2009 IEEE International Symposium on Information Theory 2009
DOI: 10.1109/isit.2009.5205335
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic interference management

Abstract: Interference is a central feature of the wireless channel. However, in many cases, the interferer's activity can be bursty and it is overly pessimistic to assume that interference is always present. In this paper, we use a degraded message set formulation of the two-user interference channel to study the statistical gains that can be harnessed from bursty interference. We consider a linear deterministic model of the Gaussian interference channel and characterize the degraded message set capacity region.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
33
0
2

Year Published

2013
2013
2016
2016

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 21 publications
(38 citation statements)
references
References 6 publications
(6 reference statements)
3
33
0
2
Order By: Relevance
“…Theorem 1 (LD setup capacity): The capacity region for (R (1) , R (2) ) in the LD setup is given by the following rate inequalities,…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Theorem 1 (LD setup capacity): The capacity region for (R (1) , R (2) ) in the LD setup is given by the following rate inequalities,…”
Section: Resultsmentioning
confidence: 99%
“…An intuitive interpretation of ∆ comes from our inner bounds; ∆ > 0 implies there are enough levels in subcarriers with α j > 2 (very strong interference) to recover the interfered signals for subcarriers with α j ≤ 1 (weak interference) and 1 < α j ≤ 2 (strong interference). The details of the rate tuples (R (1) , R (2) ) marked in Figure 3 are listed below: Symmetric capacity (C sym ) for ∆ < 0 and ∆ ≥ 0 is given by R C = p 1+p ∆ + ∑ M j=1 n j and R NC = p 2 ∆ + ∑ M j=1 n j respectively.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Some work has been done on bursty interference networks [2], [12]- [15]. Khude-Prabhakaran-Viswanath first studied a two-user bursty IC and characterized the capacity region of a deterministic model [12].…”
Section: Related Workmentioning
confidence: 99%
“…Some work has been done on bursty interference networks [2], [12]- [15]. Khude-Prabhakaran-Viswanath first studied a two-user bursty IC and characterized the capacity region of a deterministic model [12]. Wang-Diggavi examined a two-user bursty IC with and without feedback and characterized the capacity region of a bursty Gaussian IC to within a bounded gap [13].…”
Section: Related Workmentioning
confidence: 99%