance. We also deploy QUILT on the WarpLab software radio platform, and show through over-the-air experiments up to 5 times FER improvement over the next best cooperative protocol.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mishra; I-Hsiang Wang; and S. Diggavi.\n\n\n \n \n \n \n \n Harnessing bursty interference in multicarrier systems with feedback.\n \n \n \n \n\n\n \n\n\n\n In Information Theory (ISIT), 2014 IEEE International Symposium on, pages 671-675, June 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Harnessing arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6874917,\n abstract = {We study parallel symmetric 2-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated i.i.d. over time. For the linear deterministic setup, we give a complete characterization of the capacity region. For the setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali [4].},\n author = {Mishra, S. and I-Hsiang Wang and Diggavi, S.},\n booktitle = {Information Theory (ISIT), 2014 IEEE International Symposium on},\n doi = {10.1109/ISIT.2014.6874917},\n month = {June},\n pages = {671-675},\n tags = {conf,WiIntMgmt,IT,WNIF},\n title = {Harnessing bursty interference in multicarrier systems with feedback},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1404.6044},\n year = {2014}\n}\n\n
\n
\n\n\n
\n We study parallel symmetric 2-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated i.i.d. over time. For the linear deterministic setup, we give a complete characterization of the capacity region. For the setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali [4].\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Chen; A. Ozgur; and S.N. Diggavi.\n\n\n \n \n \n \n Feedback through overhearing.\n \n \n \n\n\n \n\n\n\n In Annual Allerton Conference on Communication, Control, and Computing (Allerton), Sep 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{chenozgur14,\n abstract = {In this paper we examine the value of feedback that comes from overhearing, without dedicated feedback resources. We focus on a simple model for this purpose: a deterministic two-hop interference channel, where feedback comes from overhearing the forward-links. A new aspect brought by this setup is the dual-role of the relay signal. While the relay signal needs to convey the source message to its corresponding destination, it can also provide a feedback signal which can potentially increase the capacity of the first hop. We derive inner and outer bounds on the sum capacity which match for a large range of the parameter values. Our results identify the parameter ranges where overhearing can provide non-negative capacity gain and can even achieve the performance with dedicated-feedback resources. The results also provide insights into which transmissions are most useful to overhear.},\n author = {Chen, J. and Ozgur, A. and Diggavi, S.N.},\n booktitle = {Annual Allerton Conference on Communication, Control, and Computing (Allerton)},\n file = {:papers:fto_cod.pdf},\n month = {Sep},\n tags = {conf,IT,WiNet,WiNetInfFlow},\n title = {Feedback through overhearing},\n type = {4},\n year = {2014}\n}\n\n
\n
\n\n\n
\n In this paper we examine the value of feedback that comes from overhearing, without dedicated feedback resources. We focus on a simple model for this purpose: a deterministic two-hop interference channel, where feedback comes from overhearing the forward-links. A new aspect brought by this setup is the dual-role of the relay signal. While the relay signal needs to convey the source message to its corresponding destination, it can also provide a feedback signal which can potentially increase the capacity of the first hop. We derive inner and outer bounds on the sum capacity which match for a large range of the parameter values. Our results identify the parameter ranges where overhearing can provide non-negative capacity gain and can even achieve the performance with dedicated-feedback resources. The results also provide insights into which transmissions are most useful to overhear.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n A Ozgur; and S.N. Diggavi.\n\n\n \n \n \n \n Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes.\n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 59(12): 8275-8294. Dec 2013.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{6587830,\n abstract = {Recently, a new relaying strategy, quantize-map-and-forward (QMF) scheme, has been demonstrated to approximately achieve (within an additive constant number of bits) the Gaussian relay network capacity, universally, i.e., for arbitrary topologies, channel gains, and SNRs. This was established using Gaussian codebooks for transmission and random mappings at the relays. In this paper, we develop structured lattice codes that implement the QMF strategy. The main result of this paper is that such structured lattice codes can approximately achieve the Gaussian relay network capacity universally, again within an additive constant. In addition, we establish a similar result for half-duplex networks, where we demonstrate that one can approximately achieve the capacity using fixed transmit-receive (TX-RX) schedules for the relays with no transmit power optimization across the different TX-RX states of the network.},\n author = {Ozgur, A and Diggavi, S.N.},\n doi = {10.1109/TIT.2013.2280167},\n file = {:papers:lattice_qmf.pdf},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n month = {Dec},\n number = {12},\n pages = {8275-8294},\n tags = {journal,approxIT,WiNet,IT,WiNetInfFlow},\n title = {Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes},\n type = {2},\n volume = {59},\n year = {2013}\n}\n\n
