Professional Documents
Culture Documents
m=1
c
m
[k]h
m,n
[k] + w
n
[k], (2)
where w
n
[k] is the complex additive-white Gaussian noise at receive antenna n at time
k, and h
m,n
[k] is the channel coecient between the m-th transmit antenna and n-th
3
receive antenna at time k. For quasistatic fading, h
m,n
[k] = h
m,n
is independent of
time k.
The maximum spatial diversity order for the two-input two-output channel is the
product of the number of transmit and number of receive antennas, namely four. The
following two design criteria for space-time codes over quasistatic fading channels were
derived in [3]:
Rank Criterion: To achieve fourth order diversity, the dierence matrix C =
C
C must have rank two for any pair of distinct codewords C and
C.
Determinant Criterion: To further optimize performance, a code with full diversity
should be chosen to maximize the coding gain. For 22 square matrices, the coding
gain expression simplies to:
= min
C=
det(C
C)
. (3)
Similar criteria were proposed for rapid-fading channels in [3].
2.2 Unied Framework for the Encoding of High-Rate Space-Time Codes for the
Two-Input Two-Output Channel
We present a common framework for comparing the golden code and the overlaid
Alamouti codes in a unied way. In Section 3 we will use this framework to describe
the asymmetric golden code. All of these codes transmit four complex information
symbols |x
1
, x
2
, x
3
, x
4
from two transmit antennas in two signaling intervals, and
they may all be viewed as the sum of a pair of rate-one codes. In particular, all may
be described by the following 2 2 space-time code:
C(x) = C
1
(a) +
L
C
1
(
b)
R
, (4)
where:
x = [x
1
, x
2
, x
3
, x
4
]
, a = [x
1
, x
2
]
, b = [x
3
, x
4
]
,
b =
P
b;
P
is a unitary precoding matrix;
C
1
() is a rate-one encoder for symbol pairs a or
b;
L
and
R
are 2 2 matrices that multiply C
1
(
2
_
a
1
a
2
a
2
a
1
_
, (8)
where the constant 1/
1
_
,
L
=
_
1 0
0 1
_
,
R
= I
2
, (10)
where
1
=
1
7
(1 + i) and
2
=
1
7
(1 + 2i). (11)
Finally, the overlaid Alamouti code of [12] is also a special case of (4), with:
C
1
= C
Alamouti
,
P
= I
2
,
L
=
[[
_
1 0
0 i
_
,
R
= I
2
, (12)
where
= (1
7) + i(1 +
7). (13)
The worst-case decoding complexity of the golden code is O(q
2.5
) in both quasistatic
and time-varying fading for QAM alphabets [9]. The overlaid Alamouti codes with
QAM are fast-decodable with worst-case decoding complexity of O(q
2
) in quasistatic
fading channels [13], but lose their fast decoding property on time-varying channels
and have a worst-case complexity of O(q
3
). We next present the asymmetric golden
code, which has a worst-case decoding complexity of O(q
2
) in quasistatic channels and
O(q
2.5
) in time-varying channels, which is the lowest decoding complexity compared
to previously reported rate-two space-time block codes for the two-input two-output
channel.
3 The Asymmetric Golden Code
We propose a novel full-rate full-diversity space-time code for the two-input two-output
channel: the asymmetric golden code. We rst describe encoding, and then prove the
fast decoding properties of the asymmetric golden code.
5
3.1 The Asymmetric Golden Code Encoder
We propose the asymmetric golden code, a special case of (4) with
C
1
= C
K
,
P
= I
2
,
L
= lI
2
,
R
=
_
0 1
1 0
_
, (14)
where l (0, 1) is an asymmetry coecient, to be specied later. The factor l in
L
ensures that the second layer will be scaled by l before being added to the rst
layer. The rate-one encoder C
K
in (14) is a modied version of the diagonal algebraic
encoder in (5), dened by:
C
K
(a
1
, a
2
) =
_
2
1 +l
2
_
u
1
0
0 u
2
_
, (15)
where [u
1
, u
2
]
is given by (6).
