Computing on Dirty Paper: Interference-Free Integrated Communication and Computing

Kuranage Roche Rayan Ranasinghe,\!\!{}^{*} Giuseppe Thadeu Freitas de Abreu,\!\!{}^{*} David González G.\!{}^{\dagger} and Carlo Fischione
Abstract

Inspired by Costa’s pioneering work on dirty paper coding (DPC), this paper proposes a novel scheme for integrated communication and computing (ICC), named Computing on Dirty Paper, whereby the transmission of discrete data symbols for communication, and over-the-air computation (AirComp) of nomographic functions can be achieved simultaneously over common multiple-access channels. In particular, the proposed scheme allows for the integration of communication and computation in a manner that is asymptotically interference-free, by pre-canceling the computing symbols at the transmitters (TXs) using DPC principles. A simulation-based assessment of the proposed ICC scheme under a single-input multiple-output (SIMO) setup is also offered, including the evaluation of performance for data detection, and of mean-squared-error (MSE) performance for function computation, over a block of symbols. The results validate the proposed method and demonstrate its ability to significantly outperform state-of-the-art (SotA) ICC schemes in terms of both bit error rate (BER) and MSE.

Index Terms:
Dirty Paper Coding, Integrated Communication and Computing, Over-the-Air Computing.

I Introduction

The rapid proliferation of Internet of Things (IoT) devices and edge computing applications is driving the need for seamless integration of communication and computation in wireless networks, forming the basis for the integrated communication and computing (ICC) paradigm [1, 2]. This approach aims to reduce latency and resource overhead by enabling simultaneous data transmission and the over-the-air computation (AirComp) [3, 4, 5, 6] of nomographic functions over shared channels, particularly in multiple-access scenarios where interference poses significant challenges [7].

Traditional methods treat the communication and computation operations separately, leading to inefficiencies, but recent advancements in ICC have shown that joint designs can significantly enhance performance [8]. However, when discrete data symbols must be communicated alongside computing signals, mutual interference between the two tasks degrades performance, necessitating innovative interference management techniques [9].

Dirty paper coding (DPC), a foundational concept in information theory first proposed in [10], addresses similar issues by allowing a transmitter to communicate reliably in the presence of known interference through precoding, effectively “writing on dirty paper” to achieve the same channel capacity as if the interference were absent.

While many ways to implement DPC have been proposed including approaches leveraging Tomlinson-Harashima precoding [11], nested lattice codes have emerged as a particularly effective method due to their structured nature and ability to approach the theoretical limits of DPC [12, 13, 14, 15, 16]. In addition, DPC has also been successfully applied in various multifunctional communication system aspects, such as in the integrated sensing and communications (ISAC) paradigm [17, 18, 19].

Inspired by these developments, we introduce in this paper Computing on Dirty Paper, a novel ICC approach that leverages DPC to pre-cancel computing symbols at the users in a single-input multiple-output (SIMO) uplink setting, enabling the simultaneous transmission of discrete data and the computation of nomographic functions over the same multiple access channel. In particular, we demonstrate that typical DPC schemes such as the one proposed in [13] can be incorporated at the transmitter (TX), and combined with a classic linear minimum mean square error (LMMSE) estimator at the receiver (RX), to enable ICC with no impact of the AirComp operation over the bit error rate (BER) of the communication stream. A simulation-based assessment of the method in a SIMO setup is performed, which validates our approach, showing substantial improvements over state-of-the-art (SotA) benchmarks in terms of both functionalities.

Notation: Throughout the manuscript, vectors and matrices are represented by lowercase and uppercase boldface letters, respectively; 𝐈M\mathbf{I}_{M} denotes an identity matrix of size MM and 𝟏M\mathbf{1}_{M} denotes a column vector composed of MM ones; the Euclidean norm and the absolute value of a scalar are respectively given by 2\|\cdot\|_{2} and |||\cdot|; the transpose and hermitian operations follow the conventional form ()𝖳(\cdot)^{\mathsf{T}} and ()𝖧(\cdot)^{\mathsf{H}}, respectively; {}\Re{\{\cdot\}}, {}\Im{\{\cdot\}} and min()\mathrm{min}(\cdot) represents the real part, imaginary part and the minimum operator, respectively. Finally, 𝒞𝒩(μ,σ2)\sim\mathcal{CN}(\mu,\sigma^{2}) denotes the complex Gaussian distribution with mean μ\mu and variance σ2\sigma^{2}, where \sim denotes “is distributed as”.

