References & Further Reading

References

  1. B. Nazer and M. Gastpar, Compute-and-forward: Harnessing interference through structured codes, 2011

    THE central paper of this chapter. Introduces the compute-and-forward framework: relay decodes lattice linear combinations $\sum_k a_k \mathbf{u}_k \bmod \Lambda_s$ at the Nazer-Gastpar rate $R(\mathbf{h}, \mathbf{a})$. Unifies physical-layer network coding, interference-channel inner bounds, and distributed source coding under a single lattice-coding framework. Proves the central rate formula (Thm. 1) and applies it to the two-way relay, the symmetric Gaussian interference channel, and Gaussian network coding.

  2. S. Zhang, S. C. Liew, and P. P. Lam, Hot topic: physical-layer network coding, 2006

    The original physical-layer network coding paper. Four-page MobiCom "hot topic" that proposed the analog-XOR two-slot TWRC protocol. Launched PNC as a subfield; over 2000 citations. Foundational reference for §4; equivalent to the Nazer-Gastpar $\mathbf{a} = (1, 1)^T$ special case (Thm. <a href="#thm-pnc-as-cf-special-case" class="ferkans-ref" title="Theorem: PNC Is the $\mathbf{a} = (1, 1)^T$ Special Case of CF" data-ref-type="theorem"><span class="ferkans-ref-badge">T</span>PNC Is the $\mathbf{a} = (1, 1)^T$ Special Case of CF</a>).

  3. W. Nam, S.-Y. Chung, and Y. H. Lee, Capacity of the Gaussian two-way relay channel to within 1/2 bit, 2010

    Proves that compute-and-forward with $\mathbf{a} = (1, 1)^T$ achieves the capacity region of the symmetric Gaussian two-way relay channel within $\tfrac{1}{2}$ bit per user, for all SNR. Foundational reference for §3; the constant-gap-to-capacity result for TWRC.

  4. O. Ordentlich, U. Erez, and B. Nazer, The approximate sum capacity of the symmetric Gaussian $K$-user interference channel, 2014

    Extends CF to the $K$-user Gaussian interference channel and introduces the integer-forcing linear receiver for MIMO. Proves the constant-gap-to-sum-capacity result (Thm. <a href="#thm-integer-forcing" class="ferkans-ref" title="Theorem: Integer-Forcing Achieves a Constant Gap to MIMO Sum-Capacity" data-ref-type="theorem"><span class="ferkans-ref-badge">T</span>Integer-Forcing Achieves a Constant Gap to MIMO Sum-Capacity</a>) and establishes CF as a general lattice-coding primitive beyond the TWRC. Awarded IEEE Information Theory Society Best Paper Award 2016. Foundational reference for §5.

  5. U. Erez and R. Zamir, Achieving 1/2 log(1 + SNR) on the AWGN channel with lattice encoding and decoding, 2004

    The foundational nested-lattice AWGN capacity result (Ch. 16 prerequisite). Proves that nested lattice codes with MMSE scaling achieve the single-user Gaussian capacity $\tfrac{1}{2} \log_2(1 + \ntn{snr})$. The Nazer-Gastpar theorem generalises this to multiple transmitters and arbitrary integer coefficients; the proof pattern (MMSE scaling, mod-$\Lambda_s$ reduction, Poltyrev-good $\Lambda_c$) carries over directly.

  6. R. Zamir, Lattice Coding for Signals and Networks, Cambridge University Press, 2014

    The definitive textbook on lattice coding for Gaussian channels and networks. Chapter 12 covers compute-and-forward in depth; Chapter 13 covers distributed source coding. Pedagogically complementary to this chapter, with more space for proofs and examples. Ties §1-§5 together.

  7. B. Nazer and M. Gastpar, Computation over multiple-access channels, 2007

    Nazer and Gastpar's original paper on computing functions over a MAC — the conceptual precursor to the 2011 compute-and-forward framework. Focuses on general functions (not just linear), uses random-coding arguments rather than lattices, and establishes the "function computation" viewpoint that the 2011 paper made concrete for linear functions.

  8. R. Zamir, S. Shamai, and U. Erez, Nested linear/lattice codes for structured multiterminal binning, 2002

    The nested-lattice framework for multiterminal problems. Established the $\Lambda_c \supset \Lambda_s$ construction with quantisation and dithering that underlies the Nazer-Gastpar achievability. Key precursor for §2's proof steps on shared lattice codebooks across users.

