The topic of information theoretic security is introduced and the principal results in this area are reviewed. The basic wire-tap channel model is considered first, and then several specific …
Like the conventional two-user interference channel, the cognitive interference channel consists of two transmitters whose signals interfere at two receivers. It is assumed that there …
I Marić, A Goldsmith, G Kramer… - European Transactions …, 2008 - Wiley Online Library
Inner and outer bounds are established on the capacity region of two‐sender, two‐receiver interference channels (IC) where one transmitter knows both messages. The transmitter with …
J Jiang, Y Xin - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
The interference channel with degraded message sets (IC-DMS) refers to a communication model, in which two senders attempt to communicate with their respective receivers …
S Yang, D Tuninetti - IEEE Transactions on Information Theory, 2011 - ieeexplore.ieee.org
An Interference Channel with Generalized Feedback (IFC-GF) models a wireless network where the sources can sense the channel activity. The signal overheard from the channel …
A linear mesh network is considered in which a single user per cell communicates to a local base station via a dedicated relay (two-hop communication). Exploiting the possibly relevant …
W Liu, B Chen - 2009 47th Annual Allerton Conference on …, 2009 - ieeexplore.ieee.org
In this paper, we study interference channels with arbitrarily correlated sources. A sufficient condition is found for reliably communicating a pair of correlated sources over a discrete …
Y Cao, B Chen - 2007 IEEE International Symposium on …, 2007 - ieeexplore.ieee.org
In this paper, we propose an achievable rate region for discrete memoryless interference channels with conferencing at the transmitter side. We employ superposition block Markov …
Under utilization of radio spectrum in traditional wireless communication systems [30], along with the increasing spectrum demand from emerging wireless applications, is driving the …