373 results on '"Devroye, Natasha"'
Search Results
2. On the Response Entropy of APUFs
- Author
-
Dumoulin, Vincent, Rao, Wenjing, and Devroye, Natasha
- Subjects
Computer Science - Cryptography and Security - Abstract
A Physically Unclonable Function (PUF) is a hardware security primitive used for authentication and key generation. It takes an input bit-vector challenge and produces a single-bit response, resulting in a challenge-response pair (CRP). The truth table of all challenge-response pairs of each manufactured PUF should look different due to inherent manufacturing randomness, forming a digital fingerprint. A PUF's entropy (the entropy of all the responses, taken over the manufacturing randomness and uniformly selected challenges) has been studied before and is a challenging problem. Here we explore a related notion -- the response entropy, which is the entropy of an arbitrary response given knowledge of one (and two) other responses. This allows us to explore how knowledge of some CRP(s) impacts the ability to guess another response. The Arbiter PUF (APUF) is a well-known PUF architecture based on accumulated delay differences between two paths. In this paper, we obtain in closed form the probability mass function of any arbitrary response given knowledge of one or two other arbitrary CRPs for the APUF architecture. This allows us to obtain the conditional response entropy and then to define and obtain the size of the entropy bins (challenge sets with the same conditional response entropy) given knowledge of one or two CRPs. All of these results depend on the probability that two different challenge vectors yield the same response, termed the response similarity of those challenges. We obtain an explicit closed form expression for this. This probability depends on the statistical correlations induced by the PUF architecture together with the specific known and to-be-guessed challenges. As a by-product, we also obtain the optimal (minimizing probability of error) predictor of an unknown challenge given access to one (or two) challenges and the associated predictability.
- Published
- 2024
3. Interpreting Deepcode, a learned feedback code
- Author
-
Zhou, Yingyao, Devroye, Natasha, Turan, Gyorgy, and Zefran, Milos
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Deep learning methods have recently been used to construct non-linear codes for the additive white Gaussian noise (AWGN) channel with feedback. However, there is limited understanding of how these black-box-like codes with many learned parameters use feedback. This study aims to uncover the fundamental principles underlying the first deep-learned feedback code, known as Deepcode, which is based on an RNN architecture. Our interpretable model based on Deepcode is built by analyzing the influence length of inputs and approximating the non-linear dynamics of the original black-box RNN encoder. Numerical experiments demonstrate that our interpretable model -- which includes both an encoder and a decoder -- achieves comparable performance to Deepcode while offering an interpretation of how it employs feedback for error correction., Comment: Accepted to the 2024 ISIT conference
- Published
- 2024
4. Active learning for fast and slow modeling attacks on Arbiter PUFs
- Author
-
Dumoulin, Vincent, Rao, Wenjing, and Devroye, Natasha
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Modeling attacks, in which an adversary uses machine learning techniques to model a hardware-based Physically Unclonable Function (PUF) pose a great threat to the viability of these hardware security primitives. In most modeling attacks, a random subset of challenge-response-pairs (CRPs) are used as the labeled data for the machine learning algorithm. Here, for the arbiter-PUF, a delay based PUF which may be viewed as a linear threshold function with random weights (due to manufacturing imperfections), we investigate the role of active learning in Support Vector Machine (SVM) learning. We focus on challenge selection to help SVM algorithm learn ``fast'' and learn ``slow''. Our methods construct challenges rather than relying on a sample pool of challenges as in prior work. Using active learning to learn ``fast'' (less CRPs revealed, higher accuracies) may help manufacturers learn the manufactured PUFs more efficiently, or may form a more powerful attack when the attacker may query the PUF for CRPs at will. Using active learning to select challenges from which learning is ``slow'' (low accuracy despite a large number of revealed CRPs) may provide a basis for slowing down attackers who are limited to overhearing CRPs.
- Published
- 2023
5. On Second Order Rate Regions for the Static Scalar Gaussian Broadcast Channel
- Author
-
Tuninetti, Daniela, Sheldon, Paul, Smida, Besma, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper considers the single antenna, static Gaussian broadcast channel in the finite blocklength regime. Second order achievable and converse rate regions are presented. Both a global reliability requirement and per-user reliability requirements are considered. The two-user case is analyzed in detail, and generalizations to the $K$-user case are also discussed. The largest second order achievable region presented here requires both superposition and rate splitting in the code construction, as opposed to the (infinite blocklength, first order) capacity region which does not require rate splitting. Indeed, the finite blocklength penalty causes superposition alone to under-perform other coding techniques in some parts of the region. In the two-user case with per-user reliability requirements, the capacity achieving superposition coding order (with the codeword of the user with the smallest SNR as cloud center) does not necessarily gives the largest second order region. Instead, the message of the user with the smallest point-to-point second order capacity should be encoded in the cloud center in order to obtain the largest second order region for the proposed scheme.
- Published
- 2022
6. Capacity and Stability Regions for Layered Packet Erasure Broadcast Channels with Feedback
- Author
-
Li, Siyao, Tuninetti, Daniela, Devroye, Natasha, and Seferoglu, Hulya
- Subjects
Computer Science - Information Theory - Abstract
This paper focuses on the Layered Packet Erasure Broadcast Channel (LPE-BC) with Channel Output Feedback (COF) available at the transmitter. The LPE-BC is a high-SNR approximation of the fading Gaussian BC recently proposed by Tse and Yates, who characterized the capacity region for any number of users and any number of layers when there is no COF. This paper provides a comparative overview of this channel model along the following lines: First, inner and outer bounds to the capacity region (set of achievable rates with backlogged arrivals) are presented: a) a new outer bound based on the idea of the physically degraded broadcast channel, and b) an inner bound of the LPE-BC with COF for the case of two users and any number of layers. Next, an inner bound on the stability region (set of exogenous arrival rates for which packet arrival queues are stable) for the same model is derived. The capacity region inner bound generalizes past results for the two-user erasure BC, which is a special case of the LPE-BC with COF with only one layer. The novelty lies in the use of inter-user and inter-layer network coding retransmissions (for those packets that have only been received by the unintended user), where each random linear combination may involve packets intended for any user originally sent on any of the layers. For the case of $K = 2$ users and $Q \geq 1$ layers, the inner bounds to the capacity region and the stability region coincide; both strategically employ the novel retransmission protocol. For the case of $Q = 2$ layers, sufficient conditions are derived by Fourier-Motzkin elimination for the inner bound on the stability region to coincide with the capacity outer bound, thus showing that in those cases the capacity and stability regions coincide.
- Published
- 2021
7. On Code Design for Wireless Channels with Additive Radar Interference
- Author
-
Brunero, Federico, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper considers the problem of code design for a channel where communications and radar systems coexist, modeled as having both Additive White Gaussian Noise (AWGN) and Additive Radar Interference (ARI). The issue of how to adapt or re-design convolutional codes (decoded by the Viterbi algorithm) and LDPC codes (decoded by the sum-product algorithm and optimized by using the EXIT chart method) to effectively handle the overall non-Gaussian ARI noise is investigated. A decoding metric is derived from the non-Gaussian ARI channel transition probability as a function of the Signal-to-Noise Ratio (SNR) and Interference-to-Noise Ratio (INR). Two design methodologies are benchmarked against a baseline "unaltered legacy system", where a code designed for AWGN-only noise, but used on the non-Gaussian ARI channel, is decoded by using the AWGN-only metric (i.e., as if INR is zero). The methodologies are: M1) codes designed for AWGN-only noise, but decoded with the new metric that accounts for both SNR and INR; and M2) codes optimized for the overall non-Gaussian ARI channel. Both methodologies give better average Bit Error Rate (BER) in the high INR regime compared to the baseline. In the low INR regime, both methodologies perform as the baseline since in this case the radar interference is weak. Interestingly, the performance improvement of M2 over M1 is minimal. In practice, this implies that specifications in terms of channel error correcting codes for commercially available wireless systems need not be changed, and that it suffices to use an appropriate INR-based decoding metric in order to effectively cope with the ARI.
