Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-8bhkd Total loading time: 0 Render date: 2024-11-19T09:19:29.543Z Has data issue: true hasContentIssue false

References

Published online by Cambridge University Press:  01 February 2018

Jan Sykora
Affiliation:
Czech Technical University in Prague
Alister Burr
Affiliation:
University of York
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] “RFC 1122: Requirements for internet hosts – communication layers.”
[2] “ISO/IEC standard 7498-1:1994,” 1994.
[3] “FP7 project DIWINE (Dense Cooperative Wireless Cloud Network),” 2013. [Online]. Available: http://diwine-project.eu/public/
[4] R., Ahlswede, “Multi-way communication channels,” in 2nd Int. Symp. on Information Theory, 1971.
[5] R., Ahlswede, N., Cai, S.-Y. R., Li, and R. W., Yeung, “Network information flow,” IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204–1216, 2000.
[6] A., Behboodi and P., Piantanida, “Mixed noisy network coding and cooperative unicasting in wireless networks,” IEEE Trans. Inf. Theory, vol. 61, no. 1, pp. 189–222, 2015.
[7] S. S., Bidokhti and V. M., Prabhakaran, “Is non-unique decoding necessary?IEEE Trans. Inf. Theory, vol. 60, no. 5, pp. 2594–2610, 2014.
[8] R. E., Blahut, Algebraic Codes for Data Transmission. Cambridge University Press, 2003.
[9] M., Conti and S., Giordano, “Multihop ad hoc networking: The theory,” IEEE Commun. Mag., vol. 45, no. 4, pp. 78–86, 2007.
[10] J. H., Conway and N. J. A., Sloane, Sphere Packings, Lattices and Groups, 3rd edn. Springer, 1999.
[11] T. M., Cover, “Broadcast channels,” IEEE Trans. Inf. Theory, vol. 18, no. 1, pp. 2–14, 1972.
[12] T. M., Cover and A. E., Gamal, “Capacity theorems for the relay channel,” IEEE Trans. Inf. Theory, vol. 25, no. 5, pp. 572–584, 1979.
[13] T. M., Cover and J. A., Thomas, Elements of Information Theory, 2nd edn. John Wiley & Sons, 2006.
[14] P., Elias, A., Feinstein, and C. E., Shannon, “A note on the maximum flow through a network,” IEEE Trans. Inf. Theory, vol. 2, no. 4, pp. 117–119, 1956.
[15] U., Erez, S., Litsyn, and R., Zamir, “Lattices which are good for (almost) everything,” IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3401–3416, 2005.
[16] U., Erez and R., Zamir, “Achieving 1/2 log(1 + SNR) on the AWGN channel with lattice encoding and decoding,” IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293–2314, 2004.
[17] C., Feng, D., Silva, and F. R., Kschischang, “An algebraic approach to physical-layer network coding,” IEEE Trans. Inf. Theory, vol. 59, no. 11, pp. 7576–7596, 2013.
[18] A. E., Gamal and Y.-H., Kim, Network Information Theory. Cambridge University Press, 2011.
[19] A., Goldsmith, Wireless Communications. Cambridge University Press, 2005.
[20] P., Gupta and P. R., Kumar, “The capacity of wireless networks,” IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388–404, Mar. 2000.
[21] J., Harshan and B. S., Rajan, “On two-user Gaussian multiple access channels with finite input constellations,” IEEE Trans. Inf. Theory, vol. 57, no. 3, pp. 1299–1327, 2011.
[22] M. H., Hayes, Statistical Digital Signal Processing and Modeling. John Wiley & Sons, 1996.
[23] J., Hou and G., Kramer, “Shortmessage noisy network coding with a decode-forward option,” arXiv:1304.1692 [cs.IT], 2015.
[24] ITU, “The world in 2014,” 2014. [Online]. Available: www.itu.int/en/ITU-D/Statistics/ Documents/facts/ ICTFactsFigures2014-e.pdf
[25] S. M., Kay, Fundamentals of Statistical Signal Processing: Estimation Theory. Prentice- Hall, 1993.
[26] S. M., Kay, Fundamentals of Statistical Signal Processing: Detection Theory. Prentice-Hall, 1998.
[27] R., Koetter and M., Medard, “An algebraic approach to network coding,” IEEE Tran. on Networking, vol. 11, no. 5, pp. 782–795, 2003.
[28] T., Koike-Akino, P., Popovski, and V., Tarokh, “Denoising maps and constellations for wireless network coding in two-way relaying systems,” in Proc. IEEE Global Telecommun. Conf. (GlobeCom), 2008.
[29] T., Koike-Akino, “Adaptive modulation and network coding with optimized precoding in two-way relaying,” in Proc. IEEE Global Telecommun. Conf. (GlobeCom), 2009.
[30] T., Koike-Akino, “Denoising strategy for convolutionally-coded bidirectional relaying,” in Proc. IEEE Internat. Conf. on Commun. (ICC), 2009.
[31] T., Koike-Akino, “Optimized constellations for two-way wireless relaying with physical network coding,” IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 773–787, 2009.
[32] J. N., Laneman, D. N. C., Tse, and G. W., Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062–3080, December 2004.
[33] P., Larsson, N., Johansson, and K.-E., Sunell, “Coded bi-directional relaying,” in 5th Scandinavian WS on Wireless Ad-hoc Networks (AdHoc'o), 2005.
[34] S.-Y. R., Li, R. W., Yeung, and N., Cai, “Linear network coding,” IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371–381, 2003.