\n
\n\n\n
\n Recently, a new relaying strategy, quantize-map-and-forward (QMF) scheme, has been demonstrated to approximately achieve (within an additive constant number of bits) the Gaussian relay network capacity, universally, i.e., for arbitrary topologies, channel gains, and SNRs. This was established using Gaussian codebooks for transmission and random mappings at the relays. In this paper, we develop structured lattice codes that implement the QMF strategy. The main result of this paper is that such structured lattice codes can approximately achieve the Gaussian relay network capacity universally, again within an additive constant. In addition, we establish a similar result for half-duplex networks, where we demonstrate that one can approximately achieve the capacity using fixed transmit-receive (TX-RX) schedules for the relays with no transmit power optimization across the different TX-RX states of the network.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n C. Karakus; I-Hsiang Wang; and S. Diggavi.\n\n\n \n \n \n \n An achievable rate region for Gaussian interference channel with intermittent feedback.\n \n \n \n\n\n \n\n\n\n In Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference on, pages 203-210, Oct 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6736525,\n abstract = {We consider the two-user Gaussian interference channel with intermittent channel output feedback. We derive an achievable rate region that corresponds to the capacity region of the linear deterministic version of the problem. The result shows that passive and unreliable feedback can be harnessed to provide multiplicative capacity gain in Gaussian interference channels. In contrast to other schemes developed for interference channel with feedback, our achievable scheme makes use of quantize-map-and-forward to relay the information obtained through feedback, performs forward decoding, and does not use structured codes. We find that when the feedback links are active with sufficiently large probabilities, the perfect feedback sum-capacity is achieved to within a constant gap.},\n author = {Karakus, C. and I-Hsiang Wang and Diggavi, S.},\n booktitle = {Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference on},\n doi = {10.1109/Allerton.2013.6736525},\n file = {:papers:ach_gicifb.pdf},\n month = {Oct},\n pages = {203-210},\n tags = {conf,WiIntMgmt,IT,WiNet,WNIF},\n title = {An achievable rate region for Gaussian interference channel with intermittent feedback},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We consider the two-user Gaussian interference channel with intermittent channel output feedback. We derive an achievable rate region that corresponds to the capacity region of the linear deterministic version of the problem. The result shows that passive and unreliable feedback can be harnessed to provide multiplicative capacity gain in Gaussian interference channels. In contrast to other schemes developed for interference channel with feedback, our achievable scheme makes use of quantize-map-and-forward to relay the information obtained through feedback, performs forward decoding, and does not use structured codes. We find that when the feedback links are active with sufficiently large probabilities, the perfect feedback sum-capacity is achieved to within a constant gap.\n
\n\n\n
\n\n\n
\n \n\n \n \n Melissa Duarte; Ayan Sengupta; Siddhartha Brahma; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Quantize-map-forward (QMF) relaying: an experimental study.\n \n \n \n\n\n \n\n\n\n In Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing, pages 227–236, Jul 2013. ACM\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{duarte2013quantize,\n abstract = {We present the design and experimental evaluation of a wireless system that exploits relaying in the context of WiFi. We opt for WiFi given its popularity and wide spread use for a number of applications, such as smart homes. Our testbed consists of three nodes, a source, a relay and a destination, that operate using the physical layer procedures of IEEE802.11. We deploy three main competing strategies that have been proposed for relaying, Decode-and-Forward (DF), Amplify-and-Forward (AF) and Quantize-Map-Forward (QMF). QMF is the most recently introduced of the three, and although it was shown in theory to approximately achieve the capacity of arbitrary wireless networks, its performance in practice had not been evaluated. We present in this work experimental results---to the best of our knowledge, the first ones---that compare QMF, AF and DF in a realistic indoor setting. We find that QMF is a competitive scheme to the other two, offering in some cases up to 12\\% throughput benefits and up to 60\\% improvement in frame error-rates over the next best scheme.