# IEEE Transactions on Information Theory

## Filter Results

Displaying Results 1 - 25 of 46

Publication Year: 2012, Page(s):C1 - C4
| PDF (155 KB)
• ### IEEE Transactions on Information Theory publication information

Publication Year: 2012, Page(s): C2
| PDF (42 KB)
• ### An Implicit Characterization of the Achievable Rate Region for Acyclic Multisource Multisink Network Coding

Publication Year: 2012, Page(s):5625 - 5639
Cited by:  Papers (17)
| | PDF (3722 KB) | HTML

The achievable information rate region problem of multisource multisink network coding for general acyclic networks with arbitrary transmission requirements has previously been studied, where inner and outer bounds on the region were derived in terms of $Gamma^{ast}$ , the fundamental region of entropy functions. In this paper, we d... View full abstract»

• ### Dirty-Paper Coding for the Gaussian Multiaccess Channel With Conferencing

Publication Year: 2012, Page(s):5640 - 5668
Cited by:  Papers (13)
| | PDF (8482 KB) | HTML

We derive the capacity region of the two-user dirty-paper Gaussian multiaccess channel (MAC) with conferencing encoders. In this MAC, prior to each transmission block, the transmitters can hold a conference in which they can communicate with each other over error-free bit pipes of given capacities. The received signal suffers not only from additive Gaussian noise but also from additive interferenc... View full abstract»

• ### Capacity Region of Gaussian MIMO Broadcast Channels With Common and Confidential Messages

Publication Year: 2012, Page(s):5669 - 5680
Cited by:  Papers (35)
| | PDF (3578 KB) | HTML

We study the two-user Gaussian multiple-input multiple-output (MIMO) broadcast channel with common and confidential messages. In this channel, the transmitter sends a common message to both users, and a confidential message to each user which needs to be kept perfectly secret from the other user. We obtain the entire capacity region of this channel. We also explore the connections between the capa... View full abstract»

Publication Year: 2012, Page(s):5681 - 5698
Cited by:  Papers (26)
| | PDF (357 KB) | HTML

We study the degraded compound multi-receiver wiretap channel (DCMRWC). DCMRWC consists of two groups of users and a group of eavesdroppers, where, if we pick an arbitrary user from each group of users and an arbitrary eavesdropper, they satisfy a certain Markov chain. We study two different communication scenarios for this channel. In the first scenario, the transmitter wants to send a confidenti... View full abstract»

• ### Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel

Publication Year: 2012, Page(s):5699 - 5710
Cited by:  Papers (12)
| | PDF (3929 KB) | HTML

We study the Gaussian multiple-input multiple-output (MIMO) wiretap channel, which consists of a transmitter, a legitimate user, and an eavesdropper. In this channel, the transmitter sends a common message to both the legitimate user and the eavesdropper. In addition to this common message, the legitimate user receives a private message, which is desired to be kept hidden as much as possible from ... View full abstract»

• ### An Information-Theoretic Characterization of Channels That Die

Publication Year: 2012, Page(s):5711 - 5724
Cited by:  Papers (7)
| | PDF (365 KB) | HTML

Given the possibility of communication systems failing catastrophically, we investigate limits to communicating over channels that fail at random times. These channels are finite-state semi-Markov channels. We show that communication with arbitrarily small probability of error is not possible. Making use of results in finite blocklength channel coding, we determine sequences of blocklengths that o... View full abstract»

• ### Minimum Expected Distortion in Gaussian Source Coding With Fading Side Information

Publication Year: 2012, Page(s):5725 - 5739
Cited by:  Papers (10)
| | PDF (814 KB) | HTML

An encoder, subject to a rate constraint, wishes to describe a Gaussian source under squared-error distortion. The decoder, besides receiving the encoder's description, also observes side information consisting of uncompressed source symbol subject to slow fading and noise. The decoder knows the fading realization but the encoder knows only its distribution. The rate-distortion function that simul... View full abstract»

• ### Degrees of Freedom of Interference Channels With CoMP Transmission and Reception