II System and Signal Models

Consider a typical SIMO uplink setup composed of KK single-antenna user equipment (UE)/edge devices (EDs) and one base station (BS)/access point (AP) equipped with NN antennas, as illustrated in Fig. 1. Throughout this article we refer to the UEs/EDs as users, unless otherwise specified, and refer to the BS/AP as the RX.

Refer to caption
Figure 1: SIMO ICC system consisting of a RX with NN antennas and KK single antenna users.

II-A Uplink ICC Signal Model

Under the assumption of perfect symbol synchronization amongst users, the received signal 𝒚(t)N×1\bm{y}^{(t)}\in\mathbb{C}^{N\times 1} at the BS/AP subjected to fading and noise at a tt-th time slot is given by

𝒚(t)=k=1K𝒉k(t)xk(t)+𝒘(t),\vskip-4.30554pt\bm{y}^{(t)}=\sum_{k=1}^{K}\bm{h}_{k}^{(t)}{x}_{k}^{(t)}+\bm{w}^{(t)},\vskip-2.15277pt (1)

where xk(t){x}_{k}^{(t)}\in\mathbb{C} is a multifunctional transmit signal from user kk, incorporating communication and computing signals; 𝒘(t)N×1𝒞𝒩(0,σw2𝐈N)\bm{w}^{(t)}\in\mathbb{C}^{N\times 1}\sim\mathcal{CN}(0,\sigma^{2}_{w}\mathbf{I}_{N}) is the additive white Gaussian noise (AWGN) vector, and 𝒉k(t)N×1\bm{h}_{k}^{(t)}\in\mathbb{C}^{N\times 1} is the SIMO channel vector of user kk to the RX following the uncorrelated block Rayleigh fading model typically assumed in the AirComp literature [4, 20], such that the (n,k)(n,k)-th elements hn,k𝒞𝒩(0,1)h_{n,k}\sim\mathcal{CN}(0,1) of the channel matrix 𝑯(t)\bm{H}^{(t)} are assumed to be independent and identically distributed (i.i.d.) circularly symmetric complex Gaussian random variable with zero mean and unit variance, and sufficient coherence time.

II-B SotA Transmit Signal Design

Under the SotA ICC paradigm [21, 8], a trivial way to model the transmit signal is to decompose it as a sum of communication and computing components, i.e.,i.e.,

xk(t)dk(t)+ψk(sk(t)),x_{k}^{(t)}\triangleq d_{k}^{(t)}+\psi_{k}(s_{k}^{(t)}), (2)

where dk(t)𝒟d_{k}^{(t)}\in\mathcal{D} and sk(t)𝒮s_{k}^{(t)}\in\mathcal{S} denote the modulated symbol for communication and computing for user kk, respectively, with 𝒟\mathcal{D} representing an arbitrarily scaled discrete constellation of cardinality DD, e.g.e.g. quadrature amplitude modulation (QAM); 𝒮\mathcal{S} representing a discrete set following [22] for the computing symbols; while ψk()\psi_{k}(\cdot) denotes a general pre-processing function for AirComp to be elaborated in the following subsection.

The SotA RX design [8] typically consists of a two-stage approach, where the RX first estimates the individual communication symbols {dk(t)}k=1K\{d_{k}^{(t)}\}_{k=1}^{K} per time slot via a typical LMMSE or a lower complexity Gaussian belief propagation (GaBP) technique under the assumption that the computing signal is noise, followed by the evaluation of a target function f(𝒔(t))f(\bm{s}^{(t)}) via a combiner.

