On Outer Bounds to the Capacity Region of Wireless Networks

Size: px
Start display at page:

Download "On Outer Bounds to the Capacity Region of Wireless Networks"

Transcription

1 On Outer Bounds to the Capacity Region of Wireless Networks Sahand Haji Ali Ahmad Aleksandar Jovičić and Pramod Viswanath August Abstract We study the capacity region of a general wireless network by deriving fundamental upper bounds on a class of linear functionals of the rate tuples at which joint reliable communication can take place. The widely studied transport capacity is a specific linear functional: the coefficient of the rate between a pair of nodes is equal to the Euclidean distance between them. The upper bound on the linear functionals of the capacity region is used to derive upper bounds to scaling laws for generalized transport capacity: the coefficient of the rate between a pair of nodes is equal to some arbitrary function of the Euclidean distance between them for a class of imum distance networks. This upper bound to the scaling law meets that achievable by multihop communication over these networks for a wide class of channel conditions; this shows the optimality in the scaling-law sense of multihop communication when studying generalized transport capacity of wireless networks. Introduction A characterization of the capacity region of wireless networks is one of the long standing open problems in information theory. Progress in this direction has recently come by This research was supported in part by the National Science Foundation under grant CCR-0343 and a grant from Motorola Inc. as part of the Motorola Center for Communication. S. Haji Ali Ahmad A. Jovičić and P. Viswanath are with the department of Electrical and Computer Engineering at the University of Illinois at Urbana-Champaign. {alihajijovicicpramodv}@uiuc.edu

2 relaxing the questions asked: focus has been on the transport capacity [3] a specific linear functional of rate tuples at which jointly reliable communication is possible. The coefficient of the rate between a pair of nodes in this linear functional is equal to the Euclidean distance between the two nodes. Further much emphasis is on the scaling law of the transport capacity as a function of the number of nodes in the network. Recent results have shown that multihop communication is scaling-law optimal for a class of imum distance networks provided the wireless channel decays fast enough [4 7 8]. A study of the sum capacity of the wireless network appears in [5]. In an effort to understand the entire capacity region of the wireless network we shift the focus from transport or sum capacity to studying arbitrary linear functionals of the rate tuples in the capacity region. The capacity region is a compact convex set. Thus understanding the extremum of linear functionals of the rate tuples in the capacity region is an alternative but equivalent characterization (the convex dual in the language of convex analysis; see [6]) of the capacity region. In this paper we derive simple and robust upper bounds to a class of linear functionals: the upper bound simply depends on the distance between the nodes channel attenuation conditions and the coefficients of the linear functional. The key technique is a combination of the results of isometric embeddability of an arbitrary metric space into the l metric space and the familiar information-theoretic cut-set upper bounds to the capacity region. We use this simple upper bound to exactly characterize the scaling law behavior over arbitrary linear and planar networks of generalized transport capacity def C f = max R ij f(r ij ) () (R ij ) in the capacity region where and R ij and r ij denote respectively the rate of reliable communication and the Euclidean distance between a pair of nodes (ij). When f( ) is the identity function i.e. f(x) = x we get back the transport capacity. The scaling law of generalized transport capacity depends crucially on the long range behavior of the function f( ); of particular interest is the parameter α f def = lim x ( log f(x) log x ij= ). () To be able to state the scaling law precisely we briefly describe our wireless channel model adopted from [4]: the received signal at node j at time m is y j [m] = i j h s ij[m] ( + r ij ) δ x i[m] + z j [m]. (3) Here x i [m] is the signal transmitted by node i at time m and z j [m] is i.i.d. white Gaussian noise. Each node j has an average transmit power constraint (denoted by P j ).