- Published
- 2019
8. Achievable Error Exponents of One-Way and Two-Way AWGN Channels
- Author
-
Palacio-Baus, Kenneth and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
Achievable error exponents for the one-way with noisy feedback and two-way AWGN channels are derived for the transmission of a finite number of messages $M$ using fixed block length $n$, under the almost sure (AS) and the expected block (EXP) power constraints. In the one-way setting under noisy AWGN feedback, it is shown that under the AS constraint and when the feedback link is much stronger than the direct link, active feedback leads to a larger gain over the non-feedback error exponent than passive feedback. Under the EXP constraint, a previously known error exponent for the transmission of two messages is generalized to any arbitrary but finite number of messages $M$. In the two-way setting, where each user has its own message to send in addition to (possibly) aiding in the transmission of feedback for the opposite direction, error exponent regions are defined and derived for the first time for the AWGN two-way channel under both AS and EXP power constraints. It is shown that feedback or interaction may lead to error exponent gains in one direction, possibly at the expense of a decrease in the error exponents attained in the other direction. The relationship between $M$ and $n$ supported by our achievability strategies is explored., Comment: 46 pages, 18 figures, Submitted to IEEE Transactions on Information Theory
- Published
- 2019
9. On the Capacity Region of the Layered Packet Erasure Broadcast Channel with Feedback
- Author
-
Li, Siyao, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
In this paper, the capacity region of the Layered Packet Erasure Broadcast Channel (LPE-BC) with Channel Output Feedback (COF) available at the transmitter is investigated. The LPE-BC is a high-SNR approximation of the fading Gaussian BC recently proposed by Tse and Yates, who characterized the capacity region for any number of users and any number of layers when there is no COF. This paper derives capacity inner and outer bounds for the LPE-BC with COF for the case of two users and any number of layers. The inner bounds generalize past results for the two-user erasure BC, which is a special case of the LPE-BC with COF with only one layer. The novelty lies in the use of \emph{inter-user \& inter-layer network coding} retransmissions (for those packets that have only been received by the unintended user), where each random linear combination may involve packets intended for any user originally sent on any of the layers. Analytical and numerical examples show that the proposed outer bound is optimal for some LPE-BCs., Comment: 6 pages, 1 figure, submitted to 2019 IEEE International Conference on Communications (ICC)
- Published
- 2019
10. On Erasure Broadcast Channels with Hard Deadlines
- Author
-
Ovaisi, Zohreh, Devroye, Natasha, Seferoglu, Hulya, Smida, Besma, and Tuninetti, Daniela
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
This paper considers packet scheduling over a broadcast channel with packet erasures to multiple receivers with different messages (multiple uni-cast) each with possibly different hard deadline constraints. A novel metric is proposed and evaluated: the global deadline outage probability, which gives the probability that the hard communication deadline is not met for at least one of the receivers. The cut-set upper bound is derived and a scheduling policy is proposed to determine which receiver's packets should be sent in each time slot. This policy is shown to be optimal among all scheduling policies, i.e., it achieves all boundary points of cut-set upper bounds when the transmitter knows the erasure patterns for all the receivers ahead of making the scheduling decision. An expression for the global deadline outage probability is obtained for two receivers and is plotted and interpreted for various system parameters. These plots are not Monte-Carlo simulations, and hence the obtained expression may be used in the design of future downlink broadcast networks. Future extensions to per-user deadline outage probabilities as well as to scenarios with causal knowledge of the channel states are briefly discussed.
- Published
- 2018
11. The Strongly Asynchronous Massive Access Channel
- Author
-
Shahi, Sara, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper considers a Strongly Asynchronous and Slotted Massive Access Channel (SAS-MAC) where $K_n:=e^{n\nu}$ different users transmit a randomly selected message among $M_n:=e^{nR}$ ones within a strong asynchronous window of length $A_n:=e^{n\alpha}$ blocks, where each block lasts $n$ channel uses. A global probability of error is enforced, ensuring that all the users' identities and messages are correctly identified and decoded. Achievability bounds are derived for the case that different users have similar channels, the case that users' channels can be chosen from a set which has polynomially many elements in the blocklength $n$, and the case with no restriction on the users' channels. A general converse bound on the capacity region and a converse bound on the maximum growth rate of the number of users are derived., Comment: under submission
- Published
- 2018
12. On Identifying a Massive Number of Distributions
- Author
-
Shahi, Sara, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
Finding the underlying probability distributions of a set of observed sequences under the constraint that each sequence is generated i.i.d by a distinct distribution is considered. The number of distributions, and hence the number of observed sequences, are let to grow with the observation blocklength $n$. Asymptotically matching upper and lower bounds on the probability of error are derived., Comment: Under Submission
- Published
- 2018
- Full Text
- View/download PDF
13. The adaptive zero-error capacity for a class of channels with noisy feedback
- Author
-
Asadi, Meysam and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
The adaptive zero-error capacity of discrete memoryless channels (DMC) with noiseless feedback has been shown to be positive whenever there exists at least one channel output "disprover", i.e. a channel output that cannot be reached from at least one of the inputs. Furthermore, whenever there exists a disprover, the adaptive zero-error capacity attains the Shannon (small-error) capacity. Here, we study the zero-error capacity of a DMC when the channel feedback is noisy rather than perfect. We show that the adaptive zero-error capacity with noisy feedback is lower bounded by the forward channel's zero-undetected error capacity, and show that under certain conditions this is tight.
