[图书][B] Network information theory

A El Gamal, YH Kim - 2011 - books.google.com
This comprehensive treatment of network information theory and its applications provides
the first unified coverage of both classical and recent results. With an approach that …

Compute-and-forward: Harnessing interference through structured codes

B Nazer, M Gastpar - IEEE Transactions on Information Theory, 2011 - ieeexplore.ieee.org
Interference is usually viewed as an obstacle to communication in wireless networks. This
paper proposes a new strategy, compute-and-forward, that exploits interference to obtain …

[PDF][PDF] Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives

Z Ma, ZQ Zhang, ZG Ding… - Science CHINA …, 2015 - personalpages.manchester.ac.uk
The fourth generation (4G) mobile communication systems are offering service worldwide
steadily. Although 4G systems could be loaded with much more services and data than …

Low complexity schemes for the random access Gaussian channel

O Ordentlich, Y Polyanskiy - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
We consider an uncoordinated Gaussian multiple access channel with a relatively large
number of active users within each block. A low complexity coding scheme is proposed …

The multiway relay channel

D Gunduz, A Yener, A Goldsmith… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The multiuser communication channel, in which multiple users exchange information with
the help of a relay terminal, termed the multiway relay channel (mRC), is introduced. In this …

A tutorial on lossy forwarding cooperative relaying

J He, V Tervo, X Zhou, X He, S Qian… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Lossy decode-and-forward (DF) relaying, also referred to as lossy forwarding (LF), can
significantly enhance the transmission reliability and expand the communication coverage at …

Wireless physical-layer security: Lessons learned from information theory

A Yener, S Ulukus - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
Physical-layer security utilizes resources of the transmission medium to guarantee secure
communication against an adversary with unlimited computational power. Rooted in …

Reliable physical layer network coding

B Nazer, M Gastpar - Proceedings of the IEEE, 2011 - ieeexplore.ieee.org
When two or more users in a wireless network transmit simultaneously, their electromagnetic
signals are linearly superimposed on the channel. As a result, a receiver that is interested in …

[图书][B] Green communications: theoretical fundamentals, algorithms and applications

J Wu, S Rangan, H Zhang - 2012 - books.google.com
Nowadays energy crisis and global warming problems are hanging over everyone's head,
urging much research work on energy saving. In the ICT industry, which is becoming a major …

Channel coding and decoding in a relay system operated with physical-layer network coding

S Zhang, SC Liew - IEEE Journal on Selected Areas in …, 2009 - ieeexplore.ieee.org
This paper investigates link-by-link channel-coded PNC (physical layer network coding), in
which a critical process at the relay is to transform the superimposed channel-coded packets …