Publication Year: 2012, Page(s):5740 - 5760
Cited by:  Papers (33)
| | PDF (570 KB) | HTML

We study the degrees of freedom (DoF) of the $K$-user interference channel with coordinated multipoint (CoMP) transmission and reception. Each message is jointly transmitted by $M_{t}$ successive transmitters, and is jointly received by <... View full abstract»

• ### On the Equal-Rate Capacity of the AWGN Multiway Relay Channel

Publication Year: 2012, Page(s):5761 - 5769
Cited by:  Papers (26)
| | PDF (279 KB) | HTML

The $L$-user additive white Gaussian noise multiway relay channel is investigated, where $L$ users exchange information at the same rate through a single relay. A new achievable rate region, based on the functional-decode-forward coding strategy, is derived. For the c... View full abstract»

• ### On Capacity and Optimal Scheduling for the Half-Duplex Multiple-Relay Channel

Publication Year: 2012, Page(s):5770 - 5784
Cited by:  Papers (14)
| | PDF (3917 KB) | HTML

We study the half-duplex multiple-relay channel (HD-MRC) where every node can either transmit or listen but cannot do both at the same time. We obtain a capacity upper bound based on a max-flow min-cut argument and achievable transmission rates based on the decode-forward (DF) coding strategy, for both the discrete memoryless HD-MRC and the phase-fading HD-MRC. We discover that both the upper boun... View full abstract»

• ### Sphere Decoding Complexity Exponent for Decoding Full-Rate Codes Over the Quasi-Static MIMO Channel

Publication Year: 2012, Page(s):5785 - 5803
Cited by:  Papers (25)
| | PDF (562 KB) | HTML

In the setting of quasi-static multiple-input multiple-output channels, we consider the high signal-to-noise ratio (SNR) asymptotic complexity required by the sphere decoding (SD) algorithm for decoding a large class of full-rate linear space-time codes. With SD complexity having random fluctuations induced by the random channel, noise, and codeword realizations, the introduced SD complexity expon... View full abstract»

• ### Cyclic-Coded Integer-Forcing Equalization

Publication Year: 2012, Page(s):5804 - 5815
Cited by:  Papers (9)
| | PDF (610 KB) | HTML

A discrete-time intersymbol interference (ISI) channel with additive Gaussian noise is considered, where only the receiver has knowledge of the channel impulse response. An approach for combining decision-feedback equalization with channel coding is proposed, where decoding precedes the removal of ISI. The proposed approach involves equalizing the channel impulse response to a response with intege... View full abstract»

• ### Optimized Unequal Error Protection Using Multiplexed Hierarchical Modulation

Publication Year: 2012, Page(s):5816 - 5840
Cited by:  Papers (31)
| | PDF (911 KB) | HTML

With progressive image or scalable video encoders, as more bits are received, the source can be reconstructed with progressively better quality. These progressive codes have gradual differences of importance in their bitstreams, which necessitates multiple levels of unequal error protection (UEP). One practical method of achieving UEP is based on a constellation of nonuniformly spaced signal point... View full abstract»

• ### Asymptotic Stability Region of Slotted Aloha

Publication Year: 2012, Page(s):5841 - 5855
Cited by:  Papers (17)
| | PDF (379 KB) | HTML

We analyze the stability of standard, buffered, slotted-Aloha systems. Specifically, we consider a set of $N$ users, each equipped with an infinite buffer. Packets arrive into user $i$ 's buffer according to some stationary ergodic Markovian process of intensity View full abstract»

• ### Dynamic Server Allocation Over Time-Varying Channels With Switchover Delay

Publication Year: 2012, Page(s):5856 - 5877
Cited by:  Papers (2)
| | PDF (1424 KB) | HTML

We consider a dynamic server allocation problem over parallel queues with randomly varying connectivity and server switchover delay between the queues. At each time slot, the server decides either to stay with the current queue or switch to another queue based on the current connectivity and the queue length information. Switchover delay occurs in many telecommunications applications and is a new ... View full abstract»

• ### Performance Guarantee Under Longest-Queue-First Schedule in Wireless Networks

