2011
DOI: 10.1109/tit.2011.2104491
|View full text |Cite
|
Sign up to set email alerts
|

On Two-User Gaussian Multiple Access Channels With Finite Input Constellations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
113
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 130 publications
(114 citation statements)
references
References 24 publications
0
113
1
Order By: Relevance
“…The CC capacity for the Gaussian-MAC (G-MAC) was analyzed in [13], for the 2-user GIC with strong interference in [14] and [15]. With finite constellations, strict suboptimality of Frequency Division Multiple Access (FDMA) scheme was shown for the G-MAC in [13] and for the 2-user GIC with strong interference in [15]. Now that the constellation constrained capacity is known for the class of -user GIC considered here, a similar analysis with finite constellations is an interesting direction to pursue.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The CC capacity for the Gaussian-MAC (G-MAC) was analyzed in [13], for the 2-user GIC with strong interference in [14] and [15]. With finite constellations, strict suboptimality of Frequency Division Multiple Access (FDMA) scheme was shown for the G-MAC in [13] and for the 2-user GIC with strong interference in [15]. Now that the constellation constrained capacity is known for the class of -user GIC considered here, a similar analysis with finite constellations is an interesting direction to pursue.…”
Section: Discussionmentioning
confidence: 99%
“…In the context of a Gaussian channel, when capacity region is achieved using impractical Gaussian input alphabets, the significance of establishing capacity results for the corresponding Discrete Memoryless Channel is that, it can be used to analyze the maximum achievable rate region when practical finite input constellations are used in the Gaussian channel. Such analysis had been done earlier for the Gaussian-MAC (G-MAC) in [13], and for the 2-user GIC with strong interference in [14] and [15].…”
Section: Introductionmentioning
confidence: 97%
“…12). Unfortunately, since one of the users (S b AB ) is only virtual, we cannot simply claim that the region of achievable rates in this virtual channel can be derived directly from the conventional cut-set bound analysis (see e.g., [18,32]), but rather a careful information-theoretic analysis would be required to identify the exact rate region. However, such analysis is far beyond the scope of this paper, and hence, for simplicity reasons, we only conjecture that the eligible source rates (r b , r s ) are limited by the conventional CC multiple-access capacity region [18,32], which can be defined by the following set of mutual informations I( ; ): …”
Section: Relay Observationmentioning
confidence: 99%
“…For more details on the evaluation of CC capacity for finite input constellations see e.g. [13,32]. 12 The higher order strategies like (N b = 4, N s = 0)…”
mentioning
confidence: 99%
“…In [16], a space-time block code scheme for a multiple-access network is presented which provides a good tradeoff between decoding complexity and information loss. In [17], a network coding is proposed for a multiple-access relay network based on the information bottleneck method [18], which is considered in this work.…”
Section: A Related Workmentioning
confidence: 99%