Comparing (15) to C
DAST
of (5), we see two dierences: the constant
_
2
1+K
2
,
which ensures that the average transmit energy is equal to that of the underlying
alphabet, and the conjugation of u
2
. The latter makes C
K
dierent from C
DAST
even
when l = 1. Let a = [x
1
, x
2
]
and b = [x
3
, x
4
]
2
_
+l
_
0
b
1
2
0
__
(16)
=
_
2
1 +l
2
_
cx
1
+ sx
2
l(cx
3
+ sx
4
)
l(sx
3
+ cx
4
) sx
1
+ cx
2
_
, (17)
where:
a = Ga,
b = Gb, and G =
_
c s
s c
_
, (18)
and c, s, and are given by (7).
Theorem 1 The asymmetry coecient l (0, 1) that maximizes the coding gain (3)
for the space-time block code in (16) with QAM alphabet is K = 1/
3. The resulting
coding gain is 1/
20.
Proof See Appendix A.
We next describe the eective channel matrix induced by the asymmetric golden
code. We then establish the key properties of this matrix, and describe a maximum-
likelihood decoder that exploits the key properties to reduce complexity in rapid time-
varying fading as well as quasistatic fading.
6
3.2 The Eective Channel Matrix and its Key Properties
Substituting the denition of the asymmetric golden code from (16) into (2), the vector
of samples after conjugating the second and fourth samples received at a receiver with
two antennas at the two time instances can be written as the output of an eective
four-input four-output channel:
y = Hx +n, (19)
where y = [y
1
[1], y
1
[2], y
2
[1], y
2
[2]]
1
[2], n
2
[1], n
2
[2]]
_
h
1,1
[1] 0 lh
2,1
[1] 0
0 h
2,1
[2] 0 lh
1,1
[2]
h
1,2
[1] 0 lh
2,2
[1] 0
0 h
2,2
[2] 0 lh
1,2
[2]
_
_
. .
H
_
_
c s 0 0
s c 0 0
0 0 c s
0 0 s c
_
_
. .
. (20)
The structure of the asymmetric golden code induces special properties in its eective
channel matrix that we exploit to reduce decoding complexity. The following two lem-
mas relate these special properties to the orthogonal-triangular (QR) decomposition
H = QR, which results from an application of the Gram-Schmidt procedure to the
columns of H = [h
1
, , h
4
], where the columns of Q = [q
1
, , q
4
] are an orthonor-
mal basis for the subspace spanned by H, and R is upper triangular with nonnegative
real diagonal elements, so that the entry of R in row i and column j is r
i,j
= q
i
h
j
.
We present the key properties for fast decoding on time-varying fading and quasistatic
fading in the following two lemmas.
Lemma 1 (The Key Property in Time-Varying Fading) The R matrix in a QR
decomposition H = QR of the eective channel (20) has the form
R =
_
A B
0 D
_
, (21)
where both of the upper triangular matrices A and D are entirely real.
Proof The proof follows immediately from [9] (c.f. Appendix A), where
H and are
given in (20).
A few remarks:
Both A =
_
r
1,1
r
1,2
0 r
2,2
_
and D =
_
r
3,3
r
3,4
0 r
4,4
_
are triangular by construction with real
diagonal entries, so the key property is the fact that both r
1,2
and r
3,4
are real.
To demonstrate that r
1,2
= h
1
h
2
/|h
1
| is real, it is sucient to show that the
inner product between the rst two columns is real, a fact which is easily veried
by direct computation.
The lemma applies regardless of whether the channel is quasistatic or time-varying.
For the case of quasistatic fading, however, permuting the channel matrix prior to
QR decomposition leads to an R matrix with r
1,2
= r
3,4
= 0. We next discuss the
key property of this permuted eective channel matrix in quasistatic fading.