- Published
- 2017
14. On the Capacity of the AWGN Channel with Additive Radar Interference
- Author
-
Shahi, Sara, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper investigates the capacity of a communications channel that, in addition to additive white Gaussian noise, also suffers from interference caused by a co-existing radar transmission. The radar interference (of short duty-cycle and of much wider bandwidth than the intended communication signal) is modeled as an additive term whose amplitude is known and constant, but whose phase is independent and identically uniformly distributed at each channel use. The capacity achieving input distribution, under the standard average power constraint, is shown to have independent modulo and phase. The phase is uniformly distributed in $[0,2\pi]$. The modulo is discrete with countably infinitly many mass points, but only finitely many in any bounded interval. From numerical evaluations, a proper-complex Gaussian input is seen to perform quite well for weak radar interference. We also show that for very large radar interference, capacity is equal to $1/2\log (1 + S)$ and a proper-complex Gaussian input achieves it. It is concluded that the presence of the radar interference results in a loss of half of the degrees of freedom compared to an AWGN channel without radar interference., Comment: Under submission
- Published
- 2017
- Full Text
- View/download PDF
15. On the Capacity of the Slotted Strongly Asynchronous Channel with a Bursty User
- Author
-
Shahi, Sara, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
In this paper, the trade-off between the number of transmissions (or burstiness) $K_n=e^{n\nu}$ of a user, the asynchronism level $A_n=e^{n\alpha}$ in a slotted strongly asynchronous channel, and the ability to distinguish $M_n=e^{nR}$ messages per transmission with vanishingly error probability is investigated in the asymptotic regime as blocklength $n$ goes to infinity. The receiver must locate and decode, with vanishing error probability in $n$, all of the transmitted messages. Achievability and converse bounds on the trade-off among $(R,\alpha,\nu)$ is derived. For cases where $\nu=0$ and $ R=0$, achievability and converse bounds coincide. A second model for a bursty user with random access in which the user may access and transmit a message in each block with probability $e^{-n\beta}$ in then considered. Achievability and converse bounds on the trade-off between $(R, \alpha, \beta)$ is also characterized. For cases where $\beta =\alpha$ and $R=0$, the achievability and converse bounds match., Comment: Under submission
- Published
- 2017
16. On the Minimum Mean $p$-th Error in Gaussian Noise Channels and its Applications
- Author
-
Dytso, Alex, Bustin, Ronit, Tuninetti, Daniela, Devroye, Natasha, Poor, H. Vincent, and Shamai, Shlomo
- Subjects
Computer Science - Information Theory - Abstract
The problem of estimating an arbitrary random vector from its observation corrupted by additive white Gaussian noise, where the cost function is taken to be the Minimum Mean $p$-th Error (MMPE), is considered. The classical Minimum Mean Square Error (MMSE) is a special case of the MMPE. Several bounds, properties and applications of the MMPE are derived and discussed. The optimal MMPE estimator is found for Gaussian and binary input distributions. Properties of the MMPE as a function of the input distribution, SNR and order $p$ are derived. In particular, it is shown that the MMPE is a continuous function of $p$ and SNR. These results are possible in view of interpolation and change of measure bounds on the MMPE. The `Single-Crossing-Point Property' (SCPP) that bounds the MMSE for all SNR values {\it above} a certain value, at which the MMSE is known, together with the I-MMSE relationship is a powerful tool in deriving converse proofs in information theory. By studying the notion of conditional MMPE, a unifying proof (i.e., for any $p$) of the SCPP is shown. A complementary bound to the SCPP is then shown, which bounds the MMPE for all SNR values {\it below} a certain value, at which the MMPE is known. As a first application of the MMPE, a bound on the conditional differential entropy in terms of the MMPE is provided, which then yields a generalization of the Ozarow-Wyner lower bound on the mutual information achieved by a discrete input on a Gaussian noise channel. As a second application, the MMPE is shown to improve on previous characterizations of the phase transition phenomenon that manifests, in the limit as the length of the capacity achieving code goes to infinity, as a discontinuity of the MMSE as a function of SNR. As a final application, the MMPE is used to show bounds on the second derivative of mutual information, that tighten previously known bounds.
- Published
- 2016
17. On Communication through a Gaussian Channel with an MMSE Disturbance Constraint
- Author
-
Dytso, Alex, Bustin, Ronit, Tuninetti, Daniela, Devroye, Natasha, Poor, H. Vincent, and Shamai, Shlomo
- Subjects
Computer Science - Information Theory - Abstract
This paper considers a Gaussian channel with one transmitter and two receivers. The goal is to maximize the communication rate at the intended/primary receiver subject to a disturbance constraint at the unintended/secondary receiver. The disturbance is measured in terms of minimum mean square error (MMSE) of the interference that the transmission to the primary receiver inflicts on the secondary receiver. The paper presents a new upper bound for the problem of maximizing the mutual information subject to an MMSE constraint. The new bound holds for vector inputs of any length and recovers a previously known limiting (when the length of vector input tends to infinity) expression from the work of Bustin $\textit{et al.}$ The key technical novelty is a new upper bound on the MMSE. This bound allows one to bound the MMSE for all signal-to-noise ratio (SNR) values $\textit{below}$ a certain SNR at which the MMSE is known (which corresponds to the disturbance constraint). This bound complements the `single-crossing point property' of the MMSE that upper bounds the MMSE for all SNR values $\textit{above}$ a certain value at which the MMSE value is known. The MMSE upper bound provides a refined characterization of the phase-transition phenomenon which manifests, in the limit as the length of the vector input goes to infinity, as a discontinuity of the MMSE for the problem at hand. For vector inputs of size $n=1$, a matching lower bound, to within an additive gap of order $O \left( \log \log \frac{1}{\sf MMSE} \right)$ (where ${\sf MMSE}$ is the disturbance constraint), is shown by means of the mixed inputs technique recently introduced by Dytso $\textit{et al.}$, Comment: Submitted to IEEE Transactions on Information Theory
- Published
- 2016
18. Multi-user Cognitive Interference Channels: A Survey and New Capacity Results
- Author
-
Maamari, Diana, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper provides a survey of the state-of-the-art information theoretic analysis for overlay multi-user (more than two pairs) cognitive networks and reports new capacity results. In an overlay scenario, cognitive / secondary users share the same frequency band with licensed / primary users to efficiently exploit the spectrum. They do so without degrading the performance of the incumbent users, and may possibly even aid in transmitting their messages as cognitive users are assumed to possess the message(s) of primary user(s) and possibly other cognitive user(s). The survey begins with a short overview of the two-user overlay cognitive interference channel. The evolution from two-user to three-user overlay cognitive interference channels is described next, followed by generalizations to multi-user (arbitrary number of users) cognitive networks. The rest of the paper considers K-user cognitive interference channels with different message knowledge structures at the transmitters. Novel capacity inner and outer bounds are proposed. Channel conditions under which the bounds meet, thus characterizing the information theoretic capacity of the channel, for both Linear Deterministic and Gaussian channel models, are derived. The results show that for certain channel conditions distributed cognition, or having a cumulative message knowledge structure at the nodes, may not be worth the overhead as (approximately) the same capacity can be achieved by having only one global cognitive user whose role is to manage all the interference in the network. The paper concludes with future research directions., Comment: 7 figures, 16 pages, 1 table
- Published
- 2015
19. Interference as Noise: Friend or Foe?
- Author
-
Dytso, Alex, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper shows that for the two-user Gaussian Interference Channel (G-IC) Treating Interference as Noise without Time Sharing (TINnoTS) achieves the closure of the capacity region to within either a constant gap, or to within a gap of the order O(logln(min(S,I))) where S is the largest Signal to Noise Ratio (SNR) on the direct links and I is the largest Interference to Noise Ratio (INR) on the cross links. As a consequence, TINnoTS is optimal from a generalized Degrees of Freedom (gDoF) perspective for all channel gains except for a subset of zero measure. TINnoTS with Gaussian inputs is known to be optimal to within 1/2 bit for a subset of the weak interference regime. Surprisingly, this paper shows that TINnoTS is gDoG optimal in all parameter regimes, even in the strong and very strong interference regimes where joint decoding of Gaussian inputs is optimal. For approximate optimality of TINnoTS in all parameter regimes it is critical to use non-Gaussian inputs. This work thus proposes to use mixed inputs as channel inputs where a mixed input is the sum of a discrete and a Gaussian random variable. Interestingly, compared to the Han-Kobayashi inner bound, the discrete part of a mixed input is shown to effectively act as a common message in the sense that, although treated as noise, its effect on the achievable rate region is as if it were jointly decoded together with the desired messages at a non-intended receiver. The practical implication is that a discrete interfering input is a 'friend', while a Gaussian interfering input is in general a 'foe'. Since TINnoTS requires neither joint decoding nor time sharing, the results of this paper are applicable to a variety of oblivions or asynchronous channels, such as the block asynchronous G-IC (which is not an information stable) and the G-IC with partial codebook knowledge at one or more receivers.
