The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.1016/j.aeue.2017.02.007
|View full text |Cite
|
Sign up to set email alerts
|

Allocation of resources for the Gaussian multiple access channel with practical partial cooperation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…It is worth mentioning that transmission over a MAC with full cooperation achieves the outer bound and thus the capacity. 2,35 This means that there is no transmission scheme that can achieve better than the MAC with full cooperation. In this transmission scheme, as illustrated in Figure 4, the two relays simultaneously forward to the destination such that the achievable rate region is given by 28,36…”
Section: Simultaneous Transmission Schemementioning
confidence: 99%
See 2 more Smart Citations
“…It is worth mentioning that transmission over a MAC with full cooperation achieves the outer bound and thus the capacity. 2,35 This means that there is no transmission scheme that can achieve better than the MAC with full cooperation. In this transmission scheme, as illustrated in Figure 4, the two relays simultaneously forward to the destination such that the achievable rate region is given by 28,36…”
Section: Simultaneous Transmission Schemementioning
confidence: 99%
“…These comparisons were completely presented in Al-qudah and Bataineh. 2 Here, the other cases are that…”
Section: Simultaneous Transmission Schemementioning
confidence: 99%
See 1 more Smart Citation
“…At the end of this phase, due to channel degradedness, the cognitive transmitter may decode either the primary signal or the common interference signal. We note that the case of partial listening, decoding, and then encoding were studied in many different scenarios in [23, 31, 32]. In the second phase, which lasts for false(m2m1false)0 symbols, the cognitive transmitter can encode its signal by considering the decoded signal from the first phase as an available state.…”
Section: Achievable Rate Region Of the Ics With Causal Noisy Observmentioning
confidence: 99%
“…By its turn, Zanko, Leshem and Zehavi [7] explore the problem of rate allocation for multicasting over slow Rayleigh fading channels using network coding, where the network is seen as a collection of Rayleigh fading MACs. Al-qudah and Bataineh [8] have addressed the Gaussian MAC in which two users may exchange their messages at first and then The Ad Hoc Associate Editor coordinating the review of this manuscript and approving it for publication was Prof. Renato Machado.…”
Section: Introductionmentioning
confidence: 99%