2007 IEEE International Symposium on Information Theory 2007
DOI: 10.1109/isit.2007.4557472
|View full text |Cite
|
Sign up to set email alerts
|

Error Exponents for Asymmetric Two-User Discrete Memoryless Source-Channel Systems

Abstract: Abstract-Consider transmitting two discrete memoryless correlated sources, consisting of a common and a private source, over a discrete memoryless multi-terminal channel with two transmitters and two receivers. At the transmitter side, the common source is observed by both encoders but the private source can only be accessed by one encoder. At the receiver side, both decoders need to reconstruct the common source, but only one decoder needs to reconstruct the private source. We hence refer to this system by th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…We note that the cognitive interference channel (without secrecy constraints) was studied in [12,Theorem 5], where an achievable rate region (inner bound on the capacity region) is given. An achievable error exponent for this channel was studied in [13]. In this paper, we provide an outer bound on the capacity region that matches the inner bound given in [12,Theorem 5] and hence establish the capacity region for this channel.…”
Section: Introductionmentioning
confidence: 66%
See 1 more Smart Citation
“…We note that the cognitive interference channel (without secrecy constraints) was studied in [12,Theorem 5], where an achievable rate region (inner bound on the capacity region) is given. An achievable error exponent for this channel was studied in [13]. In this paper, we provide an outer bound on the capacity region that matches the inner bound given in [12,Theorem 5] and hence establish the capacity region for this channel.…”
Section: Introductionmentioning
confidence: 66%
“…We note that another achievable region for the cognitive interference channel (without secrecy constraints) was reported in [13], which is included within the larger achievable region in [12,Theorem 5].…”
Section: Implication To Cognitive Interference Channelsmentioning
confidence: 99%