|
[1] A. Jovicic, H. Wang, and P. Viswanath, “On network interference management,” IEEE Transactions on Information Theory, vol. 56, no. 10, pp. 4941–4955, 2010. [2] H. T. Sun and K. Kobayashi, “A new achievable rate region for the interference channel,” IEEE transactions on information theory, vol. 27, no. 1, pp. 49–60, 1981. [3] G. Bresler, A. Parekh, and N. David, “The approximate capacity of the many-to-one and one-to-many gaussian interference channels,” IEEE Transactions on Information Theory, vol. 56, no. 9, pp. 4566–4592, 2010. [4] U. Erez and R. Zamir, “Achieving 1/2 log (1+ snr) on the awgn channel with lattice encoding and decoding,” IEEE Transactions on Information Theory, vol. 50, no. 10, pp. 2293–2314, 2004. [5] “3GPP,TR 36.872 (VI2.1.0):Small cell enhancements for E-UTRA and E-UTRAN-Physical layer aspects.” [6] R. H. Etkin, N. David, and H. Wang, “Gaussian interference channel capacity to within one bit,” IEEE Transactions on information theory, vol. 54, no. 12, pp. 5534–5562, 2008. [7] V. R. Cadambe and S. A. Jafar, “Interference alignment and degrees of freedom of the-user interference channel,” IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3425–3441, 2008. [8] “3GPP, R1-122826:Ericsson, ST-Ericsson,” 2012. [9] S.-W. Jeon and C. Suh, “Degrees of freedom of uplink-downlink multiantenna cellular networks.” Information Theory (ISIT), 2014 IEEE International Symposium on. IEEE, 2014. [10] X. H. Chongning Na and H. Jiang, “Interference alignment based dynamic TDD for small cells.” Globecom Workshops (GC Wkshps), 2014. IEEE, 2014. [11] L. Sanguinetti, A. L. Moustakas, and M. Debbah, “Interference management in 5g reverse tdd hetnets with wireless backhaul: A large system analysis,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 6, pp. 1187–1200, 2015. [12] A. E. Gamal and Y.-H. Kim, Network information theory. Cambridge university press, 2011. [13] C. E. Shannon et al., “Two-way communication channels,” in Proc. 4th Berkeley Symp. Math. Stat. Prob, vol. 1. Citeseer, 1961, pp. 611–644. [14] E. C. V. D. Meulen, “The discrete memoryless channel with two senders and one receiver,” in Proc. IEEE Int. Symp. Information Theory (ISIT), 1971, p. 78. [15] A. E. Gamal and T. M. Cover, “Multiple user information theory,” Proceedings of the IEEE, vol. 68, no. 12, pp. 1466–1483, 1980. [16] T. Cover, “Broadcast channels,” IEEE Transactions on Information Theory, vol. 18, no. 1, pp. 2–14, 1972. [17] P. Bergmans, “Random coding theorem for broadcast channels with degraded components,” IEEE Transactions on Information Theory, vol. 19, no. 2, pp. 197–207, 1973. [18] R. G. Gallager, “Capacity and coding for degraded broadcast channels,” Problemy Peredachi Informatsii, vol. 10, no. 3, pp. 3–14, 1974. [19] R. Ahlswede, “The capacity region of a channel with two senders and two receivers,” The Annals of Probability, pp. 805–814, 1974. [20] H. Sato, “The capacity of the gaussian interference channel under strong interference (corresp.),” IEEE transactions on information theory, vol. 27, no. 6, pp. 786–788, 1981. [21] V. S. Annapureddy and V. V. Veeravalli, “Gaussian interference networks: Sum capacity in the low interference regime and new outer bounds on the capacity region,” IEEE Transactions on Information Theory, vol. 55, no. 7, pp. 3032–3050, 2009. [22] G. Kramer, “Outer bounds on the capacity of gaussian interference channels,” IEEE transactions on information theory, vol. 50, no. 3, pp. 581–586, 2004. [23] S. Avestimehr, S. Diggavi, and D. Tse, “Wireless network information flow: a deterministic approach,” arXiv preprint arXiv:0906.5394, 2009. [24] G. Bresler and D. Tse, “The two-user gaussian interference channel: a deterministic view,” European transactions on telecommunications, vol. 19, no. 4, pp. 333–354, 2008. [25] R. de Buda, “Some optimal codes have structure,” IEEE Journal on Selected Areas in Communications, vol. 7, no. 6, pp. 893–899, 1989. [26] H.-A. Loeliger, “Averaging bounds for lattices and linear codes,” IEEE Transactions on Information Theory, vol. 43, no. 6, pp. 1767–1773, 1997. [27] R. Urbanke and B. Rimoldi, “Lattice codes can achieve capacity on the awgn channel,” IEEE transactions on Information Theory, vol. 44, no. 1, pp. 273–278, 1998.[28] G. Poltyrev, “On coding without restrictions for the awgn channel,” IEEE Transactions on Information Theory, vol. 40, no. 2, pp. 409–417, 1994. [29] J. Conway and N. Sloane, “Voronoi regions of lattices, second moments of polytopes, and quantization,” IEEE Transactions on Information Theory, vol. 28, no. 2, pp. 211–226, 1982. [30] G. D. Forney, “Multidimensional constellations. ii. voronoi constellations,” IEEE Journal on Selected Areas in Communications, vol. 7, no. 6, pp. 941–958, 1989. [31] U. Erez and R. Zamir, “A modulo-lattice transformation for multiple-access channels,” in Electrical and Electronics Engineers in Israel, 2008 IEEE 25th Convention of, 2008. [32] X. Chu, D. López-Pérez, Y. Yang, and F. Gunnarsson, Heterogeneous Cellular Networks: Theory, Simulation and Deployment. Cambridge University Press, 2013. [33] B. Nazer and M. Gastpar, “Compute-and-forward: Harnessing interference through structured codes,” IEEE Transactions on Information Theory, vol. 57, no. 10, pp. 6463–6486, 2011. [34] “3GPP TR 36.828: Evolved Universal Terrestrial Radio Access (E-UTRA); Further enhancements to LTE Time Division Duplex (TDD) for Downlink-Uplink (DL-UL) interference management and traffic adaptation.”
|