Capacity-Achieving Coding Scheme for the MAC with Degraded Message Sets and Feedback

Oron Sabag, Haim H. Permuter, Shlomo Shamai Shitz

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The multiple access channel (MAC) with degraded message sets and feedback is considered. We show that feedback does not increase the capacity region of this setting, and present a capacity-achieving coding scheme. The coding scheme is inspired by the posterior matching principle for the memoryless channel, but for two transmitters. It is shown that the recursive design of the transmitters and decoder is also maintained in this multiuser setting, leading to a constructive and simple coding scheme. It is interesting to note that the weak transmitter performs its encoding with respect to the decoder's belief as expected, but the strong encoder performs its encoding with respect to the weak encoder's belief and not the decoder's belief. To the best of our knowledge, this is the first matching scheme for a multi-user setting with finite alphabets and feedback.

Original languageEnglish
Title of host publication2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2259-2263
Number of pages5
ISBN (Electronic)9781538692912
DOIs
StatePublished - 1 Jul 2019
Event2019 IEEE International Symposium on Information Theory, ISIT 2019 - Paris, France
Duration: 7 Jul 201912 Jul 2019

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
Volume2019-July
ISSN (Print)2157-8095

Conference

Conference2019 IEEE International Symposium on Information Theory, ISIT 2019
Country/TerritoryFrance
CityParis
Period7/07/1912/07/19

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Capacity-Achieving Coding Scheme for the MAC with Degraded Message Sets and Feedback'. Together they form a unique fingerprint.

Cite this