For future convenience, the received signal can now be reformulated in terms of matrices as

𝒚(t)=𝑯(t)𝒙(t)+𝒘(t)=𝑯(t)(𝒅(t)+𝒔(t))+𝒘(t),\bm{y}^{(t)}=\bm{H}^{(t)}\bm{x}^{(t)}+\bm{w}^{(t)}=\bm{H}^{(t)}\big(\bm{d}^{(t)}+\bm{s}^{(t)}\big)+\bm{w}^{(t)}, (3)

where the complex channel matrix 𝑯(t)[𝒉1(t),,𝒉K(t)]N×K\bm{H}^{(t)}\triangleq[\bm{h}_{1}^{(t)},\dots,\bm{h}_{K}^{(t)}]\in\mathbb{C}^{N\times K}, the concatenated transmit signal 𝒙(t)[x1(t),,xK(t)]𝖳K×1\bm{x}^{(t)}\triangleq[x_{1}^{(t)},\dots,x_{K}^{(t)}]^{\mathsf{T}}\in\mathbb{C}^{K\times 1}, the data signal vector 𝒅(t)[d1(t),,dK(t)]𝖳𝒟K×1K×1\bm{d}^{(t)}\triangleq[d_{1}^{(t)},\dots,d_{K}^{(t)}]^{\mathsf{T}}\in\mathcal{D}^{K\times 1}\subset\mathbb{C}^{K\times 1} and the computing signal vector 𝒔(t)[ψ1(s1(t)),,ψK(sK(t))]𝖳𝒮K×1K×1\bm{s}^{(t)}\triangleq[\psi_{1}(s_{1}^{(t)}),\dots,\psi_{K}(s_{K}^{(t)})]^{\mathsf{T}}\in\mathcal{S}^{K\times 1}\subset\mathbb{C}^{K\times 1} are explicitly defined.

In addition, concatenating the received signals over TT time slots and assuming that the channel 𝑯(t)\bm{H}^{(t)} (hereafter denoted as 𝑯\bm{H} for brevity) remains unchanged111The extension to time-varying channels is trivial under perfect channel state information (CSI) at the RX, and will be done in a follow-up work., we may express the received signal matrix as

𝒀=𝑯𝑿+𝑾=𝑯(𝑫+𝑺)+𝑾,\bm{Y}=\bm{H}\bm{X}+\bm{W}=\bm{H}(\bm{D}+\bm{S})+\bm{W}, (4)

where 𝒀[𝒚(1),,𝒚(T)]N×T\bm{Y}\triangleq[\bm{y}^{(1)},\dots,\bm{y}^{(T)}]\in\mathbb{C}^{N\times T}, 𝑿[𝒙(1),,𝒙(T)]K×T\bm{X}\triangleq[\bm{x}^{(1)},\dots,\bm{x}^{(T)}]\in\mathbb{C}^{K\times T}, 𝑫[𝒅(1),,𝒅(T)]𝒟K×TK×T\bm{D}\triangleq[\bm{d}^{(1)},\dots,\bm{d}^{(T)}]\in\mathcal{D}^{K\times T}\subset\mathbb{C}^{K\times T}, 𝑺[𝒔(1),,𝒔(T)]𝒮K×TK×T\bm{S}\triangleq[\bm{s}^{(1)},\dots,\bm{s}^{(T)}]\in\mathcal{S}^{K\times T}\subset\mathbb{C}^{K\times T} and 𝑾[𝒘(1),,𝒘(T)]N×T\bm{W}\triangleq[\bm{w}^{(1)},\dots,\bm{w}^{(T)}]\in\mathbb{C}^{N\times T} are the corresponding matrices.

Finally, for the sake of derivation of the proposed scheme, we assume that the computing symbols 𝒔(t)\bm{s}^{(t)} across a block of TT time slots are identical (repeatedly transmitted), i.e.,i.e., sk(t)=sk,ks_{k}^{(t)}=s_{k},\forall k, and 𝒔(t)=𝒔,t\bm{s}^{(t)}=\bm{s},\forall t, and thus 𝑺=[𝒔,,𝒔]𝒮K×TK×T\bm{S}=[\bm{s},\dots,\bm{s}]\in\mathcal{S}^{K\times T}\subset\mathbb{C}^{K\times T}.