  9. B. Nazer and M. Gastpar, Lattice coding increases multicast rates for Gaussian multiple-access networks, 2008

    Conference-paper precursor to the 2011 IT paper. Showed that lattice coding outperforms random coding for the $K$-user multicast problem, motivating the full compute-and-forward framework.

  10. M. P. Wilson, K. Narayanan, H. D. Pfister, and A. Sprintson, Joint physical layer coding and network coding for bidirectional relaying, 2010

    Independent, contemporaneous derivation of the TWRC constant-gap result. Uses lattice codes with integer coefficients and proves within-constant-gap achievability for asymmetric TWRC. Companion to Nam-Chung-Lee 2010.

  11. P. Popovski and H. Yomo, The anti-packets can increase the achievable throughput of a wireless multi-hop network, 2006

    Independent, contemporaneous proposal of analog network coding for wireless two-way relay — published the same year as Zhang-Liew-Lam at a different venue. The "anti- packet" framing emphasises the throughput-gain argument: each user's transmission effectively conveys **two** packets (its own and its negative contribution to the other's).

  12. T. J. Oechtering and M. Skoglund, Coding for the Gaussian two-way relay channel, 2009

    Early information-theoretic analysis of the Gaussian TWRC achievability region. Predates the Nam-Chung-Lee $\tfrac{1} {2}$-bit theorem but establishes the rate-region structure and the MA-BC slot decomposition that §3 uses.

  13. J. Zhan, B. Nazer, U. Erez, and M. Gastpar, Integer-forcing linear receivers, 2014

    Comprehensive treatment of the integer-forcing receiver for MIMO, including the optimal-integer-matrix search via LLL reduction and bounds on the constant-gap performance. Extended companion to Ordentlich-Erez-Nazer 2014 with full proofs and engineering analysis. Source for §5's algorithm block.

  14. J. Körner and K. Marton, How to encode the modulo-two sum of binary sources, 1979

    The classical distributed-source-coding problem whose CF-lattice reformulation is discussed in §5. Körner and Marton showed that the sum-rate for jointly encoding the XOR of two correlated binary sources is $H(U_A \oplus U_B)$, not $H(U_A) + H(U_B)$. The lattice-CF counterpart achieves the analogous result on Gaussian sources.

  15. R. F. H. Fischer and C. Siegl, Reconstruction and decoding for constellation-constrained compute-and-forward, 2014

    Practical CF implementation with finite-alphabet constellations (4-QAM, 16-QAM) and LDPC outer codes. Discusses the integer-coefficient search complexity at moderate $K$ and the PNC-to-lattice-CF transition. Reference for §5's practical-deployment discussion.

  16. K. Koike-Akino, P. Popovski, and V. Tarokh, Optimized constellations for two-way wireless relaying with physical network coding, 2009

    Practical PNC with higher-order constellations. Shows how 16-QAM and 64-QAM PNC require Voronoi-optimised constellations to avoid the asymmetric-channel failure mode. Cited in §4's discussion of PNC limitations.

  17. M. Ajtai, Generating hard instances of lattice problems, 1996

    The NP-hardness result for SVP under randomised reductions. Cited in §5 to explain why the integer-coefficient search is computationally hard in general. Foundational lattice- cryptanalysis reference.

  18. A. K. Lenstra, H. W. Lenstra Jr., and L. Lovász, Factoring polynomials with rational coefficients, 1982

    The LLL lattice reduction algorithm. Polynomial-time approximation to the shortest-vector problem within a $2^{K/2}$ factor. The workhorse for integer-coefficient search in §5.

  19. D. Wübben and P. Rost, Compute-and-forward relaying in cooperative satellite communications, 2015

    CF prototype in a two-way satellite relay. Demonstrates a $\sim 2\times$ throughput gain at $\ntn{snr} = 15$ dB over decode-and-forward. Cited in §2 and §5 for the practical-deployment discussion.

  20. T. M. Cover and A. El Gamal, Capacity theorems for the relay channel, 1979

    The classical paper on the relay channel; introduces decode-and-forward, amplify-and-forward, and compress-and- forward as canonical strategies. CF is contrasted against these in §1 and §3. The cut-set upper bound used in Thm. <a href="#thm-nam-chung-suh-half-bit" class="ferkans-ref" title="Theorem: Nam-Chung-Lee: CF Is Within 1/2 Bit of TWRC Capacity" data-ref-type="theorem"><span class="ferkans-ref-badge">T</span>Nam-Chung-Lee: CF Is Within 1/2 Bit of TWRC Capacity</a> is the Cover-El Gamal max-flow min-cut argument.