},\n author = {Duarte, Melissa and Sengupta, Ayan and Brahma, Siddhartha and Fragouli, Christina and Diggavi, Suhas},\n booktitle = {Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing},\n file = {:papers:qmf_experimental.pdf},\n month = {Jul},\n organization = {ACM},\n pages = {227--236},\n tags = {conf,WiNet,WiNetInfFlow},\n title = {Quantize-map-forward (QMF) relaying: an experimental study},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We present the design and experimental evaluation of a wireless system that exploits relaying in the context of WiFi. We opt for WiFi given its popularity and wide spread use for a number of applications, such as smart homes. Our testbed consists of three nodes, a source, a relay and a destination, that operate using the physical layer procedures of IEEE802.11. We deploy three main competing strategies that have been proposed for relaying, Decode-and-Forward (DF), Amplify-and-Forward (AF) and Quantize-Map-Forward (QMF). QMF is the most recently introduced of the three, and although it was shown in theory to approximately achieve the capacity of arbitrary wireless networks, its performance in practice had not been evaluated. We present in this work experimental results—to the best of our knowledge, the first ones—that compare QMF, AF and DF in a realistic indoor setting. We find that QMF is a competitive scheme to the other two, offering in some cases up to 12% throughput benefits and up to 60% improvement in frame error-rates over the next best scheme.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n A Ozgur; and S. Diggavi.\n\n\n \n \n \n \n Dynamic QMF for half-duplex relay networks.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, pages 413-417, July 2012. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6284220,\n abstract = {The value of relay nodes to enhance the error performance versus rate trade-off in wireless networks has been studied extensively. However, wireless nodes currently are constrained to only transmit or receive at a given frequency, i.e., half-duplex constraint. The diversity-multiplexing tradeoff (DMT) for half-duplex networks are less understood. In the special cases where the DMT is currently known, such as the relay channel and the line network, it is achieved by either dynamic decoding or a quantize-map-forward (QMF) strategy with a fixed half-duplex schedule. The main question we investigate in this paper is whether these two strategies are sufficient to achieve the DMT of half-duplex wireless networks or we need new strategies for general setups. We propose a generalization of the two existing schemes through a dynamic QMF strategy and show that in a parallel relay channel it outperforms both earlier schemes. We also establish the DMT for the relay channel with multiple relays and multiple antennas in some special cases.},\n author = {Ozgur, A and Diggavi, S.},\n booktitle = {Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on},\n doi = {10.1109/ISIT.2012.6284220},\n file = {:papers:dynamic_qmf.pdf},\n issn = {2157-8095},\n month = {July},\n pages = {413-417},\n tags = {conf,WiNet,IT,WiNetInfFlow},\n title = {Dynamic QMF for half-duplex relay networks},\n type = {4},\n year = {2012}\n}\n\n
\n
\n\n\n
\n The value of relay nodes to enhance the error performance versus rate trade-off in wireless networks has been studied extensively. However, wireless nodes currently are constrained to only transmit or receive at a given frequency, i.e., half-duplex constraint. The diversity-multiplexing tradeoff (DMT) for half-duplex networks are less understood. In the special cases where the DMT is currently known, such as the relay channel and the line network, it is achieved by either dynamic decoding or a quantize-map-forward (QMF) strategy with a fixed half-duplex schedule. The main question we investigate in this paper is whether these two strategies are sufficient to achieve the DMT of half-duplex wireless networks or we need new strategies for general setups. We propose a generalization of the two existing schemes through a dynamic QMF strategy and show that in a parallel relay channel it outperforms both earlier schemes. We also establish the DMT for the relay channel with multiple relays and multiple antennas in some special cases.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n \n Wireless network information flow: a deterministic approach.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 57(4). April 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Wireless arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ADTj10,\n abstract = {This paper approximately resolves the information flow over wireless (Gaussian) relay networks to within a constant number of bits. It introduced the linear deterministic model and established a max-flow min-cut result for linear deterministic networks. The insights from the deterministic approach led to the approximate max-flow min-cut characterization for noisy Gaussian networks, through the introduction of a new relaying\nstrategy called {\\em quantize-map-forward} (QMF).},\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n file = {:papers:wirelessnetinfflow.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {adtj10},\n month = {April},\n note = {},\n number = {4},\n pages = {},\n tags = {journal,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Wireless network information flow: a deterministic approach},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0906.5394},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n