7
Let us introduce the permutation matrix = [e
1
, e
4
, e
2
, e
3
], where e
i
is the i-th
column of the 4 4 identity matrix, so that (19) can be written as:
y = H
x +n
= H
+n, (22)
where x
x = [x
1
, x
4
, x
2
, x
3
]
and H
= H =
H is the permuted eective
channel matrix given by
H
=
_
3
2
_
_
h
1,1
[1] 0 lh
2,1
[1] 0
0 h
2,1
[2] 0 lh
1,1
[2]
h
1,2
[1] 0 lh
2,2
[1] 0
0 h
2,2
[2] 0 lh
1,2
[2]
_
_
. .
H
_
_
c s 0 0
s c 0 0
0 0 c s
0 0 s c
_
_
. .
_
1 0 0 0
0 0 1 0
0 0 0 1
0 1 0 0
_
_
. .
. (23)
The following lemma presents the key property in quasistatic fading.
Lemma 2 (The Key Property in Quasistatic Fading) The R matrix in a QR
decomposition H
and z
34
= [z
3
, z
4
]
, where
z = Q
b = arg min
bA
2
||z
12
Aa
(b) Bb|
2
+|z
34
Db|
2
, (26)
a = a
b), (27)
where
a
q) optimization of (31).
We next discuss the case of quasistatic fading and show how the key property in
Lemma 2 can also be used to reduce the worst-case ML decoding complexity. We start
by dening the intermediate variables c = [x
1
, x
4
]
, d = [x
2
, x
3
]
, z
12
= [z
1
, z
2
]
and
z
34
= [z
3
, z
4
]
, where z = Q
d = arg min
dA
2
||z
12
Ac
(d) Bd|
2
+|z
34
Dd|
2
, (33)
c = c
d), (34)
1
A QAM slicer can be implemented as a pair of PAM slicers, with each requiring a single
multiply, a single rounding operation, a single addition, and a single hard-limiting operation,
none of which depends on q.
2
Throughout the paper we use superscripts R and I to denote the real and imaginary
components, respectively, so that v
R
= Tv and v
I
= .v.
9
where
c
= arg min
x
R
4
(A
R
)
|[v
R
2
r
2,2
x
R
4
[
2
+ i arg min
x
I
4
(A
I
)
|[v
I
2
r
2,2
x
I
4
[
2
+
arg min
x
R
1
(A
R
)
|[v
R
1
r
1,1
x
R
1
[
2
+ i arg min
x
I
1
(A
I
)
|[v
I
1
r
1,1
x
I
1
[
2
. (37)
The optimization in (35) decomposes into four independent optimizations of (37). Each
optimization in (37) can be implemented with a slicer. Hence, the overall complexity of
(37) is O(1). We thus arrive at the fast decodability theorem on quasistatic channels.
Theorem 3 (The Asymmetric Golden Code is Fast-Decodable on Quasistatic
Fading) A maximum-likelihood decoder for the asymmetric golden code with q-ary
QAM alphabet can be implemented with a worst-case complexity of O(q
2
).
Proof As described in (33), the ML decision can be found by stepping through each of
the q
2
candidates for d, and for each implement the O(1) optimization of (37).
4 Fast ML Decoding with Low Average Decoding Complexity
The decoding strategy used to prove the fast-decodable theorems has a low worst-case
complexity but a high average complexity. In this section we present an ecient im-
plementations of an ML decoder for the asymmetric golden code in quasistatic fading.
The proposed ML decoder has a low average complexity and a worst-case complexity
of O(q
2
). An ecient ML decoder of the golden code for time-varying channel was pro-
posed in [9], with a worst-case complexity of O(q
2.5
). Importantly, the algorithm in [9]
[cf. Fig. 2] can be used to the decode the asymmetric golden code in time-varying fad-
ing without any modication to the algorithm. The inputs to the decoding algorithm,
which are the received vector and the eective channel matrix are given by (19) and
(20), respectively. Therefore, we will only consider ecient ML decoding in quasistatic
fading.