  21. C. E. Shannon, Two-way communication channels, 1961

    Shannon's original two-way channel paper — the foundational network-information-theory reference for §3's TWRC. Shannon's inner bound on the general two-way channel capacity is still not known to be tight; the relay-mediated version of §3 has a cleaner answer.

  22. R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, Network information flow, 2000

    The foundational network-coding paper. Proved that linear coding at intermediate nodes achieves the multicast capacity of wired networks — the digital precursor to the analog PNC and CF of this chapter. Historical context in §1 and §4.

  23. 3GPP, NR; Overall description; Stage 2, 2022. [Link]

    5G NR overall architecture specification, including Integrated Access and Backhaul (IAB, Release 16). Cited in §1 and §3 to note that 5G NR does **not** implement compute-and-forward — IAB uses orthogonal multiplexing instead, though CF would structurally fit.

  24. V. R. Cadambe and S. A. Jafar, Interference alignment and degrees of freedom of the $K$-user interference channel, 2008

    Interference alignment: the $K$-user GIC achieves $K/2$ degrees of freedom via continuous-channel subspace alignment. CF gives an alternative achievability path for the GIC (Ordentlich-Erez-Nazer 2014) that does not require infinite channel diversity. Cited in §5 as the contrasting paradigm.

  25. R. H. Etkin, D. N. C. Tse, and H. Wang, Gaussian interference channel capacity to within one bit, 2008

    The 1-bit gap capacity result for the 2-user Gaussian interference channel. Benchmark against which the Ordentlich-Erez-Nazer 2014 CF-based bound is compared in §5. Established the constant-gap-to-capacity style of analysis that the Nazer-Gastpar framework extends.

Further Reading

For readers interested in deeper or related aspects of compute- and-forward, integer-forcing, and their network applications.

  • Compute-and-forward in a comprehensive lattice-coding framework

    R. Zamir, "Lattice Coding for Signals and Networks," Cambridge University Press, 2014, Chapters 12-13.

    The definitive textbook treatment. Chapter 12 covers compute-and-forward with full derivations; Chapter 13 covers distributed source coding with the lattice perspective. Pedagogically complementary to this chapter; essential reading for anyone who wants to go beyond the survey-level treatment here.

  • Integer-forcing for massive MIMO

    A. Sakzad, E. Viterbo, Y. Hong, and J. Boutros, "On the ergodic rate for compute-and-forward," Proc. IEEE ISIT 2012.

    Application of the CF framework to fading channels. Shows that CF with optimised integer coefficients is robust to ergodic fading, with a modest rate penalty compared to the fixed-channel case. Forward reference to Chapter 20 (massive MIMO).

  • Practical lattice decoders for CF

    C. Feng, D. Silva, and F. R. Kschischang, "An algebraic approach to physical-layer network coding," IEEE Trans. Inf. Theory, vol. 59, no. 11, pp. 7576-7596, 2013.

    Algebraic lattice-decoder construction for practical PNC and CF, using cyclotomic integer rings and finite-field quotients. Bridges the asymptotic Nazer-Gastpar achievability with finite-block-length deployable codes.

  • CF in 5G and beyond

    D. Fang, A. Burr, D. Wübben, and H. V. Poor, "Lattice network coding for 5G and beyond: From theory to practice," IEEE Communications Magazine, vol. 58, no. 5, pp. 36-42, 2020.

    Industry-oriented survey of CF and PNC as candidate technologies for 5G NR extensions and 6G design. Discusses the deployment obstacles (synchronisation, integer-search complexity) and identifies IAB, non-terrestrial networks, and URLLC as possible niches for CF. Bridges §5's theoretical discussion with practical wireless standards.

  • Secret-key generation via CF

    I. El Bakoury and B. Nazer, "The impact of channel variation on integer-forcing receivers," Proc. IEEE ISIT 2015.

    Application of CF / IF to the physical-layer secret-key problem: two legitimate users exchange lattice-encoded messages via a relay that only learns their modular sum, not individual messages. The eavesdropper's wiretap rate is fundamentally reduced by the CF framework.

  • Survey of physical-layer network coding

    S. C. Liew, S. Zhang, and L. Lu, "Physical-layer network coding: Tutorial, survey, and beyond," Physical Communication, vol. 6, pp. 4-42, 2013.

    Comprehensive survey by the original PNC authors. Covers PNC across many constellations, modulation formats, and channel models, with a practical-engineer's perspective that complements the information-theoretic framing of this chapter.