- Published
- 2015
20. Coverage in mmWave Cellular Networks with Base station Cooperation
- Author
-
Maamari, Diana, Devroye, Natasha, and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory ,Computer Science - Networking and Internet Architecture - Abstract
The presence of signal outage, due to shadowing and blockage, is expected to be the main bottleneck in millimeter wave (mmWave) networks. Moreover, with the anticipated vision that mmWave networks would have a dense deployment of base stations, interference from strong line-of-sight base stations increases too, thus further increasing the probability of outage. To address the issue of reducing outage, this paper explores the possibility of base station cooperation in the downlink of a mmWave heterogenous network. The main focus of this work is showing that, in a stochastic geometry framework, cooperation from randomly located base stations decreases outage probability. With the presumed vision that less severe fading will be experienced due to highly directional transmissions, one might expect that cooperation would increase the coverage probability; our numerical examples suggest that is in fact the case. Coverage probabilities are derived accounting for: different fading distributions, antenna directionality and blockage. Numerical results suggest that coverage with base station cooperation in dense mmWave systems and with no small scale fading considerably exceeds coverage with no cooperation. In contrast, an insignificant increase is reported when mmWave networks are less dense with a high probability of signal blockage and with Rayleigh fading., Comment: 30 pages, 8 figures
- Published
- 2015
21. On the Capacity Region of the Two-user Interference Channel with a Cognitive Relay
- Author
-
Dytso, Alex, Rini, Stefano, Devroye, Natasha, and Tuninetti, Daniela
- Subjects
Computer Science - Information Theory - Abstract
This paper considers a variation of the classical two-user interference channel where the communication of two interfering source-destination pairs is aided by an additional node that has a priori knowledge of the messages to be transmitted, which is referred to as the it cognitive relay. For this Interference Channel with a Cognitive Relay (ICCR) In particular, for the class of injective semi-deterministic ICCRs, a sum-rate upper bound is derived for the general memoryless ICCR and further tightened for the Linear Deterministic Approximation (LDA) of the Gaussian noise channel at high SNR, which disregards the noise and focuses on the interaction among the users' signals. The capacity region of the symmetric LDA is completely characterized except for the regime of moderately weak interference and weak links from the CR to the destinations. The insights gained from the analysis of the LDA are then translated back to the symmetric Gaussian noise channel (GICCR). For the symmetric GICCR, an approximate characterization (to within a constant gap) of the capacity region is provided for a parameter regime where capacity was previously unknown. The approximately optimal scheme suggests that message cognition at a relay is beneficial for interference management as it enables simultaneous over the air neutralization of the interference at both destinations.
- Published
- 2014
22. On the Two-user Interference Channel with Lack of Knowledge of the Interference Codebook at one Receiver
- Author
-
Dytso, Alex, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
In multi-user information theory it is often assumed that every node in the network possesses all codebooks used in the network. This assumption may be impractical in distributed ad-hoc, cognitive or heterogeneous networks. This work considers the two-user Interference Channel with one Oblivious Receiver (IC-OR), i.e., one receiver lacks knowledge of the interfering cookbook while the other receiver knows both codebooks. The paper asks whether, and if so how much, the channel capacity of the IC-OR is reduced compared to that of the classical IC where both receivers know all codebooks. A novel outer bound is derived and shown to be achievable to within a gap for the class of injective semi-deterministic IC-ORs; the gap is shown to be zero for injective fully deterministic IC-ORs. For the linear deterministic IC-OR that models the Gaussian noise channel at high SNR, non i.i.d. Bernoulli(1/2) input bits are shown to achieve points not achievable by i.i.d. Bernoulli(1/2) input bits used in the same achievability scheme. For the real-valued Gaussian IC-OR the gap is shown to be at most 1/2 bit per channel use, even though the set of optimal input distributions for the derived outer bound could not be determined. Towards understanding the Gaussian IC-OR, an achievability strategy is evaluated in which the input alphabets at the non-oblivious transmitter are a mixture of discrete and Gaussian random variables, where the cardinality of the discrete part is appropriately chosen as a function of the channel parameters. Surprisingly, as the oblivious receiver intuitively should not be able to 'jointly decode' the intended and interfering messages (whose codebook is unavailable), it is shown that with this choice of input, the capacity region of the symmetric Gaussian IC-OR is to within 3.34 bits (per channel use per user) of an outer bound for the classical Gaussian IC with full codebook knowledge.
- Published
- 2014
23. On Discrete Alphabets for the Two-user Gaussian Interference Channel with One Receiver Lacking Knowledge of the Interfering Codebook
- Author
-
Dytso, Alex, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
In multi-user information theory it is often assumed that every node in the network possesses all codebooks used in the network. This assumption is however impractical in distributed ad-hoc and cognitive networks. This work considers the two- user Gaussian Interference Channel with one Oblivious Receiver (G-IC-OR), i.e., one receiver lacks knowledge of the interfering cookbook while the other receiver knows both codebooks. We ask whether, and if so how much, the channel capacity of the G-IC- OR is reduced compared to that of the classical G-IC where both receivers know all codebooks. Intuitively, the oblivious receiver should not be able to jointly decode its intended message along with the unintended interfering message whose codebook is unavailable. We demonstrate that in strong and very strong interference, where joint decoding is capacity achieving for the classical G-IC, lack of codebook knowledge does not reduce performance in terms of generalized degrees of freedom (gDoF). Moreover, we show that the sum-capacity of the symmetric G-IC- OR is to within O(log(log(SNR))) of that of the classical G-IC. The key novelty of the proposed achievable scheme is the use of a discrete input alphabet for the non-oblivious transmitter, whose cardinality is appropriately chosen as a function of SNR.
- Published
- 2014
24. The Degrees of Freedom of the $K$-pair-user Full-Duplex Two-way Interference Channel with and without a MIMO Relay
- Author
-
Cheng, Zhiyu and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
In a $K$-pair-user two-way interference channel (TWIC), $2K$ messages and $2K$ transmitters/receivers form a $K$-user IC in the forward direction ($K$ messages) and another $K$-user IC in the backward direction which operate in full-duplex mode. All nodes may interact, or adapt inputs to past received signals. We derive a new outer bound to demonstrate that the optimal degrees of freedom (DoF, also known as the multiplexing gain) is $K$: full-duplex operation doubles the DoF, but interaction does not further increase the DoF. We next characterize the DoF of the $K$-pair-user TWIC with a MIMO, full-duplex relay. If the relay is non-causal/instantaneous (at time $k$ forwards a function of its received signals up to time $k$) and has $2K$ antennas, we demonstrate a one-shot scheme where the relay mitigates all interference to achieve the interference-free $2K$ DoF. In contrast, if the relay is causal (at time $k$ forwards a function of its received signals up to time $k-1$), we show that a full-duplex MIMO relay cannot increase the DoF of the $K$-pair-user TWIC beyond $K$, as if no relay or interaction is present. We comment on reducing the number of antennas at the instantaneous relay., Comment: Submitted to the IEEE Journal on Selected Areas in Communications (JSAC) in October 2013
- Published
- 2013
25. Approximate Sum-Capacity of K-user Cognitive Interference Channels with Cumulative Message Sharing
- Author
-
Maamari, Diana, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This paper considers the K user cognitive interference channel with one primary and K-1 secondary/cognitive transmitters with a cumulative message sharing structure, i.e cognitive transmitter $i\in [2:K]$ knows non-causally all messages of the users with index less than i. We propose a computable outer bound valid for any memoryless channel. We first evaluate the sum-rate outer bound for the high- SNR linear deterministic approximation of the Gaussian noise channel. This is shown to be capacity for the 3-user channel with arbitrary channel gains and the sum-capacity for the symmetric K-user channel. Interestingly. for the K user channel having only the K th cognitive know all the other messages is sufficient to achieve capacity i.e cognition at transmitter 2 to K-1 is not needed. Next the sum capacity of the symmetric Gaussian noise channel is characterized to within a constant additive and multiplicative gap. The proposed achievable scheme for the additive gap is based on Dirty paper coding and can be thought of as a MIMO-broadcast scheme where only one encoding order is possible due to the message sharing structure. As opposed to other multiuser interference channel models, a single scheme suffices for both the weak and strong interference regimes. With this scheme the generalized degrees of freedom (gDOF) is shown to be a function of K, in contrast to the non cognitive case and the broadcast channel case. Interestingly, it is show that as the number of users grows to infinity the gDoF of the K-user cognitive interference channel with cumulative message sharing tends to the gDoF of a broadcast channel with a K-antenna transmitter and K single-antenna receivers. The analytical additive additive and multiplicative gaps are a function of the number of users. Numerical evaluations of inner and outer bounds show that the actual gap is less than the analytical one., Comment: Journal
