2015 IEEE Information Theory Workshop - Fall (ITW) 2015
DOI: 10.1109/itwf.2015.7360756
|View full text |Cite
|
Sign up to set email alerts
|

A proof of the strong converse theorem for Gaussian multiple access channels

Abstract: We prove the strong converse for the N -source Gaussian multiple access channel (MAC). In particular, we show that any rate tuple that can be supported by a sequence of codes with asymptotic average error probability less than one must lie in the Cover-Wyner capacity region. Our proof consists of the following. First, we perform an expurgation step to convert any given sequence of codes with asymptotic average error probability less than one to codes with asymptotic maximal error probability less than one. Sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
10
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 16 publications
(19 reference statements)
2
10
0
Order By: Relevance
“…Proof: Appendix D. 5) In [24], Fong and Tan derive a converse for the Gaussian MAC with second-order term O( √ n log n)1. This converse does not match the second-order term in the achievability bounds proven in this paper.…”
Section: An Rcu Bound and Its Analysis For The Gaussian Multiplementioning
confidence: 99%
“…Proof: Appendix D. 5) In [24], Fong and Tan derive a converse for the Gaussian MAC with second-order term O( √ n log n)1. This converse does not match the second-order term in the achievability bounds proven in this paper.…”
Section: An Rcu Bound and Its Analysis For The Gaussian Multiplementioning
confidence: 99%
“…Without feedback, inner bounds for the second-order coding rates for the Gaussian MAC were independently established by Scarlett, Martinez, and Guillén i Fàbregas [27] and MolavianJazi and Laneman [28]. The strong converse, together with (non-matching) outer bounds for the second-order coding rates, was established by Fong and Tan [29]. For the Gaussian MAC with degraded message sets, the complete second-order asymptotics was derived by Scarlett and Tan [30].…”
Section: B Related Workmentioning
confidence: 99%
“…We ignore integer constraints on the number of codewords Mn in(29). We simply set Mn to the nearest integer to the number on the right-hand-side of (29).…”
mentioning
confidence: 99%
“…An alternative strong converse proof was presented by Ahlswede in [8]; this proof used Augustin's converse argument [9] in place of the blowing-up lemma, followed by a more refined wringing step. A strong converse for the Gaussian MAC was proved in [10], using an argument based on that of [8].…”
Section: Introductionmentioning
confidence: 99%