A conventional sphere decoder applied to the asymmetric golden code results in
a four-level tree, with a dierent x
i
, i |1, 2, 3, 4, associated with each level. We
propose a three-level tree that associates x
3
with the rst level, x
2
with the second
level and c = [x
1
, x
4
]
r
4
,
4
x
3
k
ROOT
x
P
3
=
k
z
r
3
,
3
x
2
k
x
R
x
I
P
1
R
=
k
v
r
1
,1 x
1
R
k
P
1
I
=
k
v
r
1
,
1
x
1
I
k
P
2
R
=
k
v
r
2
,
2
x
4
R
k
P
2
I
=
k
v
I
r 2
,2
x4
I k
x
I
x
R
Fig. 1 The structure of the proposed detection tree and its branch metrics for the asymmetric
golden code. The cost function for the leaf node is the sum of the branch metrics, P(x) =
P
R
1
+ P
I
1
+ P
R
2
+ P
I
2
+ P
3
+ P
4
.
is a direct result of the fact that A and D are real and diagonal (Lemma 2), which
allows us to rewrite the ML cost function from (32) as
P(x) =
P
1,2
..
|v
R
1
r
1,1
x
R
1
|
2
. .
P
R
1
+|v
I
1
r
1,1
x
I
1
|
2
. .
P
I
1
+|v
R
2
r
2,2
x
R
4
|
2
. .
P
R
2
+|v
I
2
r
2,2
x
I
4
|
2
. .
P
I
2
+
|z
3
r
3,3
x
2
|
2
. .
P
3
+|z
4
r
4,4
x
3
|
2
. .
P
4
. (38)
Thus, as illustrated in Figure 1, (38) shows that the total cost of a leaf node x decom-
poses into the sum of three branch metrics, where P
4
, P
3
and P
1,2
denotes the branch
metrics for a branch at the rst, second and third level of the tree, respectively.
The fact that r
3,4
= 0 leads to a signicant reduction in the complexity of the
Schnorr-Euchner sorting for the rst two stages of the tree. Specically, the fact that
D is diagonal implies that there is no interference or dependence between the symbols
x
2
and x
3
. Therefore, we can perform a single sort for the symbol x
3
emanating from
the root, and simultaneously a single sort for the symbol x
2
emanating from its children.
The pseudocode of an ecient implementation of the proposed asymmetric golden
code ML detector is shown in Figure 2. The rst ve lines represent initializations. In
particular, the rst two lines are a QR decomposition of the permuted eective channel
11
matrix in (23) and the computation of z. The squared sphere radius
P, which represents
the smallest cost (32) encountered so far, is initialized to innity to ensure ML decoding
(line 3). Sorting or Schnorr-Euchner enumeration is used for faster convergence. Only
two sorting operations (line 4 and line 5) are required. In the pseudocode, the complex
QAM alphabet /is represented by an ordered list, so that /(k) indexes the k-th symbol
in the list. We next describe the remainder of algorithm, which can be interpreted as
a two-level complex sphere decoder to choose the symbol pair d = [x
2
, x
3
]
, followed
by four independent slicers that separately decode x
R
1
, x
R
4
, x
I
1
and x
I
4
.
[Q, R] = QR decomposition(H
) 1
z = Q
y 2
P = 3
[P
4
,
4
] = sort
aA
([z
4
r
4,4
a[
2
) 4
[P
3
,
3
] = sort
aA
([z
3
r
3,3
a[
2
) 5
for k from 1 to q do 6
if (P
4
(k) >
P), break, end 7
for l from 1 to q do 8
if ((P
3
(l) + P
4
(k)) >
P), break, end 9
x
3
= ,(k), x
2
= ,(l) 10
v
1
= z
1
r
1,3
x
2
r
1,4
x
3
, v
2
= z
2
r
2,3
x
2
r
2,4
x
2
11
x
R
1
= Q(v
R
1
/r
1,1
), x
I
1
= Q(v
I
1
/r
1,1
) 12
x
R
4
= Q(v
R
2
/r
2,2
), x
I
4
= Q(v
I
2
/r
2,2
) 13
P
R
1
= [v
R
1
r
1,1
x
R
1
[
2
, P
I
1
= [v
I
1
r
1,1
x
I
1
[
2
14
P
R
2
= [v
R
2
r
2,2
x
R
4
[
2
, P
I
2
= [v
I
2
r
2,2
x
I
4
[
2
15
P = P
R
1
+ P
I
1
+ P
R
2
+ P
I
2
+ P
3
(l) + P
4
(k) 16
if P <
P then 17
P = P, x = [x
1
, x
2
, x
3
, x
4
] 18
end 19
end 20
end 21
Fig. 2 Pseudocode of a fast ML decoder for the asymmetric golden code in qua-
sistatic fading.