- Published
- 2013
26. Lattice Coding for the Two-way Two-relay Channel
- Author
-
Song, Yiwei, Devroye, Natasha, Shao, Huai-Rong, and Ngo, Chiu
- Subjects
Computer Science - Information Theory - Abstract
Lattice coding techniques may be used to derive achievable rate regions which outperform known independent, identically distributed (i.i.d.) random codes in multi-source relay networks and in particular the two-way relay channel. Gains stem from the ability to decode the sum of codewords (or messages) using lattice codes at higher rates than possible with i.i.d. random codes. Here we develop a novel lattice coding scheme for the Two-way Two-relay Channel: 1 <-> 2 <-> 3 <-> 4, where Node 1 and 4 simultaneously communicate with each other through two relay nodes 2 and 3. Each node only communicates with its neighboring nodes. The key technical contribution is the lattice-based achievability strategy, where each relay is able to remove the noise while decoding the sum of several signals in a Block Markov strategy and then re-encode the signal into another lattice codeword using the so-called "Re-distribution Transform". This allows nodes further down the line to again decode sums of lattice codewords. This transform is central to improving the achievable rates, and ensures that the messages traveling in each of the two directions fully utilize the relay's power, even under asymmetric channel conditions. All decoders are lattice decoders and only a single nested lattice codebook pair is needed. The symmetric rate achieved by the proposed lattice coding scheme is within 0.5 log 3 bit/Hz/s of the symmetric rate capacity., Comment: submitted to IEEE Transactions on Information Theory on December 3, 2012
- Published
- 2012
- Full Text
- View/download PDF
27. On Constant Gaps for the Two-way Gaussian Interference Channel
- Author
-
Cheng, Zhiyu and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
We introduce the two-way Gaussian interference channel in which there are four nodes with four independent messages: two-messages to be transmitted over a Gaussian interference channel in the $\rightarrow$ direction, simultaneously with two-messages to be transmitted over an interference channel (in-band, full-duplex) in the $\leftarrow$ direction. In such a two-way network, all nodes are transmitters and receivers of messages, allowing them to adapt current channel inputs to previously received channel outputs. We propose two new outer bounds on the symmetric sum-rate for the two-way Gaussian interference channel with complex channel gains: one under full adaptation (all 4 nodes are permitted to adapt inputs to previous outputs), and one under partial adaptation (only 2 nodes are permitted to adapt, the other 2 are restricted). We show that simple non-adaptive schemes such as the Han and Kobayashi scheme, where inputs are functions of messages only and not past outputs, utilized in each direction are sufficient to achieve within a constant gap of these fully or partially adaptive outer bounds for all channel regimes., Comment: presented at 50th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, October 2012
- Published
- 2012
28. Two-way Networks: when Adaptation is Useless
- Author
-
Cheng, Zhiyu and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
In two-way networks, nodes act as both sources and destinations of messages. This allows for "adaptation" at or "interaction" between the nodes - a node's channel inputs may be functions of its message(s) and previously received signals. How to best adapt is key to two-way communication, rendering it challenging. However, examples exist of point-to-point channels where adaptation is not beneficial from a capacity perspective. We ask whether analogous examples exist for multi-user two-way networks. We first consider deterministic two-way channel models: the binary modulo-2 addition channel and a generalization thereof, and the linear deterministic channel. For these deterministic models we obtain the capacity region for the two-way multiple access/broadcast channel, the two-way Z channel and the two-way interference channel (IC). In all cases we permit all nodes to adapt channel inputs to past outputs (except for portions of the linear deterministic two-way IC where we only permit 2 of the 4 nodes to fully adapt). However, we show that this adaptation is useless from a capacity region perspective and capacity is achieved by strategies where the channel inputs at each use do not adapt to previous inputs. Finally, we consider the Gaussian two-way IC, and show that partial adaptation is useless when the interference is very strong. In the strong and weak interference regimes, we show that the non-adaptive Han and Kobayashi scheme utilized in parallel in both directions achieves to within a constant gap for the symmetric rate of the fully (some regimes) or partially (remaining regimes) adaptive models. The central technical contribution is the derivation of new, computable outer bounds which allow for adaptation. Inner bounds follow from non-adaptive achievability schemes of the corresponding one-way channel models., Comment: submitted to IEEE Trans. on Information Theory, June 26, 2012. Portions have appeared in Allerton 2011, ISIT 2012, Allerton 2012. This new version was revised and the revision was re-submitted to IEEE Trans. on Information Theory on July 5, 2013
- Published
- 2012
- Full Text
- View/download PDF
29. Lattice codes for the Gaussian relay channel: Decode-and-Forward and Compress-and-Forward
- Author
-
Song, Yiwei and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
Lattice codes are known to achieve capacity in the Gaussian point-to-point channel, achieving the same rates as independent, identically distributed (i.i.d.) random Gaussian codebooks. Lattice codes are also known to outperform random codes for certain channel models that are able to exploit their linearity. In this work, we show that lattice codes may be used to achieve the same performance as known i.i.d. Gaussian random coding techniques for the Gaussian relay channel, and show several examples of how this may be combined with the linearity of lattices codes in multi-source relay networks. In particular, we present a nested lattice list decoding technique, by which, lattice codes are shown to achieve the Decode-and-Forward (DF) rate of single source, single destination Gaussian relay channels with one or more relays. We next present two examples of how this DF scheme may be combined with the linearity of lattice codes to achieve new rate regions which for some channel conditions outperform analogous known Gaussian random coding techniques in multi-source relay channels. That is, we derive a new achievable rate region for the two-way relay channel with direct links and compare it to existing schemes, and derive another achievable rate region for the multiple access relay channel. We furthermore present a lattice Compress-and-Forward (CF) scheme for the Gaussian relay channel which exploits a lattice Wyner-Ziv binning scheme and achieves the same rate as the Cover-El Gamal CF rate evaluated for Gaussian random codes. These results suggest that structured/lattice codes may be used to mimic, and sometimes outperform, random Gaussian codes in general Gaussian networks., Comment: submitted to IEEE Transactions on Information Theory, October 30, 2011. Revised October 15, 2012
- Published
- 2011
30. On the Capacity of the Interference Channel with a Cognitive Relay
- Author
-
Rini, Stefano, Tuninetti, Daniela, Devroye, Natasha, and Goldsmith, Andrea
- Subjects
Computer Science - Information Theory - Abstract
The InterFerence Channel with a Cognitive Relay (IFC-CR) consists of the classical interference channel with two independent source-destination pairs whose communication is aided by an additional node, referred to as the cognitive relay, that has a priori knowledge of both sources' messages. This a priori message knowledge is termed cognition and idealizes the relay learning the messages of the two sources from their transmissions over a wireless channel. This paper presents new inner and outer bounds for the capacity region of the general memoryless IFC-CR that are shown to be tight for a certain class of channels. The new outer bound follows from arguments originally devised for broadcast channels among which Sato's observation that the capacity region of channels with non-cooperative receivers only depends on the channel output conditional marginal distributions. The new inner bound is shown to include all previously proposed coding schemes and it is thus the largest known achievable rate region to date. The new inner and outer bounds coincide for a subset of channel satisfying a strong interference condition. For these channels there is no loss in optimality if both destinations decode both messages. This result parallels analogous results for the classical IFC and for the cognitive IFC and is the first known capacity result for the general IFC-CR. Numerical evaluations of the proposed inner and outer bounds are presented for the Gaussian noise case.
