-
1
-
-
84940651829
-
The approximate capacity of the many-to-one and one-to-many Gaussian interference channels
-
Monticello, IL, Sep.
-
G. Bresler, A. Parekh, and D. Tse, "The approximate capacity of the many-to-one and one-to-many Gaussian interference channels," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 2007.
-
(2007)
Proc. Allerton Conf. Commun. Control Comput.
-
-
Bresler, G.1
Parekh, A.2
Tse, D.3
-
2
-
-
57349111149
-
Gaussian interference channel capacity to within one bit
-
Dec.
-
R. Etkin, D. Tse, and H. Wang, "Gaussian interference channel capacity to within one bit," IEEE Trans. Inf. Theory, vol.54, no.12, pp. 5534-5562, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.12
, pp. 5534-5562
-
-
Etkin, R.1
Tse, D.2
Wang, H.3
-
3
-
-
84940666980
-
Wireless network information flow
-
Monticello, IL, Sep.
-
S. Avestimehr, S. Diggavi, and D. Tse, "Wireless network information flow," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 2007.
-
(2007)
Proc. Allerton Conf. Commun. Control Comput.
-
-
Avestimehr, S.1
Diggavi, S.2
Tse, D.3
-
4
-
-
48849083691
-
Communication over MIMO X channels: Interference alignment, decomposition, and performance analysis
-
Aug.
-
M. Maddah-Ali, A. Motahari, and A. Khandani, "Communication over MIMO X channels: Interference alignment, decomposition, and performance analysis," IEEE Trans. Inf. Theory, vol.54, no.8, pp. 3457-3470, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3457-3470
-
-
Maddah-Ali, M.1
Motahari, A.2
Khandani, A.3
-
5
-
-
48849113556
-
Interference alignment and degrees of freedom of the K-user interference channel
-
Aug.
-
V. Cadambe and S. Jafar, "Interference alignment and degrees of freedom of the K-user interference channel," IEEE Trans. Inf. Theory, vol.54, no.8, pp. 3425-3441, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3425-3441
-
-
Cadambe, V.1
Jafar, S.2
-
6
-
-
0018442936
-
How to encode the modulo-two sum of binary sources
-
Mar.
-
J. Korner and K. Marton, "How to encode the modulo-two sum of binary sources," IEEE Trans. Inf. Theory, vol.IT-25, no.2, pp. 219-221, Mar. 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.IT-25
, Issue.2
, pp. 219-221
-
-
Korner, J.1
Marton, K.2
-
7
-
-
35148814319
-
Computation over multiple-access channels
-
Oct.
-
B. Nazer and M. Gastpar, "Computation over multiple-access channels," IEEE Trans. Inf. Theory, vol.53, no.10, pp. 3498-3516, Oct. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.10
, pp. 3498-3516
-
-
Nazer, B.1
Gastpar, M.2
-
8
-
-
51649110961
-
Lattice strategies for the dirty multiple access channel
-
Jun.
-
T. Philosoph, A. Khisti, U. Erez, and R. Zamir, "Lattice strategies for the dirty multiple access channel," in Proc. Int. Symp. Inf. Theory, Jun. 2007, pp. 386-390.
-
(2007)
Proc. Int. Symp. Inf. Theory
, pp. 386-390
-
-
Philosoph, T.1
Khisti, A.2
Erez, U.3
Zamir, R.4
-
9
-
-
51849126043
-
Interference alignment on the deterministic channel and application to fully connected AWGN interference networks
-
May
-
V. Cadambe, S. Jafar, and S. S. (Shitz), "Interference alignment on the deterministic channel and application to fully connected AWGN interference networks," in Proc. Inf. Theory Workshop, May 2008, pp. 41-45.
-
(2008)
Proc. Inf. Theory Workshop
, pp. 41-45
-
-
Cadambe, V.1
Jafar, S.2
S, S.3
-
11
-
-
67249144426
-
Capacity of symmetric k-user gaussian very strong interference channels
-
Dec. DOI: 10.1109/GLOCOM.2008.ECP.180
-
S. Sridharan, A. Jafarian, S. Vishwanath, and S. Jafar, "Capacity of symmetric k-user gaussian very strong interference channels," in Proc. IEEE Global Telecommun. Conf., Dec. 4, 2008, DOI: 10.1109/GLOCOM.2008.ECP.180.
-
(2008)
Proc. IEEE Global Telecommun. Conf.
, vol.4
-
-
Sridharan, S.1
Jafarian, A.2
Vishwanath, S.3
Jafar, S.4
-
12
-
-
70349269022
-
-
Sep. [Online]. Available: arXiv: 0809.4316
-
S. Sridharan, A. Jafarian, S. Vishwanath, S. Jafar, and S. Shamai (Shitz), "A layered lattice coding scheme for a class of three user Gaussian interference channels," Sep. 2008 [Online]. Available: arXiv:0809.4316
-
(2008)
A Layered Lattice Coding Scheme for A Class of Three User Gaussian Interference Channels
-
-
Sridharan, S.1
Jafarian, A.2
Vishwanath, S.3
Jafar, S.4
Shamai, S.5
-
16
-
-
46749143834
-
On network interference management
-
Sep.
-
A. Jovicic, H.Wang, and P. Viswanath, "On network interference management," in Proc. Inf. Theory Workshop, Sep. 2007, pp. 307-312.
-
(2007)
Proc. Inf. Theory Workshop
, pp. 307-312
-
-
Jovicic, A.1
Wang, H.2
Viswanath, P.3
-
17
-
-
0019437605
-
A new achievable rate region for the interference channel
-
Jan.
-
T. S. Han and K. Kobayashi, "A new achievable rate region for the interference channel," IEEE Trans. Inf. Theory, vol.IT-27, no.1, pp. 49-60, Jan. 1981.
-
(1981)
IEEE Trans. Inf. Theory
, vol.IT-27
, Issue.1
, pp. 49-60
-
-
Han, T.S.1
Kobayashi, K.2
-
18
-
-
0019635833
-
The capacity of the Gaussian interference channel under strong interference
-
Nov.
-
H. Sato, "The capacity of the Gaussian interference channel under strong interference," IEEE Trans. Inf. Theory, vol.IT-27, no.6, pp. 786-788, Nov. 1981.
-
(1981)
IEEE Trans. Inf. Theory
, vol.IT-27
, Issue.6
, pp. 786-788
-
-
Sato, H.1
-
19
-
-
46749106384
-
The two-user Gaussian interference channel: A deterministic view
-
Apr.
-
G. Bresler and D. Tse, "The two-user Gaussian interference channel: A deterministic view," Eur. Trans. Telecommun., vol.19, pp. 333-354, Apr. 2008.
-
(2008)
Eur. Trans. Telecommun.
, vol.19
, pp. 333-354
-
-
Bresler, G.1
Tse, D.2
-
20
-
-
0031276871
-
Averaging bounds for lattices and linear codes
-
Nov.
-
H. A. Loeliger, "Averaging bounds for lattices and linear codes," IEEE Trans. Inf. Theory, vol.43, no.6, pp. 1767-1773, Nov. 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.6
, pp. 1767-1773
-
-
Loeliger, H.A.1
-
22
-
-
0030105018
-
A rate-splitting approach to the Gaussian multiple access channel
-
Mar.
-
B. Rimoldi and R. Urbanke, "A rate-splitting approach to the Gaussian multiple access channel," IEEE Trans. Inf. Theory, vol.42, no.2, pp. 364-375, Mar. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.42
, Issue.2
, pp. 364-375
-
-
Rimoldi, B.1
Urbanke, R.2
|