The two-level complex sphere decoder incorporates two common optimizations:
radius update (line 18) and pruning (line 7, line 9). While these optimizations do not
aect the worst-case complexity, they aect the average complexity signicantly. The
rst level of the complex sphere decoder considers candidate symbols x
3
in ascending
order of their branch metric P
4
(line 6). The second level of the complex sphere decoder
considers candidate symbols x
2
in ascending order of their branch metric P
3
(line 8).
The decoder then removes the interference caused by d = [x
2
, x
3
]
2
1 +|
2
(u
1
u
2
|
2
u
3
u
4
)
=
1
5
min
(x
1
,x
2
,x
3
,x
4
)M
2
1 +|
2
_
g(x
1
, x
2
) |
2
g(x
3
, x
4
)
_
, (41)
where
g(a, b) =
_
[a[
2
+[b[
2
+Ta
b + i
5.a
b
_
. (42)
We next nd the value of | that maximizes (41). We proceed in two steps: rst, we establish
the bound (|) 1/
5
min
(x
1
,x
2
,x
3
,x
4
)L
2
1 +|
2
_
g(x
1
, x
2
) |
2
g(x
3
, x
4
)
_
=
1
5
min
_
2
1 +|
2
|
2
,
2
1 +|
2
_
1 |
2
_
,
2
1 +|
2
1 2|
2
5
max
1>K>0
min
_
|
2
1 +|
2
,
1 |
2
1 +|
2
,
1 2|
2
1 +|
2
_
(43)
=
1
2
5
=
1
20
. (44)
The inequality of (43) follows from the fact that h(|) max
1>K>0
h(|) for any function
h(|) and for any | > 0. The equality in (44) is a result from the following lemma.
Lemma 3 The maximum of the minimum is:
max
1>K>0
min
_
|
2
1 +|
2
,
1 |
2
1 +|
2
,
1 2|
2
1 +|
2
_
=
1
4
, (45)
and is acheived for | = 1/
3.
Proof The functions |
2
/(1 + |
2
) and (1 |
2
)/(1 + |
2
) are monotonically increasing and
decreasing, respectively. The function [1 2|
2
[/(1 + |
2
) is decreasing for |
_
0, 1/
2
_
and increasing for | (1/
2
_
and | (1/
2, 1).
For |
_
0, 1/
2
_
, the maximum of the minimum of (45) occurs at the intersection of the
increasing function |
2
/(1+|
2
) and the smaller of the two decreasing functions (1|
2
)/(1+
|
2
) and [1 2|
2
[/(1 + |
2
). Since [1 2|
2
[ < (1 |
2
) for |
_
0, 1/
2
_
, the maximum
of the minimum occurs at the intersection of |
2
/(1 +|
2
) and [1 2|
2
[/(1 +|
2
), namely at
| = 1/
2, 1), the maximum of the minimum occurs at the intersection of the decreas-
ing function (1 |
2
)/(1 + |
2
) and the smaller of the two increasing functions |
2
/(1 + |
2
)
and [12|
2
[/(1+|
2
). Since [12|
2
[ < |
2
for | (1/
3. ||
15
We next show that the bound (|)
1
2
5
of (44) is in fact achievable with equality with
| = 1/
3. Substituting | = 1/
3) =
1
2
5
min
(x
1
,x
2
,x
3
,x
4
)M
[3g(x
1
, x
2
) g(x
3
, x
4
)[ . (46)
In order to show that (1/
3) =
1
2
5
, we rst prove that (1/
3) = 0 only if x
1
= x
2
=
x
3
= x
4
= 0 in the following lemma.