\n This paper approximately resolves the information flow over wireless (Gaussian) relay networks to within a constant number of bits. It introduced the linear deterministic model and established a max-flow min-cut result for linear deterministic networks. The insights from the deterministic approach led to the approximate max-flow min-cut characterization for noisy Gaussian networks, through the introduction of a new relaying strategy called \\em quantize-map-forward (QMF).\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n \n Approximate capacity region for a class of relay-interference networks.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 57(5): 2837-2864. May 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Approximate arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{MDFTj10,\n abstract = {In this paper we study  two-stage Gaussian \nrelay-interference networks where there are weak cross-links, causing the networks to behave like a chain\nof Z Gaussian channels. Our main result is an approximate characterization of the capacity region for  such networks. We propose a new interference management scheme, termed interference\nneutralization, which is implemented using structured lattice codes. This scheme allows for over-the-air\ninterference removal, without the transmitters having complete access the interfering signals.},\n author = {S. Mohajer and S N. Diggavi and C. Fragouli and D. Tse},\n file = {:papers:relayinterference_revised.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {mdft_js10},\n month = {May},\n note = {},\n number = {5},\n pages = {2837-2864},\n tags = {journal,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt,LatticeChan},\n title = {Approximate capacity region for a class of relay-interference networks},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1005.0404},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n
\n In this paper we study two-stage Gaussian relay-interference networks where there are weak cross-links, causing the networks to behave like a chain of Z Gaussian channels. Our main result is an approximate characterization of the capacity region for such networks. We propose a new interference management scheme, termed interference neutralization, which is implemented using structured lattice codes. This scheme allows for over-the-air interference removal, without the transmitters having complete access the interfering signals.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n A Sengupta; S. Brahma; A Ozgur; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n Graph-based codes for Quantize-Map-and-Forward relaying.\n \n \n \n\n\n \n\n\n\n In Information Theory Workshop (ITW), 2011 IEEE, pages 140-144, Oct 2011. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6089363,\n abstract = {We present a structured Quantize-Map-and-Forward (QMF) scheme for cooperative communication over wireless networks, that employs LDPC ensembles for the node operations and message-passing algorithms for decoding. We demonstrate through extensive simulation results over the full-duplex parallel relay network, that our scheme, with no transmit channel state information, offers a robust performance over fading channels and achieves the full diversity order of our network at moderate SNRs.},\n author = {Sengupta, A and Brahma, S. and Ozgur, A and Fragouli, C. and Diggavi, S.},\n booktitle = {Information Theory Workshop (ITW), 2011 IEEE},\n doi = {10.1109/ITW.2011.6089363},\n file = {:papers:graph_qmf.pdf},\n month = {Oct},\n pages = {140-144},\n tags = {conf,IT,WiNet,WiNetInfFlow},\n title = {Graph-based codes for Quantize-Map-and-Forward relaying},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We present a structured Quantize-Map-and-Forward (QMF) scheme for cooperative communication over wireless networks, that employs LDPC ensembles for the node operations and message-passing algorithms for decoding. We demonstrate through extensive simulation results over the full-duplex parallel relay network, that our scheme, with no transmit channel state information, offers a robust performance over fading channels and achieves the full diversity order of our network at moderate SNRs.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Mohajer; and S N. Diggavi.\n\n\n \n \n \n \n Gaussian diamond network with adversarial jammer.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), Dublin, Ireland, pages 1–5, September 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDc10a,\n abstract = {We study the problem where there is a single adversarial node which injects\nsignals to disrupt this communication in a parallel relay network. Like the source, it can\nonly influence the destination through the relays. We develop\nan approximate characterization of the reliable transmission\nrate in the presence of such an adversary. A deterministic version\nof the same problem is solved exactly, yielding insights which are\nused in the approximate characterization.},\n author = {S. Mohajer and S N. Diggavi},\n booktitle = {IEEE Information Theory Workshop (ITW), Dublin, Ireland},\n file = {:papers:md_itw10.pdf},\n month = {September},\n note = {},\n pages = {1--5},\n tags = {conf,DetApprox,WiNet,IT,WiNetInfFlow,WiNetErrCorr,Byzantine,SelConf},\n title = {Gaussian diamond network with adversarial jammer},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n We study the problem where there is a single adversarial node which injects signals to disrupt this communication in a parallel relay network. Like the source, it can only influence the destination through the relays. We develop an approximate characterization of the reliable transmission rate in the presence of such an adversary. A deterministic version of the same problem is solved exactly, yielding insights which are used in the approximate characterization.