- Published
- 2011
31. A Lattice Compress-and-Forward Scheme
- Author
-
Song, Yiwei and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
We present a nested lattice-code-based strategy that achieves the random-coding based Compress-and-Forward (CF) rate for the three node Gaussian relay channel. To do so, we first outline a lattice-based strategy for the $(X+Z_1,X+Z_2)$ Wyner-Ziv lossy source-coding with side-information problem in Gaussian noise, a re-interpretation of the nested lattice-code-based Gaussian Wyner-Ziv scheme presented by Zamir, Shamai, and Erez. We use the notation $(X+Z_1,X+Z_2)$ Wyner-Ziv to mean that the source is of the form $X+ Z_1$ and the side-information at the receiver is of the form $X+ Z_2$, for independent Gaussian $X, Z_1$ and $Z_2$. We next use this $(X+Z_1,X+Z_2)$ Wyner-Ziv scheme to implement a "structured" or lattice-code-based CF scheme which achieves the classic CF rate for Gaussian relay channels. This suggests that lattice codes may not only be useful in point-to-point single-hop source and channel coding, in multiple access and broadcast channels, but that they may also be useful in larger relay networks. The usage of lattice codes in larger networks is motivated by their structured nature (possibly leading to rate gains) and decoding (relatively simple) being more practically realizable than their random coding based counterparts. We furthermore expect the proposed lattice-based CF scheme to constitute a first step towards a generic structured achievability scheme for networks such as a structured version of the recently introduced "noisy network coding"., Comment: 7 pages, 2 figures
- Published
- 2011
32. Capacity to within 3 bits for a class of Gaussian Interference Channels with a Cognitive Relay
- Author
-
Rini, Stefano, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
The InterFerence Channel with a Cognitive Relay (IFC-CR) consists of a classical two-user interference channel in which the two independent messages are also non-causally known at a cognitive relay node. In this work a special class of IFC-CRs in which the sources do not create interference at the non-intended destinations is analyzed. This special model results in a channel with two non-interfering point-to-point channels whose transmission is aided by an in-band cognitive relay, which is thus referred to as the Parallel Channel with a Cognitive Relay (PC-CR). We determine the capacity of the PC-CR channel to within 3 bits/s/Hz for all channel parameters. In particular, we present several new outer bounds which we achieve to within a constant gap by proper selection of Gaussian input distributions in a simple rate-splitting and superposition coding-based inner bound. The inner and outer bounds are numerically evaluated to show that the actual gap can be far less than 3 bits/s/Hz.
- Published
- 2011
33. A New Capacity Result for the Z-Gaussian Cognitive Interference Channel
- Author
-
Rini, Stefano, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
This work proposes a novel outer bound for the Gaussian cognitive interference channel in strong interference at the primary receiver based on the capacity of a multi-antenna broadcast channel with degraded message set. It then shows that for the Z-channel, i.e., when the secondary receiver experiences no interference and the primary receiver experiences strong interference, the proposed outer bound not only is the tightest among known bounds but is actually achievable for sufficiently strong interference. The latter is a novel capacity result that from numerical evaluations appears to be generalizable to a larger (i.e., non-Z) class of Gaussian channels.
- Published
- 2011
34. The Capacity of the Interference Channel with a Cognitive Relay in Very Strong Interference
- Author
-
Riniy, Stefano, Tuninetti, Daniela, Devroye, Natasha, and Goldsmith, Andrea
- Subjects
Computer Science - Information Theory - Abstract
The interference channel with a cognitive relay consists of a classical interference channel with two sourcedestination pairs and with an additional cognitive relay that has a priori knowledge of the sources' messages and aids in the sources' transmission. We derive a new outer bound for this channel using an argument originally devised for the "more capable" broadcast channel, and show the achievability of the proposed outer bound in the "very strong interference" regime, a class of channels where there is no loss in optimality if both destinations decode both messages. This result is analogous to the "very strong interference" capacity result for the classical interference channel and for the cognitive interference channel, and is the first capacity known capacity result for the general interference channel with a cognitive relay.
- Published
- 2011
35. Structured interference-mitigation in two-hop networks
- Author
-
Song, Yiwei and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
We consider two-hop S-R-D Gaussian networks with a source (S), a relay (R) and a destination (D), some of which experience additive interference. This additive interference, which renders the channels state-dependent, is either a) experienced at the destination D and known non-causally at the source S, or b) experienced at the relay R and known at the destination D. In both cases, one would hope to exploit this knowledge of the channel state at some of the nodes to obtain "clean" or interference-free channels, just as Costa's dirty-paper coding does for one-hop channels with state non-causally known to the transmitter. We demonstrate a scheme which achieves to within 0.5 bit of a "clean" channel. This novel scheme is based on nested-lattice code and a Decode-and-Forward (DF) relay. Intuitively, this strategy uses the structure provided by nested lattice codes to cancel the "integer" (or lattice quantized) part of the interference and treats the "residual" (or quantization noise) as noise., Comment: 6 pages, 3 figures, to be presented at ITA 2011
- Published
- 2011
36. Inner and Outer Bounds for the Gaussian Cognitive Interference Channel and New Capacity Results
- Author
-
Rini, Stefano, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
The capacity of the Gaussian cognitive interference channel, a variation of the classical two-user interference channel where one of the transmitters (referred to as cognitive) has knowledge of both messages, is known in several parameter regimes but remains unknown in general. In this paper we provide a comparative overview of this channel model as we proceed through our contributions: we present a new outer bound based on the idea of a broadcast channel with degraded message sets, and another series of outer bounds obtained by transforming the cognitive channel into channels with known capacity. We specialize the largest known inner bound derived for the discrete memoryless channel to the Gaussian noise channel and present several simplified schemes evaluated for Gaussian inputs in closed form which we use to prove a number of results. These include a new set of capacity results for the a) "primary decodes cognitive" regime, a subset of the "strong interference" regime that is not included in the "very strong interference" regime for which capacity was known, and for the b) "S-channel" in which the primary transmitter does not interfere with the cognitive receiver. Next, for a general Gaussian cognitive interference channel, we determine the capacity to within one bit/s/Hz and to within a factor two regardless of channel parameters, thus establishing rate performance guarantees at high and low SNR, respectively. We also show how different simplified transmission schemes achieve a constant gap between inner and outer bound for specific channels. Finally, we numerically evaluate and compare the various simplified achievable rate regions and outer bounds in parameter regimes where capacity is unknown, leading to further insight on the capacity region of the Gaussian cognitive interference channel., Comment: submitted to IEEE transaction of Information Theory
- Published
- 2010
- Full Text
- View/download PDF
37. List decoding for nested lattices and applications to relay channels
- Author
-
Song, Yiwei and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
We demonstrate a decoding scheme for nested lattice codes which is able to decode a list of a particular size which contains the transmitted codeword with high probability. This list decoder is analogous to that used in random coding arguments in achievability schemes of relay channels, and allows for the effective combination of information from the relay and source node. Using this list decoding result, we demonstrate 1) that lattice codes may achieve the capacity of the physically degraded AWGN relay channel, 2) an achievable rate region for the two-way relay channel with direct links using lattice codes, and 3) that we may improve the constant gap to capacity for specific cases of the two-way relay channel with direct links., Comment: 8 pages; presented at Allerton 2010
- Published
- 2010
38. The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel
- Author
-
Rini, Stefano, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
The cognitive interference channel (C-IFC) consists of a classical two-user interference channel in which the message of one user (the "primary" user) is non-causally available at the transmitter of the other user (the "cognitive" user). We obtain the capacity of the semi-deterministic C-IFC: a discrete memoryless C-IFC in which the cognitive receiver output is a noise-less deterministic function of the channel inputs. We then use the insights obtained from the capacity-achieving scheme for the semi-deterministic model to derive new, unified and tighter constant gap results for the complex-valued Gaussian C-IFC. We prove: (1) a constant additive gap (difference between inner and outer bounds) of half a bit/sec/Hz per real dimension, of relevance at high SNRs, and (b) a constant multiplicative gap (ratio between outer and inner bounds) of a factor two, of relevance at low SNRs, Comment: submitted to IEEE International Conference on Communications ICC2011, Kyoto, Japan
- Published
- 2010
- Full Text
- View/download PDF
39. New Results on the Capacity of the Gaussian Cognitive Interference Channel
- Author
-
Rini, Stefano, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
The capacity of the two-user Gaussian cognitive interference channel, a variation of the classical interference channel where one of the transmitters has knowledge of both messages, is known in several parameter regimes but remains unknown in general. In this paper, we consider the following achievable scheme: the cognitive transmitter pre-codes its message against the interference created at its intended receiver by the primary user, and the cognitive receiver only decodes its intended message, similar to the optimal scheme for "weak interference"; the primary decoder decodes both messages, similar to the optimal scheme for "very strong interference". Although the cognitive message is pre-coded against the primary message, by decoding it, the primary receiver obtains information about its own message, thereby improving its rate. We show: (1) that this proposed scheme achieves capacity in what we term the "primary decodes cognitive" regime, i.e., a subset of the "strong interference" regime that is not included in the "very strong interference" regime for which capacity was known; (2) that this scheme is within one bit/s/Hz, or a factor two, of capacity for a much larger set of parameters, thus improving the best known constant gap result; (3) we provide insights into the trade-off between interference pre-coding at the cognitive encoder and interference decoding at the primary receiver based on the analysis of the approximate capacity results.
