{"title":"多终端信源编码中的反向信道","authors":"S. Servetto","doi":"10.1109/ITW.2006.1633812","DOIUrl":null,"url":null,"abstract":"We consider the multiterminal source coding problem with general discrete memoryless sources. In previous work, we developed new inner and outer bounds to its rate region, and gave an expression for the gap between them, which explicitly depends on the code maps. In this work, we first construct a class of codes for our problem, based on the method of backward channels used by Csiszár and Körner in their proof of the two-terminal rate/distortion theorem. Next, we show that for each one of the codes in this class, the gap between the inner and the outer bounds above does vanish. Finally, we present a summary of results obtained to date with this purely combinatorial approach, as well as a statement of what it would take to completely solve the problem following this line of attack.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Backward Channels in Multiterminal Source Coding\",\"authors\":\"S. Servetto\",\"doi\":\"10.1109/ITW.2006.1633812\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider the multiterminal source coding problem with general discrete memoryless sources. In previous work, we developed new inner and outer bounds to its rate region, and gave an expression for the gap between them, which explicitly depends on the code maps. In this work, we first construct a class of codes for our problem, based on the method of backward channels used by Csiszár and Körner in their proof of the two-terminal rate/distortion theorem. Next, we show that for each one of the codes in this class, the gap between the inner and the outer bounds above does vanish. Finally, we present a summary of results obtained to date with this purely combinatorial approach, as well as a statement of what it would take to completely solve the problem following this line of attack.\",\"PeriodicalId\":293144,\"journal\":{\"name\":\"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-03-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITW.2006.1633812\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITW.2006.1633812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We consider the multiterminal source coding problem with general discrete memoryless sources. In previous work, we developed new inner and outer bounds to its rate region, and gave an expression for the gap between them, which explicitly depends on the code maps. In this work, we first construct a class of codes for our problem, based on the method of backward channels used by Csiszár and Körner in their proof of the two-terminal rate/distortion theorem. Next, we show that for each one of the codes in this class, the gap between the inner and the outer bounds above does vanish. Finally, we present a summary of results obtained to date with this purely combinatorial approach, as well as a statement of what it would take to completely solve the problem following this line of attack.