Lemma 4 The function f(x
1
, x
2
, x
3
, x
4
) = 3g(x
1
, x
2
) g(x
3
, x
4
) = 0, for x
i
Z + iZ,
i 1, 2, 3, 4, only if x
1
= x
2
= x
3
= x
4
= 0.
Proof Assume that f(x
1
, x
2
, x
3
, x
4
) = 0, then we have that
3g(x
1
, x
2
) g(x
3
, x
4
) = 0. (47)
The equation in (47) implies that 3 divides g(x
3
, x
4
), which is denoted 3[g(x
3
, x
4
). We next
show that if 3[g(a, b), then 3[a, 3[b and 9[g(a, b).
Let a = 3l
a
+r
a
and b = 3l
b
+r
b
, where l
a
, l
b
Z+iZ, and r
a
, r
b
0, 1, 2 +i0, 1, 2.
Since, 3[g(a, b), we have that 3[g(r
a
, r
b
). By considering the nite number of possibilities for
r
a
and r
b
, we can easily verify that 3[g(r
a
, r
b
) only if r
a
= r
b
= 0. Therefore, 3[a and 3[b.
Consequently, g(a, b) is then given by
g(a, b) =
_
[3l
a
[
2
+[3l
b
[
2
+T3l
a
3l
b
+ i
5.3l
a
3l
b
_
= 9
_
[l
a
[
2
+[l
b
[
2
+Tl
a
l
b
+ i
5.l
a
l
b
_
. (48)
As a result, we also have that 9[g(a, b).
Therefore, f(x
1
, x
2
, x
3
, x
4
) = 0 implies that 3[g(x
3
, x
4
), which in turn implies that 3[x
3
,
3[x
4
, and 9[g(x
3
, x
4
). However, 9[g(x
3
, x
4
) implies that 3[g(x
1
, x
2
), which in turn implies that
3[x
1
, 3[x
2
, and 9[g(x
1
, x
2
). We then have that 3[x
k
, k 1, 2, 3, 4. Hence, we can divide
(47) by 3 and obtain an identical equation in the coecients y
k
=
x
k
3
, where y
k
Z + iZ.
Since we can repeat this argument and divide by 3 indenitely, the only possible solution to
f(x
1
, x
2
, x
3
, x
4
) = 0 is when x
1
= x
2
= x
3
= x
4
= 0. ||
The desired result that (1/
3) =
1
2
5
follows from (46) and Lemma 4. In particular, Lemma
4 proves that [3g(x
1
, x
2
) g(x
3
, x
4
)[ , = 0 for (x
1
, x
2
, x
3
, x
4
) /. Since the real part of
3g(x
1
, x
2
) g(x
3
, x
4
) is an integer, while the imaginary part is an integer multiple of
5, it
follows immediately that:
min
(x
1
,x
2
,x
3
,x
4
)M
[3g(x
1
, x
2
) g(x
3
, x
4
)[ = 1. (49)
Substituting (49) into (46), we obtain that (1/
3) =
1
2
5
. ||
B Proof of the Key Property for Fast Decoding of the Asymmetric
Golden Code on Quasistatic Fading Channel
Direct computation of the elements of R from the eective channel matrix in (23) yields:
r
1,1
=
_
3
2
_
c
2
1
+ s
2
2
, r
1,2
= 0, r
1,3
=
3
2
5r
1,1
(
1
2
), r
1,4
=
3
2r
1,1
3
r
2,2
=
1
3
r
1,1
, r
2,3
=
3 r
1,4
, r
2,4
=
1
3
r
1,3
r
3,3
=
27[
4
[
8r
2
1,1
_
c
2
1
+ s
2
2
, r
3,4
= 0
r
4,4
=
1
3
r
3,3
, (50)
16
where these results are expressed in terms of the following four intermediate variables:
1
= [h
1,1
[
2
+[h
1,2
[
2
2
= [h
2,1
[
2
+[h
2,2
[
2
3
= h
1,1
h
2,1
+ h
1,2
h
2,2
4
= h
1,1
h
2,2
h
1,2
h
2,1
. (51)
Because fading is quasistatic, we dropped the time index for simplicity of notation. Because
r
1,2
= r
3,4
= 0, the matrices A and D in (24) are diagonal with real entires. ||
References
1. IEEE 802.16e-2005: IEEE Standard for Local and Metropolitan Area Networks Part 16: Air
Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment 2: Physical
Layer and Medium Access Control Layers for Combined Fixed and Mobile Operation in
Licensed Bands, Feb. 2006.