II-C Description of the AirComp Operation

The AirComp operation consists of the evaluation of a target function f(𝒔)f(\bm{s}) at the RX, which can be described as [4]

f(𝒔)=ϕ(k=1Kψk(sk)),f(\bm{s})=\phi\bigg(\sum_{k=1}^{K}\psi_{k}(s_{k})\bigg),\vskip-4.30554pt (5)

where ϕ\phi represents the AirComp post-processing function for a general nomographic expression.

While many examples of nomographic functions are often considered in the AirComp literature [3, 23], we choose the arithmetic sum operaton for ease of exposition, given by

f(𝒔)=ϕ(k=1Kψk(sk))=k=1Ksk,f(\bm{s})=\phi\bigg(\sum_{k=1}^{K}\psi_{k}(s_{k})\bigg)=\sum_{k=1}^{K}s_{k},\vskip-4.30554pt (6)

where the corresponding pre- and post-processing functions are defined as ψk(sk)sk\psi_{k}(s_{k})\triangleq s_{k} and ϕ(k=1Kψk(sk))k=1Kψk(sk)\phi\big(\sum_{k=1}^{K}\psi_{k}(s_{k})\big)\triangleq\sum_{k=1}^{K}\psi_{k}(s_{k}).

III Computing on Dirty Paper

III-A Fundamentals on Dirty Paper Coding

Dirty paper coding (DPC), first introduced by Costa in [10], is a powerful coding technique that allows the transmission of information over a noisy channel in the presence of known interference at the TXs, without being affected by the latter. In more detail, the TX– the arbitrary UEs or EDs in our case – needs to transmit a signal dd subject to interference ss. Then, the RX receives signal y=d+s+wy=d+s+w, where ww is random noise. When ss is unknown to both the TX and RX, it can only be incorporated into the noise as previously proposed in [8] for the ICC paradigm. However, when ss is known to the TX, the RX can completely remove the interference ss by leveraging DPC, even though it does not know ss. In this paper, we introduce a novel scheme for the DPC operation in the context of ICC, termed Computing on Dirty Paper.

III-B Fundamentals on Nested Lattice Codes

For the design of the lattice, consider a standard Gaussian integer lattice [j]={a+bja,b}\mathbb{Z}[j]=\{a+bj\mid a,b\in\mathbb{Z}\} with generator matrix defined to be 𝐈2\mathbf{I}_{2}, as illustration in Fig. 2, which is simple222A potential extension would be the use of Einstein integers for hexagonal packing. and effective for complex signals (equivalent to a square lattice in 2\mathbb{R}^{2}) in a similar fashion to [13] as follows:

Coarse lattice: Let Λc=Δ[j]\Lambda_{c}=\Delta\mathbb{Z}[j]\subset\mathbb{C}, where Δ>0\Delta>0 sets the modulo region; i.e.,i.e., the “coarse lattice cube” bounded by sides of length [Δ/2,Δ/2][-\Delta/2,\Delta/2]. This choice ensures that the transmit power is bounded during the modulo operation.

Fine lattice: Let Λf=δ[j]\Lambda_{f}=\delta\mathbb{Z}[j], with δ=Δ/M\delta=\Delta/\sqrt{M} and M=22RM=2^{2R} where MM represents the (integer) number of constellation points inside each coarse lattice cell and rate RR denotes the number of bits per complex symbol for dkd_{k}.

Cosets: Each data symbol dkd_{k} now corresponds to a coset of Λf\Lambda_{f} where

vk+Λc,vkΛf𝒱(Λc),\vskip-4.30554ptv_{k}+\Lambda_{c},v_{k}\in\Lambda_{f}\cap\mathcal{V}(\Lambda_{c}), (7)

with 𝒱(Λc)\mathcal{V}(\Lambda_{c}) denoting the Voronoi region of the coarse lattice Λc\Lambda_{c}, which is a square in the complex plane (of area Δ2\Delta^{2}), with distortion bounded by Δ/2\Delta/\sqrt{2} in Euclidean norm for nearest-neighbor quantization.

Note that the transmit constellation is the set of all coset representatives inside a single Voronoi cell, and not the entire coset. For a more compresensive overview of nested lattice codes, the reader is referred to [24].