- Published
- 2010
40. Outer Bounds for the Interference Channel with a Cognitive Relay
- Author
-
Rini, Stefano, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
In this paper, we first present an outer bound for a general interference channel with a cognitive relay, i.e., a relay that has non-causal knowledge of both independent messages transmitted in the interference channel. This outer bound reduces to the capacity region of the deterministic broadcast channel and of the deterministic cognitive interference channel through nulling of certain channel inputs. It does not, however, reduce to that of certain deterministic interference channels for which capacity is known. As such, we subsequently tighten the bound for channels whose outputs satisfy an "invertibility" condition. This second outer bound now reduces to the capacity of this special class of deterministic interference channels. The second outer bound is further tightened for the high SNR deterministic approximation of the Gaussian interference channel with a cognitive relay by exploiting the special structure of the interference. We provide an example that suggests that this third bound is tight in at least some parameter regimes for the high SNR deterministic approximation of the Gaussian channel. Another example shows that the third bound is capacity in the special case where there are no direct links between the non-cognitive transmitters.
- Published
- 2010
41. New inner and outer bounds for the discrete memoryless cognitive interference channel and some capacity results
- Author
-
Rini, Stefano, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
The cognitive interference channel is an interference channel in which one transmitter is non-causally provided with the message of the other transmitter. This channel model has been extensively studied in the past years and capacity results for certain classes of channels have been proved. In this paper we present new inner and outer bounds for the capacity region of the cognitive interference channel as well as new capacity results. Previously proposed outer bounds are expressed in terms of auxiliary random variables for which no cardinality constraint is known. Consequently it is not possible to evaluate such outer bounds explicitly for a given channel model. The outer bound we derive is based on an idea originally devised by Sato for the broadcast channel and does not contain auxiliary random variables, allowing it to be more easily evaluated. The inner bound we derive is the largest known to date and is explicitly shown to include all previously proposed achievable rate regions. This comparison highlights which features of the transmission scheme - which includes rate-splitting, superposition coding, a broadcast channel-like binning scheme, and Gel'fand Pinsker coding - are most effective in approaching capacity. We next present new capacity results for a class of discrete memoryless channels that we term the "better cognitive decoding regime" which includes all previously known regimes in which capacity results have been derived as special cases. Finally, we determine the capacity region of the semi-deterministic cognitive interference channel, in which the signal at the cognitive receiver is a deterministic function of the channel inputs.
- Published
- 2010
42. Achievable rate regions and outer bounds for a multi-pair bi-directional relay network
- Author
-
Kim, Sang Joon, Smida, Besma, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
In a bi-directional relay channel, a pair of nodes wish to exchange independent messages over a shared wireless half-duplex channel with the help of relays. Recent work has mostly considered information theoretic limits of the bi-directional relay channel with two terminal nodes (or end users) and one relay. In this work we consider bi-directional relaying with one base station, multiple terminal nodes and one relay, all of which operate in half-duplex modes. We assume that each terminal node communicates with the base-station in a bi-directional fashion through the relay and do not place any restrictions on the channels between the users, relays and base-stations; that is, each node has a direct link with every other node. Our contributions are three-fold: 1) the introduction of four new temporal protocols which fully exploit the two-way nature of the data and outperform simple routing or multi-hop communication schemes by carefully combining network coding, random binning and user cooperation which exploit over-heard and own-message side information, 2) derivations of inner and outer bounds on the capacity region of the discrete-memoryless multi-pair two-way network, and 3) a numerical evaluation of the obtained achievable rate regions and outer bounds in Gaussian noise which illustrate the performance of the proposed protocols compared to simpler schemes, to each other, to the outer bounds, which highlight the relative gains achieved by network coding, random binning and compress-and-forward-type cooperation between terminal nodes., Comment: 61 pages, 12 figures, will be submitted to IEEE info theory
- Published
- 2010
43. State of the cognitive interference channel: a new unified inner bound
- Author
-
Rini, Stefano, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
Computer Science - Information Theory - Abstract
The capacity region of the interference channel in which one transmitter non-causally knows the message of the other, termed the cognitive interference channel, has remained open since its inception in 2005. A number of subtly differing achievable rate regions and outer bounds have been derived, some of which are tight under specific conditions. In this work we present a new unified inner bound for the discrete memoryless cognitive interference channel. We show explicitly how it encompasses all known discrete memoryless achievable rate regions as special cases. The presented achievable region was recently used in deriving the capacity region of the general deterministic cognitive interference channel, and thus also the linear high-SNR deterministic approximation of the Gaussian cognitive interference channel. The high-SNR deterministic approximation was then used to obtain the capacity of the Gaussian cognitive interference channel to within 1.87 bits., Comment: Presented at the 2010 International Zurich Seminar on Communications - an 2nd updated version.
