2017
DOI: 10.1109/tit.2017.2681078
|View full text |Cite
|
Sign up to set email alerts
|

Capacity Bounds for Networks With Correlated Sources and Characterisation of Distributions by Entropies

Abstract: Characterising the capacity region for a network can be extremely difficult. Even with independent sources, determining the capacity region can be as hard as the open problem of characterising all information inequalities. The majority of computable outer bounds in the literature are relaxations of the Linear Programming bound which involves entropy functions of random variables related to the sources and link messages. When sources are not independent, the problem is even more complicated. Extension of Linear… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Linear information and rank inequalities are fundamental in the linear programming technique that has been used to find bounds on the information ratio of secret sharing schemes [6,7,36,44,48] and on the achievable rates in network coding [17,56,60]. An improvement to that technique has been recently proposed [22].…”
Section: Common Informationmentioning
confidence: 99%
“…Linear information and rank inequalities are fundamental in the linear programming technique that has been used to find bounds on the information ratio of secret sharing schemes [6,7,36,44,48] and on the achievable rates in network coding [17,56,60]. An improvement to that technique has been recently proposed [22].…”
Section: Common Informationmentioning
confidence: 99%
“…Linear information and rank inequalities are fundamental in the linear programming technique that has been used to find bounds on the information ratio of secret sharing schemes [7,8,34,42,46] and on the achievable rates in network coding [17,53,56]. An improvement to that technique has been recently proposed [20].…”
Section: Common Informationmentioning
confidence: 99%
“…Note that there are 2 7−1 −1 = 63 possible distinct cut-sets of the form cs(α, α c ) in the network (similar bi-partitions of a set are also considered in [13] but in a different context). Without loss of generality, assume that α contains the node v 1 .…”
Section: N} Violate (P1)mentioning
confidence: 99%