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; C. Tian; and S.N. Diggavi.\n\n\n \n \n \n \n On source transmission over deterministic relay networks.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Cairo, January 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MTDp10,\n abstract = {Lossless transmission of a set of correlated sources\nover a deterministic relay network is considered for two traffic\nrequirements. In distributed multicast, the set of sources are\nto be delivered to a set of destinations. The source exchange\nrequires all the nodes with access to sources to be able to\nreconstruct all other sources observed at other nodes. We develop\nachievable regions and outer bounds for both these situations. For\nlinear deterministic networks, these bounds coincide, yielding a\ncharacterization.},\n author = {S. Mohajer and C. Tian and S.N. Diggavi},\n booktitle = {IEEE Information Theory Workshop (ITW) Cairo},\n file = {:papers:mtd_itw10_final.pdf},\n month = {January},\n note = {},\n pages = {},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,SrcChan,SrcChanSep,NDC,InfExch,SelConf},\n title = {On source transmission over deterministic relay networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n Lossless transmission of a set of correlated sources over a deterministic relay network is considered for two traffic requirements. In distributed multicast, the set of sources are to be delivered to a set of destinations. The source exchange requires all the nodes with access to sources to be able to reconstruct all other sources observed at other nodes. We develop achievable regions and outer bounds for both these situations. For linear deterministic networks, these bounds coincide, yielding a characterization.\n
\n\n\n
\n\n\n
\n \n\n \n \n A. Ozgur; and S N. Diggavi.\n\n\n \n \n \n \n \n Approximately achieving Gaussian relay network capacity with lattice codes.\n \n \n \n \n\n\n \n\n\n\n In Proc. of IEEE ISIT 2010, Austin, Texas, pages 669–673, June 2010. \n \n\n\n\n
\n\n\n\n \n \n \"Approximately arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ODp10,\n abstract = {An approximate max-flow min-cut result for arbitrary wireless relay\nnetwork was recently established using Gaussian codebooks for\ntransmission and random mappings at the relays. In this paper,\nwe show that the approximation result can be established\nby using lattices for transmission and quantization along with\nstructured mappings at the relays. This also extended the original scalar quantizer\nanalysis to vector quantizers and obtained a slightly better approximation constant.},\n author = {A. Ozgur and S N. Diggavi},\n booktitle = {Proc. of IEEE ISIT 2010, Austin, Texas},\n file = {:papers:od_isit10.pdf},\n month = {June},\n note = {},\n pages = {669--673},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,SelConf,LatticeChan},\n title = {Approximately achieving Gaussian relay network capacity with lattice codes},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1005.1284},\n year = {2010}\n}\n\n
\n
\n\n\n
\n An approximate max-flow min-cut result for arbitrary wireless relay network was recently established using Gaussian codebooks for transmission and random mappings at the relays. In this paper, we show that the approximation result can be established by using lattices for transmission and quantization along with structured mappings at the relays. This also extended the original scalar quantizer analysis to vector quantizers and obtained a slightly better approximation constant.\n
\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and I E. Telatar.\n\n\n \n \n \n \n On information theoretic secrecy for networks.\n \n \n \n\n\n \n\n\n\n In International Zurich Seminar on Communications (IZS), March 2010. \n Invited paper surveying our results on wireless relay network secrecy.\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTc10a,\n author = {E. Perron and S N. Diggavi and I E. Telatar},\n booktitle = {International Zurich Seminar on Communications (IZS)},\n file = {:papers:pdtizs10.pdf},\n label = {pdt_c10a},\n month = {March},\n note = {Invited paper surveying our results on wireless relay network secrecy.},\n pages = {},\n tags = {conf,ITsecrecy,WiNet,IT,WiNetInfFlow,SelConf},\n title = {On information theoretic secrecy for networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and I E. Telatar.\n\n\n \n \n \n \n On cooperative secrecy for discrete memoryless relay networks.\n \n \n \n\n\n \n\n\n\n In Proc. of IEEE ISIT 2010, Austin, Texas, pages 2573 - 2577, June 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTc10b,\n abstract = {In this paper we consider information-theoretically\nsecure communication between two special nodes (“source” and\n“destination”) in a memoryless network with authenticated relays,\nwhere the secrecy is with respect to a class of eavesdroppers.\nWe develop achievable secrecy rates when authenticated relays\nalso help increase secrecy rate by inserting noise into the network.