Publication | Closed Access
Graph theoretic approaches to the code construction for the two-user multiple- access binary adder channel
44
Citations
27
References
1983
Year
EngineeringGraph Theoretic ApproachesComputational ComplexityCommunication ComplexityChannel CodingSoftware AnalysisLower BoundsHardware SecurityJoint Source-channel CodingCoding TheoryAlgebraic Coding TheoryIndependent Set ProblemComputer EngineeringComputer ScienceCryptographyTheory Of ComputingGraph TheoryProgram AnalysisCode ConstructionFormal MethodsLinear Network CodingChannel Access MethodMulti-terminal Information TheorySystem Software
We relate coding for the two-user multiple-access binary adder channel to a problem in graph theory, known as the independent set problem. Graph-theoretic approaches to coding for both synchronized and nonsynchronized two-user adder channels are presented. Using the Tuŕan theorem on the independence number of a simple graph, we are able to improve the lower bounds on the achievable rates of uniquely and <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">\delta</tex> -decodable codes for the synchronized adder channel derived by Kasami and Lin. We are also able to derive lower bounds on the achievable rates of uniquely decodable codes for the nonsynchronized adder channel. We show that the rates of Deaett-Wolf codes for the nonsynchronized adder channel fall below the bounds. Synchronizing sequences for the nonsynchronized adder channel are constructed.
| Year | Citations | |
|---|---|---|
Page 1
Page 1