III-C Transmitter Design

Reintroducing the time-varying component for the data, let each transmit user know its own encoded data symbol vk(t)Λf𝒱(Λc)v_{k}^{(t)}\in\Lambda_{f}\cap\mathcal{V}(\Lambda_{c}) and computing symbol picked from the rotated set 𝒮rot𝐑𝒮={𝐑sk|skΛf𝒱(Λc)}\mathcal{S}_{\text{rot}}\triangleq\mathbf{R}\,\mathcal{S}=\bigl\{\mathbf{R}\,s_{k}\,\big|\,s_{k}\in\Lambda_{f}\cap\mathcal{V}(\Lambda_{c})\bigr\} to maximize orthogonality, where

𝐑12[1111].\vskip-4.30554pt\mathbf{R}\triangleq\frac{1}{\sqrt{2}}\begin{bmatrix}1&-1\\ 1&1\end{bmatrix}. (8)

Nested lattice-based DPC encodes the communications symbols vk(t)v_{k}^{(t)} leveraging a modulo operation such that the transmit symbol v~k(t)\tilde{v}_{k}^{(t)} is given by

v~k(t)=modL(vk(t)sk,Δ),\tilde{v}_{k}^{(t)}=\text{modL}(v_{k}^{(t)}-s_{k},\Delta), (9)

where the modL(a,b)\text{modL}(a,b) operation is defined as333An optional dither u~k\tilde{u}_{k} can be considered, uniformly distributed over 𝒱(Λc)\mathcal{V}(\Lambda_{c}) and known to both the TX and RX to randomize transmission, but is ignored for simplicity.

modL(a,b)\displaystyle\text{modL}(a,b)\triangleq
(mod({a}+b2,b)b2)+j(mod({a}+b2,b)b2),\displaystyle\hskip-43.05542pt\Big(\text{mod}\big(\Re\{{a}\}\!+\!\tfrac{b}{2},b\big)\!-\!\tfrac{b}{2}\Big)\!+\!j\Big(\text{mod}\big(\Im\{{a}\}\!+\!\tfrac{b}{2},b\big)\!-\!\tfrac{b}{2}\Big),

with mod(a,b)\text{mod}(a,b) denoting the standard modulo operation.

Then, the multifunctional transmit signal xk(t)x_{k}^{(t)} across TT time slots (analogous to the SotA expression in equation (2)) can be expressed as

xk(t)=v~k(t)+sk,x_{k}^{(t)}=\tilde{v}_{k}^{(t)}+s_{k}, (11)

where we emphasize that the computing symbol sk,ks_{k},\forall k remains unchanged across TT time slots.

Refer to caption
Figure 2: Nested lattice structure with coarse lattice Λc\Lambda_{c} and fine lattice Λf\Lambda_{f}.

III-D Receiver Design

After transmission of TT slots over a typical Rayleigh fading channel, the received signal in matrix form can be expressed as

𝒀=𝑯𝑿+𝑾=𝑯(𝑽~+𝑺)N×T,\vskip-4.30554pt\bm{Y}=\bm{H}\bm{X}+\bm{W}=\bm{H}(\tilde{\bm{V}}+\bm{S})\in\mathbb{C}^{N\times T}, (12)

where similarly to previous definitions, 𝑽~[𝒗~(1),,𝒗~(T)]K×T\tilde{\bm{V}}\triangleq[\tilde{\bm{v}}^{(1)},\dots,\tilde{\bm{v}}^{(T)}]\in\mathbb{C}^{K\times T} with 𝒗~(t)[v~1(t),,v~K(t)]𝖳K×1\tilde{\bm{v}}^{(t)}\triangleq[\tilde{v}_{1}^{(t)},\dots,\tilde{v}_{K}^{(t)}]^{\mathsf{T}}\in\mathbb{C}^{K\times 1} and 𝑺=[𝒔,,𝒔]𝒮rotK×TK×T\bm{S}=[\bm{s},\dots,\bm{s}]\in\mathcal{S}_{\text{rot}}^{K\times T}\subset\mathbb{C}^{K\times T}.