[35] H. H. J., Liao, “Multiple access channels,” Ph.D. dissertation.
[36] S. H., Lim, Y.-H., Kim, A. E., Gamal, and S.-Y., Chung, “Noisy network coding,” IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3132–3152, 2011.
[37] H.-A., Loeliger, “Averaging bounds for lattices and linear codes,” IEEE Trans. Inf. Theory, vol. 43, no. 6, pp. 1767–1773, 1997.
[38] L., Lu, T., Wang, S. C., Liew, and S., Zhang, “Implementation of physical-layer network coding,” in Proc. IEEE Internat. Conf. on Commun. (ICC), 2012.
[39] R. J., McEliece, The Theory of Information and Coding, 2nd edn. Cambridge University Press, 2002.
[40] C. D., Meyer, Matrix Analysis and Applied Linear Algebra. SIAM, 2000.
[41] V., Nagesha and S., Kay, “Cramer–Rao lower bounds for complex parameters,” 1991. [Online]. Available: www.ele.uri.edu/faculty/kay.html
[42] B., Nazer, “Successive compute-and-forward,” in International Zurich Seminar on Communication (IZS 2012), 2012.
[43] B., Nazer and M., Gastpar, “Reliable computation over multiple-access channels,” in Proc. Annual Allerton Conf. on Commun., Cont., and Comp., 2005.
[44] B., Nazer, “Computation over multiple-access channels,” IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3498–3516, 2007.
[45] B., Nazer, “Compute-and-forward: Harnessing interference through structured codes,” IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6463–6486, 2011.
[46] B., Nazer, “Reliable physical layer network coding,” Proc. IEEE, vol. 99, no. 3, pp. 438–460, 2011.
[47] O., Ordentlich, U., Erez, and B., Nazer, “The approximate sum capacity of the symmetric Gaussian K-user interference channel,” IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3450–3482, 2014.
[48] A., Papoulis, Probability, Random Variables, and Stochastic Processes, 2nd edn. McGraw- Hill, 1984.
[49] P., Popovski and H., Yomo, “The anti-packets can increase the achievable throughput of a wireless multi-hop network,” in Proc. IEEE Internat. Conf. on Commun. (ICC), 2006.
[50] B., Rankov and A., Wittneben, “Achievable rate regions for the two-way relay channel,” in Proc. IEEE Int. Symp. on Information Theory (ISIT), 2006.
[51] L. L., Scharf, Statistical Signal Processing: Detection, Estimation, and Time Series Analysis. Addison-Wesley, 1991.
[52] P. J., Schreier and L. L., Scharf, Statistical Signal Processing of Complex-Valued Data – The Theory of Improper and Noncircular Signals. Cambridge University Press, 2010.
[53] N., Sommer, M., Feder, and O., Shalvi, “Low-density lattice codes,” IEEE Trans. Inf. Theory, vol. 54, no. 4, pp. 1561–1585, 2008.
[54] J., Sykora, “Tapped delay line model of linear randomly time-variant WSSUS channel,” Electronics Letters, vol. 36, no. 19, pp. 1656–1657, 2000.
[55] J., Sykora, “Hierarchical network transfer function and doubly-greedy half-duplex stage scheduling for WPNC networks,” IEEE Commun. Lett., vol. 19, no. 6, pp. 1029–1032, 2015.
[56] J., Sykora, “Hierarchical pairwise error probability for hierarchical decode and forward strategy in PLNC,” IEEE Commun. Lett., vol. 20, no. 1, pp. 49–52, 2016.
[57] J., Sykora and A., Burr, “Layered design of hierarchical exclusive codebook and its capacity regions for HDF strategy in parametric wireless 2-WRC,” IEEE Trans. Veh. Technol., vol. 60, no. 7, pp. 3241–3252, 2011.
[58] J., Sykora and J., Hejtmanek, “Joint and recursive hierarchical interference cancellation with successive compute & forward decoding,” in COST IC1004 MCM, Aalborg, Denmark, 2014.
[59] C. W., Therrien, Discrete Random Signals and Statistical Signal Processing. Englewood Cliffs, New Jersey: Prentice-Hall, 1992.
[60] P., Valerio, “Internet of things: 50 billion is only the beginning,” 2014. [Online]. Available: www.eetimes.com/document.asp?doc_id=1321229
[61] A. van den, Bos, “A Cramer–Rao lower bound for complex parameters,” IEEE Trans. Signal Process., vol. 42, no. 10, p. 2859, 1994.
[62] R. W., Yeung, Information Theory and Network Coding. Springer, 2008.
[63] R., Zamir, Lattice Coding for Signals and Networks. Cambridge University Press, 2014.
[64] S., Zhang, S. C., Liew, and P. P., Lam, “Hot topic: Physical-layer network coding,” in MobiCom'o, 2006, pp. 358–365.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Jan Sykora, Alister Burr, University of York
  • Book: Wireless Physical Layer Network Coding
  • Online publication: 01 February 2018
  • Chapter DOI: https://doi.org/10.1017/9781316156162.013
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Jan Sykora, Alister Burr, University of York
  • Book: Wireless Physical Layer Network Coding
  • Online publication: 01 February 2018
  • Chapter DOI: https://doi.org/10.1017/9781316156162.013
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Jan Sykora, Alister Burr, University of York
  • Book: Wireless Physical Layer Network Coding
  • Online publication: 01 February 2018
  • Chapter DOI: https://doi.org/10.1017/9781316156162.013
Available formats
×