Publication Year: 2012, Page(s):5878 - 5889
Cited by:  Papers (3)
| | PDF (405 KB) | HTML

Efficient link scheduling in a wireless network is challenging. Typical optimal algorithms require solving an NP-hard subproblem. To meet the challenge, one stream of research focuses on finding simpler suboptimal algorithms that have low complexity but high efficiency in practice. In this paper, we study the performance guarantee of one such scheduling algorithm, the longest-queue-first (LQF) alg... View full abstract»

• ### Cooperative Access in Wireless Networks: Stable Throughput and Delay

Publication Year: 2012, Page(s):5890 - 5907
Cited by:  Papers (27)
| | PDF (2514 KB) | HTML

We investigate the impact of a protocol-level cooperation idea in a wireless multiple-access system. By dynamically and opportunistically exploiting spatial diversity among the $N$ source users, a packet is delivered to the common destination through either a direct link or through cooperative relaying by intermediate source nodes ... View full abstract»

• ### Congestion Control for Multicast Flows With Network Coding

Publication Year: 2012, Page(s):5908 - 5921
Cited by:  Papers (13)
| | PDF (643 KB) | HTML

Recent advances in network coding have shown great potential for efficient information multicasting in communication networks, in terms of both network throughput and network management. In this paper, the problem of flow control at end-systems for network-coding-based multicast flows is addressed. Optimization-based models are formulated for network resource allocation, based on which two sets of... View full abstract»

• ### Passive Network Tomography for Erroneous Networks: A Network Coding Approach

Publication Year: 2012, Page(s):5922 - 5940
Cited by:  Papers (6)
| | PDF (439 KB) | HTML

Passive network tomography uses end-to-end observations of network communications to characterize the network, for instance, to estimate the network topology and to localize random or adversarial faults. Under the setting of linear network coding, this work provides a comprehensive study of passive network tomography in the presence of network (random or adversarial) faults. To be concrete, this w... View full abstract»

• ### On the Error Performance of the $A_{n}$ Lattices

Publication Year: 2012, Page(s):5941 - 5949
Cited by:  Papers (3)
| | PDF (249 KB) | HTML

We consider the root lattice $A_{n}$ and derive explicit recursive formulas for the moments of its Voronoi cell. These formulas enable accurate prediction of the error probability of lattice codes constructed from $A_{n}$ . View full abstract»

• ### On a Conjecture by Belfiore and Solé on Some Lattices

Publication Year: 2012, Page(s):5950 - 5955
Cited by:  Papers (7)
| | PDF (185 KB) | HTML

The point of this paper is to show that the secrecy function attains its maximum at $y=1$ on all known extremal unimodular lattices and on some possibly existing even extremal unimodular lattices. This is a special case of a conjecture by Belfiore and Solé. Furthermore, we will give a very simple method to verify or disprove... View full abstract»

• ### Delsarte's Linear Programming Bound for Constant-Weight Codes

Publication Year: 2012, Page(s):5956 - 5962
Cited by:  Papers (1)
| | PDF (159 KB) | HTML

We give an alternative proof of Delsarte's linear programming bound for binary codes and its improvements. Applying the technique which is used in the proof to binary constant-weight codes, we obtain new upper bounds on sizes of binary constant-weight codes. View full abstract»

• ### Efficient Interpolation in the Wu List Decoding Algorithm

Publication Year: 2012, Page(s):5963 - 5971
Cited by:  Papers (2)
| | PDF (3237 KB) | HTML

The interpolation step of the Wu list decoding algorithm for Reed–Solomon codes is considered. The problem is reformulated as construction of a partially homogenized interpolation polynomial. A generalization of the binary interpolation algorithm, which is based on the novel formulation of the interpolation step, is provided. It enables complexity reduction both with respect to the Wu metho... View full abstract»

## Aims & Scope

IEEE Transactions on Information Theory publishes papers concerned with the transmission, processing, and utilization of information.

Full Aims & Scope

## Meet Our Editors

Editor-in-Chief
Prakash Narayan

Department of Electrical and Computer Engineering