},\n author = {E. Perron and S N. Diggavi and I E. Telatar},\n booktitle = {Proc. of IEEE ISIT 2010, Austin, Texas},\n file = {:papers:pdtisit10.pdf},\n label = {pdt_c10b},\n month = {June},\n note = {},\n pages = {2573 - 2577},\n tags = {conf,ITsecrecy,WiNet,IT,WiNetInfFlow,SelConf},\n title = {On cooperative secrecy for discrete memoryless relay networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n In this paper we consider information-theoretically secure communication between two special nodes (“source” and “destination”) in a memoryless network with authenticated relays, where the secrecy is with respect to a class of eavesdroppers. We develop achievable secrecy rates when authenticated relays also help increase secrecy rate by inserting noise into the network.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Mohajer; S N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Capacity of Deterministic Z-Chain Relay-Interference Network.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), Volos, Greece, pages 331–335, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDFSj09,\n author = {S. Mohajer and S N. Diggavi and C. Fragouli and D. Tse},\n booktitle = {IEEE Information Theory Workshop (ITW), Volos, Greece},\n month = {June},\n note = {},\n pages = {331--335},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt},\n title = {Capacity of Deterministic Z-Chain Relay-Interference Network},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; and S N. Diggavi.\n\n\n \n \n \n \n Deterministic approach to wireless network error correction.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), Volos, Greece, pages 5–9, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDj09,\n author = {S. Mohajer and S N. Diggavi},\n booktitle = {IEEE Information Theory Workshop (ITW), Volos, Greece},\n month = {June},\n note = {},\n pages = {5--9},\n tags = {conf,DetApprox,WiNet,IT,WiNetInfFlow,WiNetErrCorr,Byzantine},\n title = {Deterministic approach to wireless network error correction},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S N. Diggavi; and D. Tse.\n\n\n \n \n \n \n Approximate Capacity of a Class of Gaussian Relay-Interference Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, pages 31–35, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDTj09,\n author = {S. Mohajer and S N. Diggavi and D. Tse},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Seoul, Korea},\n month = {June},\n note = {},\n pages = {31--35},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt,LatticeChan},\n title = {Approximate Capacity of a Class of Gaussian Relay-Interference Networks},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and E. Telatar.\n\n\n \n \n \n \n On noise insertion strategies for wireless network secrecy.\n \n \n \n\n\n \n\n\n\n In Information Theory and Applications workshop (ITA), UCSD, San Diego, California, pages 77–84, February 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTc09d,\n abstract = {This paper studies the idea of noise insertion by authenticated relays through friendly jamming. We develop the secrecy rate achievable in arbitrary (deterministic) networks when there are relays actively helping secrecy.},\n author = {E. Perron and S N. Diggavi and E. Telatar,},\n booktitle = {Information Theory and Applications workshop (ITA), UCSD, San Diego, California},\n file = {:papers:pdtita09final.pdf},\n label = {pdtc09d},\n month = {February},\n note = {},\n pages = {77--84},\n tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,ITapprox,WiNet},\n title = {On noise insertion strategies for wireless network secrecy},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n This paper studies the idea of noise insertion by authenticated relays through friendly jamming. We develop the secrecy rate achievable in arbitrary (deterministic) networks when there are relays actively helping secrecy.\n
\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and E. Telatar.\n\n\n \n \n \n \n On the interference-multiple-access channel.\n \n \n \n\n\n \n\n\n\n In IEEE International Conference on Communications (ICC), Dresden, Germany, pages 31–35, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTj09c,\n abstract = {We introduce the interference-multiple-access channel,\nwhich is a discrete memoryless channel with two transmitters\nand two receivers, similar to the interference channel. One\nreceiver is required to decode the information encoded at one\ntransmitter, the other receiver is required to decode the messages\nfrom both transmitters. We provide an inner bound on the\ncapacity region of this channel, as well as an outer bound for a\nspecial class of such channels. For this class, we also quantify the\ngap between inner and outer bound and show that the bounds\nmatch for a semi-deterministic channel, providing a complete\ncharacterization. For the Gaussian case, we show that the gap is\nat most 1 bit, yielding an approximate characterization.},\n author = {E. Perron and S N. Diggavi and E. Telatar},\n booktitle = {IEEE International Conference on Communications (ICC), Dresden, Germany},\n file = {:papers:pdt_icc09.pdf},\n month = {June},\n note = {},\n pages = {31--35},\n tags = {conf,ITapprox,WiNet,IT,WiNetInfFlow,IntChan,SelConf},\n title = {On the interference-multiple-access channel},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n We introduce the interference-multiple-access channel, which is a discrete memoryless channel with two transmitters and two receivers, similar to the interference channel. One receiver is required to decode the information encoded at one transmitter, the other receiver is required to decode the messages from both transmitters. We provide an inner bound on the capacity region of this channel, as well as an outer bound for a special class of such channels. For this class, we also quantify the gap between inner and outer bound and show that the bounds match for a semi-deterministic channel, providing a complete characterization. For the Gaussian case, we show that the gap is at most 1 bit, yielding an approximate characterization.\n
