By Topic

Is interference like noise when you know its codebook?

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Tandra, R. ; Wireless Found., California Univ., Berkeley, CA ; Sahai, A.

We consider a point to point communication system facing interference from other systems, with a particular focus on the case when this interference is undecodable. It is well known that when the interference is non-interactive, we can certainly treat it as additional noise at the receiver and thereby achieve certain rates. This paper asks whether any higher rates could be achieved by exploiting knowledge of the interferer's codebook. The main contribution of this paper is to study the converse: if the interference is undecodable, then we cannot do better than treating it as additional noise. This is proved for almost all interference codebooks when viewed under the random Gaussian codebook measure. When the interference signal is strong enough to be decodable, then codebook knowledge can be exploited at our receiver to allow higher rates to be achieved by appropriately structuring our own codebooks. Finally, we give an example of an interference codebook that cannot be completely decoded, but whose knowledge is still useful. However, this interference codebook is bad from the perspective of the interferer's own communication system. This leads us to conjecture that when the interference signal is undecodable, the only interference codebooks worth knowing are those that are not worth using from the interfering system's point of view

Published in:

Information Theory, 2006 IEEE International Symposium on

Date of Conference:

9-14 July 2006