References
- C. E. Shannon, "A Symbolic Analysis of Relayed Switching Circuits," Trans. AIEE, vol. 57, pp. 713-723, 1938.
- C. E. Shannon, "A Mathematical Theory of Communication," The Bell System Technical Journal, vol. 27, pp. 379-423, 623-656, 1948. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
- R. G. Gallager, Information Theory and Reliable Communication, John Wiley & Sons, Inc. 1968.
- A. E. Gamal and M. Costa, "The Capacity Region of a Class of Deterministic Interference Channels," IEEE Trans. Inf. Theory, vol. 2, March 1982.
- M. H. M. Costa, "On the Gaussian Interference Channel," IEEE Trans. on Inf. Theory, vol. 31, no. 5, September 1985.
- T. M. Cover, J. a. Thomas, Elements of Information Theory, Wiley & Sons, Inc., Publication, 1991.
- T. S. Han and K. Kobayashi, "A New Achievable Rate Region for the Interference Channel," IEEE Trans. Inf. Theory, vol. IT-27, pp. 49-60, Jan. 1981.
- R. G. Gallager, "C. E. Shannon: A Retrospective on His Life, Work, and Impact," IEEE Trans. on Inf. Theory, vol. 47, no. 7, Nov., 2001.
- M. H. Lee, "The History of Jeju Jong Nang Binary Code," IEEE Vehicular Technology Society (VTS) News, vol. 50, no. 1, 2003.
- D. Tse, P. Viswanath, Fundamentals of Wireless Communication, Cambridge University Press, 2005.
- M. H. Lee, X. Jiang, C.H. Choe, S. H. Kim, "Analysis of Jong Nang Multiple Access Channel," International Symposium on Information Theory and its Applications (ISITA), Seoul, Korea, 2006.
- A. Salman, D. Suhas, D. Tse, "A Deterministic Approaches to Wireless Relay Networks," International Symposium on Inf. Theory, Nice, France, June 24-27, 2007.
- G. Bresler, A. Parekh, and D. Tse, "The Approximate Capacity of the Many-to-One and One-to-Many Gaussian Interference Channels," Allerton Conf. on Communi., Control, and Computing, Monticello, IL, September 2007.
- G. Bresler and D.N.C. Tse, "The Two-User Gaussian Interference Channel: A Deterministic View," European Trans. on Telecommuni, June 2008.
- D. Tse and R. Yates, "Fading Broadcast Channels with State Information at the Receivers," Allerton Conference on Computing and Control, Sep. 2008.
- S. Sridharan, A. Jafarian, S. Vishwanath, S. A. Jafar, S. Shamai, "A Layered Lattice Coding Scheme for a Class of Three User Gaussian Interference Channels," Forty-Sixth Annual Allerton Conference, UIUC, Illinois, USA, Sept. 23-26, 2008.
- R. Etkin, D. N. C. Tse, and H. Wang, "Gaussian Interference Channel Capacity to within One Bit," IEEE Trans. Inf. Theory, vol. 54, pp. 5534-5562, Dec. 2008. https://doi.org/10.1109/TIT.2008.2006447
- Ke-Lin Du, M. N. S. Swamy, Wireless Communication Systems: From RF Subsystems to 4G Enabling Technologies, Cambridge University Press, 2010.
- S. Avestimehr, S. Diggavi, and D. N. C. Tse, "Wireless Network Information Flow: A Deterministic Approach," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 1872-1905, 2011. https://doi.org/10.1109/TIT.2011.2110110
- N. Schrammar, "On Deterministic Models for Wireless Networks," Licentiate Thesis in Telecommunications Stockholm, Sweden 2011, June 8, 2014 19 DRAFT
- I-Hsiang Wang, David N.C Tse, "Interference Mitigation Through Limited Receiver Cooperation," IEEE Trans. on Inf. Theory, vol. 57, pp. 2931-2940, May, 2011.
- B. Bandemer, A. E. Gamal, "Interference Decoding for Deterministic Channels," IEEE Trans. on Inf. Theory, vol. 57, No. 5, May 2011.
- A. E. Gamal, Y. H. Kim, Network Information Theory, Cambridge University Press 2011.
- E. Metsala, J. Salmelin, Mobile Backhaul, Wiley, 2012.
- M. H. Lee, M. H. A. Khan, D. Park, "Analysis of a Deterministic Jong Nang Gate with Transmitter Cooperation," Int. J. of Wireless & Mobile Networks (IJWMN), vol. 4, no. 4, August 2012.
- A. Lozano, R. W. Heath, J. G. Andrews, "Fundamental Limits of Cooperation," IEEE Trans. on Inf. Theory, vol. 59, no. 9, pp. 5213- 5226, Sept. 2013. https://doi.org/10.1109/TIT.2013.2253153
- B. Bandemer, A. E. Gamal, "Interference Decoding for Deterministic Channels," IEEE Trans. on Info. Theory, vol. 57, no. 5, May 2011.
- Moon Ho Lee, "Jeju Jong Nang Channel Code I," Journal of The Institute of Electronics Engineers of Korea, vol. 49, no. 12, pp.27-35, December 2012.
- Moon Ho Lee, Md. Hashem Ali Khan and Ju Yong Park, "Jeju Jong Nang Channel Code II," Journal of The Institute of Electronics Engineers of Korea, vol. 49, no. 12, pp.36-44, December 2012.
- Y. S. Im, E. Y. Kang, "MPEG-2 Video Watermarking in Quantized DCT Domain," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 11, No. 1, pp. 81-86, 2011.
- I. Jeon, S. Kang, H. Yang, "Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System," Journal of the Korea Academia-Industrial cooperation Society(JKAIS), Vol. 11, No. 1, pp. 81-86, 2010.