\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and I E. Telatar.\n\n\n \n \n \n \n On cooperative wireless network secrecy.\n \n \n \n\n\n \n\n\n\n In IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTp09,\n abstract = {In this paper we consider\nsecret communication between two special nodes (“source” and\n“destination”) in a wireless network with authenticated relays:\nthe message communicated to the destination is to be kept\ninformation-theoretically (unconditionally) secret from any eavesdropper\nwithin a class. Since the transmissions are broadcast and\ninterfere with each other, complex signal interactions occur. We\ndevelop cooperative schemes which utilize these interactions in\nwireless communication over networks with arbitrary topology,\nand give provable unconditional secrecy guarantees.},\n author = {E. Perron and S N. Diggavi and I E. Telatar},\n booktitle = {IEEE INFOCOM 2009, Rio de Janeiro, Brazil},\n file = {:papers:pdtwireless_net_secrecy08.pdf},\n label = {pdt_c09a},\n month = {April},\n note = {},\n pages = {},\n tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,WiNet,SelConf},\n title = {On cooperative wireless network secrecy},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n In this paper we consider secret communication between two special nodes (“source” and “destination”) in a wireless network with authenticated relays: the message communicated to the destination is to be kept information-theoretically (unconditionally) secret from any eavesdropper within a class. Since the transmissions are broadcast and interfere with each other, complex signal interactions occur. We develop cooperative schemes which utilize these interactions in wireless communication over networks with arbitrary topology, and give provable unconditional secrecy guarantees.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Saeedi; S N. Diggavi; C. Fragouli; and V. Prabhakaran.\n\n\n \n \n \n \n On degraded two message set broadcasting.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Taormina, Italy, pages 406–410, October 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SDFPp09,\n abstract = {Abstract—We consider the two message set problem, where a\nsource broadcasts a common message W1 to an arbitrary set of\nreceivers U and a private message W2 to a subset of the receivers\nP !U . Transmissions occur over linear deterministic channels.\nFor the case where at most two receivers do not require the\nprivate message, we give an exact characterization of the capacity\nregion, where achievability is through linear coding.},\n author = {S. Saeedi and S N. Diggavi and C. Fragouli and V. Prabhakaran},\n booktitle = {IEEE Information Theory Workshop (ITW) Taormina, Italy},\n file = {:papers:sdfpitw09.pdf},\n month = {October},\n note = {},\n pages = {406--410},\n tags = {conf,DetApprox,IT,DegMsgSet,OppComm,SelConf},\n title = {On degraded two message set broadcasting},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n Abstract—We consider the two message set problem, where a source broadcasts a common message W1 to an arbitrary set of receivers U and a private message W2 to a subset of the receivers P !U . Transmissions occur over linear deterministic channels. For the case where at most two receivers do not require the private message, we give an exact characterization of the capacity region, where achievability is through linear coding.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Approximate characterization of capacity in Gaussian relay networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Crete, Greece, pages 56–61, August 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj08a,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse, },\n booktitle = {IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Crete, Greece},\n month = {August},\n note = {},\n pages = {56--61},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Approximate characterization of capacity in Gaussian relay networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Approximate Capacity of Gaussian Relay Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Toronto, Canada, pages 474–478, July 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj08b,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Toronto, Canada},\n month = {July},\n note = {},\n pages = {474--478},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Approximate Capacity of Gaussian Relay Networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Information flow over compound wireless relay networks.\n \n \n \n\n\n \n\n\n\n In IEEE Zurich Seminar on Communications (IZS), Zurich, Switzerland, pages 92, March 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj08c,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {IEEE Zurich Seminar on Communications (IZS), Zurich, Switzerland},\n month = {March},\n note = {},\n pages = {92},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Information flow over compound wireless relay networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Transmission techniques for relay-interference networks.