Note that different time slots contain different data symbols v~k\tilde{v}_{k}, retaining the full rate in terms of data transmission identical to typical communications systems, while the computing symbols sks_{k} remain unchanged across TT time slots to improve the mean-squared-error (MSE) performance of the function evaluation. One can then apply a LMMSE estimator per tt-th time frame at the receiver to obtain 𝒙^(t)\hat{\bm{x}}^{(t)}, which can be expressed as

𝒙^(t)=(𝑯𝖧𝑯+σw2𝐈K)1𝑯𝖧𝒚(t).\vskip-4.30554pt\hat{\bm{x}}^{(t)}=(\bm{H}^{\mathsf{H}}\bm{H}+\sigma_{w}^{2}\mathbf{I}_{K})^{-1}\bm{H}^{\mathsf{H}}\bm{y}^{(t)}. (13)

Next, a temporary variable 𝒛^\hat{\bm{z}} can be calculated via the modulo operation

𝒛^(t)=modL(𝒙^(t),Δ),\hat{\bm{z}}^{(t)}=\text{modL}(\hat{\bm{x}}^{(t)},\Delta), (14)

which can then be leveraged to estimate 𝒗^(t)\hat{\bm{v}}^{(t)} via

𝒗^(t)=modL(𝒬Λf(𝒛^(t),δ),Δ),\hat{\bm{v}}^{(t)}=\text{modL}\big(\mathcal{Q}_{\Lambda_{f}}(\hat{\bm{z}}^{(t)},\delta),\Delta\big), (15)

where 𝒬Λf()\mathcal{Q}_{\Lambda_{f}}(\cdot) denotes the nearest-neighbor quantizer to the fine lattice Λf\Lambda_{f}, and is defined as

𝒬Λf(a,b)b(round({a}bϵ)+ϵ)+jb(round({a}bϵ)+ϵ),\mathcal{Q}_{\Lambda_{f}}(a,b)\!\triangleq\!b\Big(\text{round}\big(\tfrac{\Re\{{a}\}}{b}-\epsilon\big)+\epsilon\Big)+jb\Big(\text{round}\big(\tfrac{\Im\{{a}\}}{b}-\epsilon\big)+\epsilon\Big), (16)

with round()\text{round}(\cdot) denoting the rounding operation to the nearest integer and ϵmod(M12,b)\epsilon\triangleq\text{mod}\Big(\frac{\sqrt{M}-1}{2},b\Big).

Finally, a hard decision against the constellation Λf𝒱(Λc)\Lambda_{f}\cap\mathcal{V}(\Lambda_{c}) can be performed to obtain the final estimate of the encoded data symbols 𝒗^(t)\hat{\bm{v}}^{(t)}.

In order to recover the computing symbols, a novel best-case bound444Although the estimation of each individual computing symbol sks_{k} cannot be considered AirComp strictly, this initial estimation procedure provides a proof-of-concept bound for the operation.  can be derived in the form of a maximum likelihood estimator which can be expressed as

𝒔^=argmin𝒔𝒮rotK×1t=1T𝒚(t)𝑯(modL(𝒗^(t)𝒔,Δ)+𝒔)22,\hat{\bm{s}}\!=\!\arg\min_{\bm{s}\in\mathcal{S}_{\text{rot}}^{K\times 1}}\sum_{t=1}^{T}\big\|\bm{y}^{(t)}\!-\!\bm{H}\big(\mathrm{modL}(\hat{\bm{v}}^{(t)}\!-\!\bm{s},\Delta)\!+\!\bm{s}\big)\big\|_{2}^{2}, (17)

where each element s^k\hat{s}_{k} of 𝒔^\hat{\bm{s}} is chosen from the discrete set 𝒮rot\mathcal{S}_{\text{rot}} that has the lowest error across all time instances TT, naturally improving the MSE performance as TT increases.

The computational complexity of equation (17) is dominated by the number of KK users, since an exponential scaling is needed to compare with a constellation of size MM such that the dominant complexity is given by MKM^{K} in order to obtain a maximum likelihood estimate.