2. S. M. Alamouti, A Simple Transmit Diversity Technique For Wireless Communications,
IEEE J. Sel. Areas Commun., vol. 16, pp. 1451-1458, Oct. 1998.
3. V. Tarokh, N. Seshadri, and A. R. Calderbank, Space-Time Codes for High Data Rate
Wireless Communication: Performance Criterion and Code Construction, IEEE Trans. Inf.
Theory, vol. 44, pp. 744-765, Mar. 1998.
4. P. W. Wolniansky, G. J. Foschini, G. D. Golden, and R. A. Valenzuela, V-BLAST: An Ar-
chitecture For Realizing Very High Data Rates Over The Rich Scattering Wireless Channel,
ISSSE 98, pp. 295-300, 1998.
5. L. Zheng and D. Tse, Diversity and Multiplexing: A Fundamental Tradeo in Multiple
Antenna Channels, IEEE Trans. on Inf. Theory, vol. 49, no 4, pp. 1073-1096, May 2003.
6. H. Yao and G. W. Wornell, Achieving the Full MIMO Diversity-Multiplexing Frontier with
Rotation-Based Space-Time Codes, in Proceedings Allerton Conf. Commun., Cont., and
Computing, (Illinois), Oct. 2003.
7. J.-C. Belore, G. Rekaya, and E. Viterbo, The Golden Code: A 22 Full Rate Space-Time
Code with Non Vanishing Determinants, IEEE Trans. on Inf. Theory, vol. 51, April 2005.
8. P. Dayal and M. K. Varanasi, An Optimal Two Transmit Antenna Space-Time Code And
Its Stacked Extensions, IEEE Trans. on Inf. Theory, vol. 51, pp. 43484355, Dec. 2005.
9. M. O. Sinnokrot and J. R. Barry, Fast Maximum-Likelihood Decoding of the Golden
Code, IEEE Trans. on Wireless Comm., accepted July 2009.
10. O. Tirkkonen and R. Kashaev, Combined Information and Performance Optimization of
Linear MIMO Modulations, in Proc IEEE Int. Symp. Inf. Theory (ISIT 2002), Lausanne,
Switzerland, p. 76, June 2002.
11. J. Paredes, A. B. Gershman, and M. G. Alkhanari, A New Full-Rate Full-Diversity Space-
Time Block Code With Nonvanishing Determinant and Simplied Maximum-Likelihood De-
coding, IEEE Trans. on Signal Processing, vol. 56, pp. 2461-2469, June 2008.
12. S. Sezginer and H. Sari, Full-Rate Full-Diversity 2 2 Space-Time Codes for Reduced
Decoding Complexity, IEEE Commun. Letters, vol. 11, no. 12, pp. 1-3, Dec. 2007.
13. E. Biglieri, Y. Hong, and E. Viterbo, On Fast Decodable Space-Time Block Codes, IEEE
Trans. on Inf. Theory, vol. 55, no. 2, pp. 524-530, Feb. 2009.
14. M. O. Damen, K. Abed-Meraim, and J.-C. Belore, Diagonal Algebraic Space-Time Block
Codes, IEEE Trans. on Inf. Theory, vol. 48, no. 3, pp. 628-636, Mar. 2002.