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, pages 464–474, September 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDFTj08,\n author = {S. Mohajer and S N. Diggavi and C. Fragouli and D. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n month = {September},\n note = {},\n pages = {464--474},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt},\n title = {Transmission techniques for relay-interference networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and E. Telatar.\n\n\n \n \n \n \n Wireless network secrecy with public feedback.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, pages 753–760, September 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTj08,\n abstract = {We study a line network with an eavesdropper having access to the\nrelay transmission. We assume that there could also be a public feedback channel from the destination. We develop achievable strategies to achieve certain rate-equivocation pairs.},\n author = {E. Perron and S N. Diggavi and E. Telatar},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n file = {:papers:pdt_allerton08.pdf},\n month = {September},\n note = {},\n pages = {753--760},\n tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,WiNet,InteractiveSec,SelConf},\n title = {Wireless network secrecy with public feedback},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n
\n We study a line network with an eavesdropper having access to the relay transmission. We assume that there could also be a public feedback channel from the destination. We develop achievable strategies to achieve certain rate-equivocation pairs.\n
\n\n\n
\n\n\n
\n \n\n \n \n A. Sabharwal; and S N. Diggavi.\n\n\n \n \n \n \n Compound Gaussian multiple access channels with noisy feedback.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, pages 887–894, September 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SDj08,\n author = {A. Sabharwal and S N. Diggavi},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n month = {September},\n note = {},\n pages = {887--894},\n tags = {conf,DetApprox,WiNet,Feedback},\n title = {Compound Gaussian multiple access channels with noisy feedback},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n A deterministic model for wireless relay networks and its capacity.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Bergen, Norway, pages 6–11, July 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj07,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {IEEE Information Theory Workshop (ITW) Bergen, Norway},\n month = {July},\n note = {},\n pages = {6--11},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {A deterministic model for wireless relay networks and its capacity},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Wireless network information flow.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, September 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj07a,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n label = {adt_allerton07a},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Wireless network information flow},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n A Deterministic Approach to Wireless Relay Networks.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, Sept 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj07b,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n label = {adt_allerton07b},\n month = {Sept},\n note = {},\n pages = {},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {A Deterministic Approach to Wireless Relay Networks},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n V. Prabhakaran; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n MIMO Broadcasting with degraded message sets: A Deterministic Approach.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, September 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTj07,\n abstract = {In this paper we study the nested (degraded) message\nset problem, where user $i$ requires messages\n$W_1, . . . ,W_i$. We study this for a MIMO linear deterministic\nbroadcast channel model, which is motivated by some recent\nsuccesses in using such models to obtain insights into approximate\ncharacterizations for the Gaussian relay and interference\nchannels. We establish the complete solution for the K = 3\nuser nested message problem for the MIMO linear deterministic\nbroadcast channel. We also establish some extremal points for\nthe general K-user case, where there are only two messages of\ninterest.},\n author = {V. Prabhakaran and S N. Diggavi and D N C. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n file = {:papers:degmsgsetbc07.pdf},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,DetApprox,IT,DegMsgSet,OppComm,SelConf},\n title = {MIMO Broadcasting with degraded message sets: A Deterministic Approach},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n
\n In this paper we study the nested (degraded) message set problem, where user $i$ requires messages $W_1, . . . ,W_i$. We study this for a MIMO linear deterministic broadcast channel model, which is motivated by some recent successes in using such models to obtain insights into approximate characterizations for the Gaussian relay and interference channels. We establish the complete solution for the K = 3 user nested message problem for the MIMO linear deterministic broadcast channel. We also establish some extremal points for the general K-user case, where there are only two messages of interest.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);