{"id":"https://openalex.org/W2807905585","doi":"https://doi.org/10.1109/wcnc.2018.8377420","title":"GDoF region characterization of the weak MIMO IC with No CSIT","display_name":"GDoF region characterization of the weak MIMO IC with No CSIT","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2807905585","doi":"https://doi.org/10.1109/wcnc.2018.8377420","mag":"2807905585"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2018.8377420","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2018.8377420","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014992900","display_name":"Sanjay Karmakar","orcid":"https://orcid.org/0000-0002-0755-2516"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sanjay Karmakar","raw_affiliation_strings":["Electrical and Computer Engineering, North Dakota State University, Fargo, ND"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, North Dakota State University, Fargo, ND","institution_ids":["https://openalex.org/I57328836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5014992900"],"corresponding_institution_ids":["https://openalex.org/I57328836"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05327812,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"57","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.4540766179561615},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4426004886627197},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4136383533477783},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39356687664985657},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3791801333427429},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.28668010234832764},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22698789834976196},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1415243148803711}],"concepts":[{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.4540766179561615},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4426004886627197},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4136383533477783},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39356687664985657},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3791801333427429},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.28668010234832764},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22698789834976196},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1415243148803711}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc.2018.8377420","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2018.8377420","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8299999833106995,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1870400605","https://openalex.org/W1965689631","https://openalex.org/W2005380874","https://openalex.org/W2032579237","https://openalex.org/W2051580978","https://openalex.org/W2086198769","https://openalex.org/W2099111195","https://openalex.org/W2111772171","https://openalex.org/W2157989362"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"We":[0,44,159],"characterize":[1,146],"the":[2,25,28,35,40,46,51,59,63,69,147,151,165,171,182,188],"generalized":[3],"degrees":[4],"of":[5,9,58,62,68,150,173,207],"freedom":[6],"(GDoF)":[7],"region":[8,149],"an":[10],"ergodic":[11],"fading":[12],"2-user":[13],"interference":[14,48],"channel":[15,29],"(IC)":[16],"with":[17],"multiple":[18],"antennas":[19,105],"at":[20,34,39],"each":[21],"node":[22],"(MIMO)":[23],"under":[24],"assumption":[26],"that":[27,67,84],"realizations":[30],"are":[31,211],"known":[32],"only":[33],"receivers":[36,87],"and":[37,86,94,185],"not":[38,203],"transmitters":[41,85],"(No":[42],"CSIT).":[43],"consider":[45],"weak":[47,152],"scenario":[49,184],"where":[50,112],"ratio":[52],"-":[53,57],"denoted":[54],"by":[55],"\u03b1":[56],"signal":[60],"strength":[61],"interfering":[64],"links":[65,72],"to":[66,78,164,190],"corresponding":[70],"direct":[71],"in":[73],"dB":[74],"scale":[75],"is":[76,202],"assumed":[77],"be":[79,191],"smaller":[80],"than":[81],"half.":[82],"Assuming":[83],"have":[88],"Mi,":[89],"M":[90,140],"<sub":[91,96,101,114,119,125,130,136,141],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[92,97,102,115,120,126,131,137,142],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sub>":[93,103,116,121,138,143],"N":[95,100,118,129,135],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sub>":[98,127,132],",":[99,104,128,144],"respectively,":[106],"except":[107],"from":[108],"a":[109],"small":[110],"class":[111],"(M":[113],"+":[117],")":[122],">":[123,134,139],"min{M":[124],"}":[133],"we":[145],"GDoF":[148,166,176,200],"IC":[153],"for":[154,181,193,197],"all":[155],"other":[156,195],"antenna":[157],"configurations.":[158],"derive":[160],"newer":[161],"outer":[162,179],"bounds":[163,177,180,210],"which":[167,198],"enable":[168],"us":[169],"bypass":[170],"use":[172],"full":[174],"CSIT":[175],"as":[178],"No-CSIT":[183],"therefore":[186],"has":[187],"potential":[189],"useful":[192],"analyzing":[194],"networks":[196],"full-CSIT":[199],"characterization":[201],"available.":[204],"The":[205],"achievability":[206],"these":[208],"upper":[209],"then":[212],"proved":[213],"specifying":[214],"explicit":[215],"coding-decoding":[216],"schemes.":[217]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