Finally, the target function can be computed as

f^(𝒔)=k=1Ks^k.\hat{f}(\bm{s})=\sum_{k=1}^{K}\hat{s}_{k}. (18)

IV Performance Analysis

To evaluate the performance of the proposed scheme, let us first visualize the complete nested lattice structure that is used, as shown in Fig. 3. Notice that each coarse lattice cell contains M=22RM=2^{2R} constellation points, where RR is the number of bits per complex symbol for data and this fine lattice (corresponding to a scaled quadrature phase-shift keying (QPSK)) is used for data symbol transmission. In addition, to maximize orthogonality between data and computing symbols, the computing symbols are chosen from a rotated version of the fine lattice constellation, as previously described.

Refer to caption
Figure 3: Nested lattice structure with coarse lattice Λc\Lambda_{c} and fine lattice Λf\Lambda_{f}.
Refer to caption
(a) T=5T=5 (Short Frame Structure)
Refer to caption
(b) T=10T=10 (Long Frame Structure)
Figure 4: Comparison of BER and MSE performances of SotA [8] and proposed computing on dirty paper ICC schemes.

In order to bound the transmit power for a fair comparison with the SotA, we set the coarse lattice parameter to be Δ=2\Delta=2, which leads to a transmit power of E[|xk|2]=Ed+Es=0.5+0.5=1E[|x_{k}|^{2}]=E_{d}+E_{s}=0.5+0.5=1 per user, where Ed=E[|dk|2]=0.5E_{d}=E[|d_{k}|^{2}]=0.5 and Es=E[|sk|2]=0.5E_{s}=E[|s_{k}|^{2}]=0.5 are the average powers of data and computing symbols, respectively.

The parameters used in the simulations are K=2K=2 users, N=5N=5 antennas at the RX, an alternating time slot of T=5,10T=5,10, and R=2R=2 bits/symbol (i.e., for QPSK).

Figure 4(a) and 4(b) show the BER and MSE performance of the proposed scheme compared to the SotA ICC method in [8], where the latter uses a two-stage approach with a GaBP detector for data detection followed by a linear combiner for function estimation. As seen, the proposed scheme achieves significant performance gains in both BER and MSE compared to the SotA, with the performance gap increasing with signal-to-noise ratio (SNR). This is because the proposed scheme effectively eliminates the interference between data and computing symbols via DPC, allowing both tasks to be performed more accurately. In addition, increasing the number of time slots TT improves the MSE performance for the proposed scheme, as more observations are available for function estimation.

V Conclusion

We proposed Computing on Dirty Paper, a new scheme for ICC inspired by DPC. By pre-canceling computing symbols at the transmitting users, the scheme enables interference-free communication and computation over multiple-access channels. Analysis under a SIMO ICC system and supporting simulations show that the approach achieves superior BER and MSE performance compared to SotA ICC methods.

