2019
DOI: 10.1109/tit.2018.2849971
|View full text |Cite
|
Sign up to set email alerts
|

Communication Versus Computation: Duality for Multiple-Access Channels and Source Coding

Abstract: Computation codes in network information theory are designed for the scenarios where the decoder is not interested in recovering the information sources themselves, but only a function thereof. Körner and Marton showed for distributed source coding that such function decoding can be achieved more efficiently than decoding the full information sources. Compute-and-forward has shown that function decoding, in combination with network coding ideas, is a useful building block for end-to-end communication. In both … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Körner and Marton have shown the effectiveness of coding for function decoding instead of decoding the full information [16]. The study in [41] establishes duality results for the codes that can be leveraged both for computation and compression over MAC. The study in [42] devises nested codes for computation summations over MAC, and the framework in [43] applies linear nested codes to improve the achievable compute-forward region for MAC.…”
mentioning
confidence: 72%
See 1 more Smart Citation
“…Körner and Marton have shown the effectiveness of coding for function decoding instead of decoding the full information [16]. The study in [41] establishes duality results for the codes that can be leveraged both for computation and compression over MAC. The study in [42] devises nested codes for computation summations over MAC, and the framework in [43] applies linear nested codes to improve the achievable compute-forward region for MAC.…”
mentioning
confidence: 72%
“…The graph entropy approach for maximally coupled sources achieves a sum-rate given in (47), and hence does not provide an additional gain over the savings of the approach in Section III with a sum-rate achieving (46). However, for the setting with correlated sources, from (47) the rate requirement is half of the requirement in (41).…”
Section: Computing the M -Normmentioning
confidence: 99%
“…The definition of computation problem varies in the literature. Some studies, including lattice codes [6], nested coset codes [5], [23], focus on recovering a desired linear combination of physical codewords X n j , j = [1 : k]. When the encoding mapping from message to codeword is linear, these two definitions can be used interchangeably.…”
Section: Discussionmentioning
confidence: 99%
“…where ∼ CN (0, 2 ) denotes the independent AWGN with zero-mean and variance 2 at WD 's receiver. Note that, in (10), each WD ∈ N \ { ( )} is either a leaf WD or an intermediate WD. Therefore, for all ∈ K −ℓ K inter , we have…”
Section: ) Leaf Wd Transmissionmentioning
confidence: 99%
“…Recently, over-the-air (OTA) aggregation (a.k.a, over-the-air computation (AirComp)) methods [8]- [10] have been proposed to directly compute a nomographic function with only O (1) radio resource blocks, which is independent of the number of WDs and the number of input data files . By exploiting the signal superposition property of the wireless multiple access channel (MAC), different WDs can simultaneously transmit their data to the destination node over the same frequency band, and the destination node can then reconstruct the targeted nomographic function value from the received signal directly [11].…”
Section: Introductionmentioning
confidence: 99%