Cascade, triangular and two way source coding with degraded side information at the second user

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

We consider the Cascade and Triangular ratedistortion problems where the same side information is available at the source node and User 1, and the side information available at User 2 is a degraded version of the side information at the source node and User 1. We characterize the rate-distortion region for these problems. For the Cascade setup, we showed that, at User 1, decoding and re-binning the codeword sent by the source node for User 2 is optimum. We then extend our results to the Two way Cascade and Triangular settings, where the source node is interested in lossy reconstruction of the side information at User 2 via a rate limited link from User 2 to the source node. We characterize the rate distortion regions for these settings. Next, we evaluate our regions in the Quadratic Gaussian Cascade and Triangular settings, and obtain characterizations of these settings in the form tractable low dimensional optimization problems.

Original languageEnglish
Title of host publication2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
Pages760-767
Number of pages8
DOIs
StatePublished - 1 Dec 2010
Event48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010 - Monticello, IL, United States
Duration: 29 Sep 20101 Oct 2010

Publication series

Name2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010

Conference

Conference48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
Country/TerritoryUnited States
CityMonticello, IL
Period29/09/101/10/10

Keywords

  • Cascade source coding
  • Quadratic Qaussian
  • Triangular source coding
  • Two way source coding

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Cascade, triangular and two way source coding with degraded side information at the second user'. Together they form a unique fingerprint.

Cite this