On the deterministic-code capacity of the two-user discrete memoryless arbitrarily varying general broadcast channel with degraded message sets

Eran Hof, Shraga I. Bross

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

An inner bound on the deterministic-code capacity region of the two-user discrete memoryless arbitrarily varying general broadcast channel (AVGBC) was characterized by Jahn, assuming that the common message capacity is nonzero; however, he did not indicate how one could decide whether the latter capacity is positive. Csiszár and Narayan's result for the single-user AVC establishes the missing part in Jahn's characterization. Nevertheless, being based on Ahlswede's elimination technique, Jahn's characterization is not applicable for symmetrizable channels under state constraint. Here, the various notions of symmetrizability for the two-user broadcast AVC are defined. Sufficient nonsymmetrizability condition that renders the common message capacity of the AVGBC positive is identified using an approach different from Jahn's. The decoding rules we use establish an achievable region under state and input constraints for the family of degraded message sets codes over the AVGBC.

Original languageEnglish
Title of host publication2006 IEEE 24th Convention of Electrical and Electronics Engineers in Israel, IEEEI
Pages141-145
Number of pages5
DOIs
StatePublished - 2006
Externally publishedYes
Event2006 IEEE 24th Convention of Electrical and Electronics Engineers in Israel, IEEEI - Eilat, Israel
Duration: 15 Nov 200617 Nov 2006

Publication series

NameIEEE Convention of Electrical and Electronics Engineers in Israel, Proceedings

Conference

Conference2006 IEEE 24th Convention of Electrical and Electronics Engineers in Israel, IEEEI
Country/TerritoryIsrael
CityEilat
Period15/11/0617/11/06

Fingerprint

Dive into the research topics of 'On the deterministic-code capacity of the two-user discrete memoryless arbitrarily varying general broadcast channel with degraded message sets'. Together they form a unique fingerprint.

Cite this