References

  • [1] D. Wen, Y. Zhou, X. Li, Y. Shi, K. Huang, and K. B. Letaief, “A survey on integrated sensing, communication, and computation,” IEEE Communications Surveys & Tutorials, pp. 1–1, 2024.
  • [2] Y. Qi, Y. Zhou, Q. Cai, H. Zhang, Y. Xu, J. Shi, and S. Li, “Architecture, characteristics, and resource management of integration of sensing, communications, and computing in 6G,” IEEE Network, vol. 38, no. 2, pp. 54–61, 2024.
  • [3] B. Nazer and M. Gastpar, “Computation Over Multiple-Access Channels,” IEEE Transactions on Information Theory, vol. 53, no. 10, 2007.
  • [4] W. Liu, X. Zang, Y. Li, and B. Vucetic, “Over-the-Air Computation Systems: Optimization, Analysis and Scaling Laws,” IEEE Transations on Wireless Communications, vol. 19, no. 8, 2020.
  • [5] Q. Qi, X. Chen, C. Zhong, and Z. Zhang, “Integrated Sensing, Computation and Communication in B5G Cellular Internet of Things,” IEEE Transactions on Wireless Communications, vol. 20, no. 1, 2021.
  • [6] K. Ando, K. Sato, G. T. F. de Abreu, D. G. G., and O. Gonsa, “Bayesian optimization aided low-complexity beamforming design for over-the-air-computing,” IEEE Internet of Things Journal, vol. 12, no. 14, pp. 28 177–28 189, 2025.
  • [7] X. Huang, H. Hellström, and C. Fischione, “Low-Complexity OTFS-Based Over-the-Air Computation Design for Time-Varying Channels,” IEEE Transactions on Wireless Communications, 2025.
  • [8] K. R. R. Ranasinghe et al., “A flexible design framework for integrated communication and computing receivers,” 2025. [Online]. Available: https://arxiv.org/abs/2506.05944
  • [9] S. Ye, D. Zhang, M. Xiao, and M. Skoglund, “Integrated Communication and Computation Empowered by Fluid Antenna Array,” in Proc. IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2024.
  • [10] M. Costa, “Writing on dirty paper (corresp.),” IEEE Transactions on Information Theory, vol. 29, no. 3, pp. 439–441, 1983.
  • [11] Z. C. Zhang and A. Chaaban, “Precoding for a class of peak-constrained dirty paper channels with a discrete state,” in 2023 IEEE Wireless Communications and Networking Conference (WCNC), 2023, pp. 1–6.
  • [12] R. Zamir, S. Shamai, and U. Erez, “Nested linear/lattice codes for structured multiterminal binning,” IEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1250–1276, 2002.
  • [13] U. Erez and S. ten Brink, “A close-to-capacity dirty paper coding scheme,” IEEE Transactions on Information Theory, vol. 51, no. 10, pp. 3417–3432, 2005.
  • [14] T. Liu, P. Moulin, and R. Koetter, “On error exponents of modulo lattice additive noise channels,” IEEE Transactions on Information Theory, vol. 52, no. 2, pp. 454–471, 2006.
  • [15] Y. Kochman and R. Zamir, “Joint wyner–ziv/dirty-paper coding by modulo-lattice modulation,” IEEE Transactions on Information Theory, vol. 55, no. 11, pp. 4878–4889, 2009.
  • [16] S.-C. Lin, P.-H. Lin, C.-P. Lee, and H.-J. Su, “Filter and nested lattice code design for mimo fading channels with side-information,” IEEE Transactions on Communications, vol. 59, no. 6, pp. 1489–1494, 2011.
  • [17] H. Li, “Dirty paper coding for waveform synthesis in integrated sensing and communications: A broadcast channel approach,” in ICC 2022 - IEEE International Conference on Communications, 2022, pp. 1568–1573.
  • [18] H. Nikbakht, Y. C. Eldar, and H. V. Poor, “An integrated sensing and communication system for time-sensitive targets with random arrivals,” arXiv preprint arXiv:2506.15045, 2025.
  • [19] ——, “A mimo isac system for ultra-reliable and low-latency communications,” arXiv preprint arXiv:2501.13025, 2025.
  • [20] K. Ando and G. T. F. de Abreu, “Low-Complexity and High-Performance Combiners for Over the Air Computing,” in Proc. IEEE 9th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), 2023.
  • [21] K. R. R. Ranasinghe, K. Ando, and G. T. Freitas de Abreu, “From theory to reality: A design framework for integrated communication and computing receivers,” in 2025 International Conference on Computing, Networking and Communications (ICNC), 2025, pp. 865–870.
  • [22] S. Razavikia, J. M. Barros da Silva, and C. Fischione, “ChannelComp: A general method for computation by communications,” IEEE Transactions on Communications, vol. 72, no. 2, pp. 692–706, 2024.
  • [23] Z. Wang, Y. Zhao, Y. Zhou, Y. Shi, C. Jiang, and K. B. Letaief, “Over-the-Air Computation for 6G: Foundations, Technologies, and Applications,” IEEE Internet of Things Journal, vol. 11, no. 14, Jul. 2024.
  • [24] R. Zamir, B. Nazer, Y. Kochman, and I. Bistritz, Lattice Coding for Signals and Networks: A Structured Coding Approach to Quantization, Modulation and Multiuser Information Theory. Cambridge University Press, 2014.