2012 IEEE International Symposium on Information Theory Proceedings 2012
DOI: 10.1109/isit.2012.6284677
|View full text |Cite
|
Sign up to set email alerts
|

Finite blocklength coding for multiple access channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
52
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(55 citation statements)
references
References 4 publications
3
52
0
Order By: Relevance
“…Instead, we can assign essentially all the average error probability ✏ to the joint outage event. Therefore, upon repeating the same procedure as in Theorem 4, but with the jointoutage bound in Theorem 3 and the multi-dimensional CLT, we obtain the following achievable region for the Gaussian MAC, which is similar to the results of [13] and [14] for the discrete MAC.…”
Section: Gaussian Macsupporting
confidence: 63%
“…Instead, we can assign essentially all the average error probability ✏ to the joint outage event. Therefore, upon repeating the same procedure as in Theorem 4, but with the jointoutage bound in Theorem 3 and the multi-dimensional CLT, we obtain the following achievable region for the Gaussian MAC, which is similar to the results of [13] and [14] for the discrete MAC.…”
Section: Gaussian Macsupporting
confidence: 63%
“…This was re-popularized in recent times by Kontoyiannis [40], Baron-Khojastepour-Baraniuk [41], Hayashi [11], [12], and Polyanskiy-Poor-Verdú [22] among others. Second-order analysis for network information theory problems were considered in Tan and Kosut [23] as well as other authors [42]- [45]. However, this is the first work that considers second-order rates for problems with sideinformation.…”
Section: B Related Workmentioning
confidence: 99%
“…Instead of simply applying the Berry-Esséen theorem to the information spectrum term within the simplified CS-type bound in (57), we enlarge our inner bound by using a "time-sharing" variable T , which is independent of (X, Y ). This technique was also used for the multiple access channel (MAC) by Huang and Moulin [42]. Note that in the finite blocklength setting, the region R WAK (n, ε) does not have to be convex unlike in the asymptotic case; cf.…”
Section: A Achievable Second-order Coding Rates For the Wak Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…Extension of the techniques therein to multiuser settings are quite challenging [4], [5], [6], [7], [8], [9], [10]. In this paper we derive a new outer region for multiple-access channels which essentially matches the inner region of [7].…”
Section: Introductionmentioning
confidence: 99%