- Published
- 2009
44. Improved Capacity Scaling in Wireless Networks With Infrastructure
- Author
-
Shin, Won-Yong, Jeon, Sang-Woon, Devroye, Natasha, Vu, Mai H., Chung, Sae-Young, Lee, Yong H., and Tarokh, Vahid
- Subjects
Computer Science - Information Theory - Abstract
This paper analyzes the impact and benefits of infrastructure support in improving the throughput scaling in networks of $n$ randomly located wireless nodes. The infrastructure uses multi-antenna base stations (BSs), in which the number of BSs and the number of antennas at each BS can scale at arbitrary rates relative to $n$. Under the model, capacity scaling laws are analyzed for both dense and extended networks. Two BS-based routing schemes are first introduced in this study: an infrastructure-supported single-hop (ISH) routing protocol with multiple-access uplink and broadcast downlink and an infrastructure-supported multi-hop (IMH) routing protocol. Then, their achievable throughput scalings are analyzed. These schemes are compared against two conventional schemes without BSs: the multi-hop (MH) transmission and hierarchical cooperation (HC) schemes. It is shown that a linear throughput scaling is achieved in dense networks, as in the case without help of BSs. In contrast, the proposed BS-based routing schemes can, under realistic network conditions, improve the throughput scaling significantly in extended networks. The gain comes from the following advantages of these BS-based protocols. First, more nodes can transmit simultaneously in the proposed scheme than in the MH scheme if the number of BSs and the number of antennas are large enough. Second, by improving the long-distance signal-to-noise ratio (SNR), the received signal power can be larger than that of the HC, enabling a better throughput scaling under extended networks. Furthermore, by deriving the corresponding information-theoretic cut-set upper bounds, it is shown under extended networks that a combination of four schemes IMH, ISH, MH, and HC is order-optimal in all operating regimes., Comment: 26 pages, 10 figures, 1 table, Under revision for IEEE Transactions on Information Theory
- Published
- 2008
- Full Text
- View/download PDF
45. Bi-directional half-duplex protocols with multiple relays
- Author
-
Kim, Sang Joon, Devroye, Natasha, and Tarokh, Vahid
- Subjects
Computer Science - Information Theory - Abstract
In a bi-directional relay channel, two nodes wish to exchange independent messages over a shared wireless half-duplex channel with the help of relays. Recent work has considered information theoretic limits of the bi-directional relay channel with a single relay. In this work we consider bi-directional relaying with multiple relays. We derive achievable rate regions and outer bounds for half-duplex protocols with multiple decode and forward relays and compare these to the same protocols with amplify and forward relays in an additive white Gaussian noise channel. We consider three novel classes of half-duplex protocols: the (m,2) 2 phase protocol with m relays, the (m,3) 3 phase protocol with m relays, and general (m, t) Multiple Hops and Multiple Relays (MHMR) protocols, where m is the total number of relays and 3
- Published
- 2008
46. Achievable rate regions for bi-directional relaying
- Author
-
Kim, Sang Joon, Devroye, Natasha, Mitran, Patrick, and Tarokh, Vahid
- Subjects
Computer Science - Information Theory - Abstract
In a bi-directional relay channel, two nodes wish to exchange independent messages over a shared wireless half-duplex channel with the help of a relay. In this paper, we derive achievable rate regions for four new half-duplex protocols and compare these to four existing half-duplex protocols and outer bounds. In time, our protocols consist of either two or three phases. In the two phase protocols, both users simultaneously transmit during the first phase and the relay alone transmits during the second phase, while in the three phase protocol the two users sequentially transmit followed by a transmission from the relay. The relay may forward information in one of four manners; we outline existing Amplify and Forward (AF), Decode and Forward (DF) and Compress and Forward (CF) relaying schemes and introduce the novel Mixed Forward scheme. The latter is a combination of CF in one direction and DF in the other. We derive achievable rate regions for the CF and Mixed relaying schemes for the two and three phase protocols. In the last part of this work we provide a comprehensive treatment of 8 possible half-duplex bi-directional relaying protocols in Gaussian noise, obtaining their respective achievable rate regions, outer bounds, and their relative performance under different SNR and relay geometries., Comment: 42 pages, 17 figures
- Published
- 2008
47. Cognitive Networks Achieve Throughput Scaling of a Homogeneous Network
- Author
-
Jeon, Sang-Woon, Devroye, Natasha, Vu, Mai, Chung, Sae-Young, and Tarokh, Vahid
- Subjects
Computer Science - Information Theory - Abstract
We study two distinct, but overlapping, networks that operate at the same time, space, and frequency. The first network consists of $n$ randomly distributed \emph{primary users}, which form either an ad hoc network, or an infrastructure-supported ad hoc network with $l$ additional base stations. The second network consists of $m$ randomly distributed, ad hoc secondary users or cognitive users. The primary users have priority access to the spectrum and do not need to change their communication protocol in the presence of secondary users. The secondary users, however, need to adjust their protocol based on knowledge about the locations of the primary nodes to bring little loss to the primary network's throughput. By introducing preservation regions around primary receivers and avoidance regions around primary base stations, we propose two modified multihop routing protocols for the cognitive users. Base on percolation theory, we show that when the secondary network is denser than the primary network, both networks can simultaneously achieve the same throughput scaling law as a stand-alone network. Furthermore, the primary network throughput is subject to only a vanishingly fractional loss. Specifically, for the ad hoc and the infrastructure-supported primary models, the primary network achieves sum throughputs of order $n^{1/2}$ and $\max\{n^{1/2},l\}$, respectively. For both primary network models, for any $\delta>0$, the secondary network can achieve sum throughput of order $m^{1/2-\delta}$ with an arbitrarily small fraction of outage. Thus, almost all secondary source-destination pairs can communicate at a rate of order $m^{-1/2-\delta}$., Comment: 28 pages, 12 figures, submitted to IEEE Trans. on Information Theory
- Published
- 2008
- Full Text
- View/download PDF
48. On the Degrees of Freedom in Cognitive Radio Channels
- Author
-
Devroye, Natasha and Tarokh, Vahid
- Subjects
Computer Science - Information Theory - Abstract
After receiving useful peer comments, we would like to withdraw this paper., Comment: After receiving useful peer comments, we would like to withdraw this paper
- Published
- 2007
49. Scaling Laws of Cognitive Networks
- Author
-
Vu, Mai, Devroye, Natasha, Sharif, Masoud, and Tarokh, Vahid
- Subjects
Computer Science - Information Theory - Abstract
We consider a cognitive network consisting of n random pairs of cognitive transmitters and receivers communicating simultaneously in the presence of multiple primary users. Of interest is how the maximum throughput achieved by the cognitive users scales with n. Furthermore, how far these users must be from a primary user to guarantee a given primary outage. Two scenarios are considered for the network scaling law: (i) when each cognitive transmitter uses constant power to communicate with a cognitive receiver at a bounded distance away, and (ii) when each cognitive transmitter scales its power according to the distance to a considered primary user, allowing the cognitive transmitter-receiver distances to grow. Using single-hop transmission, suitable for cognitive devices of opportunistic nature, we show that, in both scenarios, with path loss larger than 2, the cognitive network throughput scales linearly with the number of cognitive users. We then explore the radius of a primary exclusive region void of cognitive transmitters. We obtain bounds on this radius for a given primary outage constraint. These bounds can help in the design of a primary network with exclusive regions, outside of which cognitive users may transmit freely. Our results show that opportunistic secondary spectrum access using single-hop transmission is promising., Comment: significantly revised and extended, 30 pages, 13 figures, submitted to IEEE Journal of Special Topics in Signal Processing
- Published
- 2007
- Full Text
- View/download PDF
50. The Multiplexing Gain of MIMO X-Channels with Partial Transmit Side-Information
- Author
-
Devroye, Natasha and Sharif, Masoud
- Subjects
Computer Science - Information Theory - Abstract
In this paper, we obtain the scaling laws of the sum-rate capacity of a MIMO X-channel, a 2 independent sender, 2 independent receiver channel with messages from each transmitter to each receiver, at high signal to noise ratios (SNR). The X-channel has sparked recent interest in the context of cooperative networks and it encompasses the interference, multiple access, and broadcast channels as special cases. Here, we consider the case with partially cooperative transmitters in which only partial and asymmetric side-information is available at one of the transmitters. It is proved that when there are M antennas at all four nodes, the sum-rate scales like 2Mlog(SNR) which is in sharp contrast to [\lfloor 4M/3 \rfloor,4M/3]log(SNR) for non-cooperative X-channels \cite{maddah-ali,jafar_degrees}. This further proves that, in terms of sum-rate scaling at high SNR, partial side-information at one of the transmitters and full side-information at both transmitters are equivalent in the MIMO X-channel., Comment: 5 pages, 3 figures, submitted to ISIT 2007
- Published
- 2007
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.