3 The fading channel { h s ij[m] } is a stationary and ergodic zero-mean stochastic process m that is independent for each pair of nodes (ij) and models the small scale fluctuations of frequency flat fading. For simplicity we assume that E[ h s ij[m] ] = for all ijm. The large scale variations are modeled explicitly through the decay of signal level: a factor of from node i to node j. In free space δ = with a single reflected path along (+r ij ) δ with the line of sight it becomes equal to two and it can be larger than.5 in crowded urban environments. As in [4] we consider two (disparate) models of the wireless fading channel. If the channel variations are slow enough so that coherent communication is possible we model this scenario by allowing full knowledge at each node of the fading channels from all the other nodes. This is also known as the full-csi scenario (channel state information at both the transmitter and receiver nodes). In the scenario where the channel is changing rapidly enough so that coherent communication is not feasible our model is to assume complete ignorance of the channel realizations by all the nodes. This is the no CSI model. Clearly these are two extreme models but they serve to cover the ranges of channel fluctuations and allow us to make simple statements about the network communication problem. Our main results are the following:. The generalized transport capacity of imum distance networks with n nodes on a line is upper bounded by K n for δ > + 0.5α f as long as α f. With no CSI the same bound holds when δ > α f and α f.. The generalized transport capacity of imum distance networks with n nodes on a plane is upper bounded by K n for δ > + 0.5α f as long as α f. With no CSI the same bound holds with δ > + 0.5α f and α f. With multihop communication the generalized transport capacity is lower bounded by K 0 n [8] so the upper bounds to the scaling law we derive are actually tight. This shows the optimality in the sense of the scaling-law of the generalized transport capacity of operating the wireless network in the multihop communication mode. These results also strictly strengthen the scaling law characterization of the transport capacity in [4] and [7] when f(r) = r: the bounds therein require at least δ >.5 for linear networks and δ >.5 for planar networks with full CSI for linear scaling to hold. Further our result is robust to power fluctuations in the network: in particular the result continues The far field signal decay is usually denoted by r δ ij. Here we have written ( + r ij) δ to ensure that our model makes sense when nodes get close; i.e. the average received power is not more than the average transmit power. 3

4 to hold even when only the total power in the network is allowed to grow linearly with the number of nodes. Finally when the function f( ) is super-linear if α f > δ then the generalized transport capacity of imum distance linear networks grows super-linearly with the number of nodes. We have organized the results into two parts. First we derive an upper bound to a class of linear functionals (where the coefficients of the linear functional constitute a metric space) of rate tuples in the capacity region of an arbitrary wireless network; this is done in Section. Second we use this upper bound to derive the optimal scaling law of the generalized transport capacity of imum distance wireless networks; this is done in Section 3. Upper Bounds to Linear Functionals over the Capacity Region We are interested in the extremum of linear functionals over the capacity region: C {aij } def = max (R ij ) capacity region a ij R ij a ij 0 (4) ij= where there are n nodes in the network N def = {...n}. Our interest stems from the fact that the collection of the extremum values C {aij } for all a ij 0 is a precise representation (the convex dual) of the capacity region. In this section we derive upper bounds to C {aij } for a class of linear functionals represented by {a ij }. There are two key ideas that we use:. Given any disjoint partition (or cut) of the network (i.e. C + C N such that C + C = and N = C + C ) we can bound the sum-rate at which the nodes in C + can reliably communicate to the nodes in C by the well-known cut-set bound (Theorem 4.0. in []).. We weight the different cuts appropriately: we want the probability that a pair of nodes (ij) gets cut to be proportional to a ij. Then we can average the bound on the sum-rate over all the possible cuts to arrive at an upper bound to the linear functional of interest. 4

5 The first step can be achieved for any cut of the network. However the second step can be achieved only for a certain specific set of coefficients {a ij }. In particular the set of coefficients needs to satisfy a geometric property: there has to be some dimension m such that n points can be positioned in R m with the property that the set of l distances between every pair of points exactly coincides with the set of coefficients {a ij }. Mathematically this requirement is stated as the following: the set of {a ij } is isometrically embeddable in l. This is an important result from the theory of metric spaces and we state this as a lemma. Lemma. (Prop. 4.. of []). The set of distances {a ij ij N } is isometrically embeddable in l if and only if there exist non-negative numbers { P{C + C } C + N and C = N C +} such that a ij = C + N: i C + j C P {C + C }. One implication of this result is that any nonnegative linear combination of isometrically l -embeddable coefficent sets {a ij }s is also isometrically l -embeddable. Apart from this general observation the embeddability condition imposes some obvious conditions on the coefficients {a ij }; in particular they must be the distances of some n-point metric space. In other words. a ii = 0; this is however not a serious limitation since we do not intend to allow communication from a node to itself and there is no loss in generality in supposing the coefficient of R ii to be zero.. a ij = a ji ; so we are weighing the rate from node i to j equally with the rate from node j to i. 3. a ij + a ik a jk ; the triangle inequality. For n 4 nodes the above three conditions are sufficient as well for the set {a ij } to be isometically embeddable in l. For large n the problem of detering when a set of distances is isometrically embeddable in l is computationally hard: it is NP-complete ([] p. 49). For values of n 7 closed form necessary and sufficient conditions are available in [] pp Our interest however is to use this result only as an intermediary step in deriving an upper bound to the linear functional C {aij }; thus the computational issues are hardly of any concern here. The l distance between a pair of points in R m is the sum of the absolute value of the distances between the pair of points in each of the m dimensions. 5

6 Now we are ready to state and prove the main theorem of this section: an upper bound to C {aij }. Suppose each node i in the network N = {...n} is power limited to P i. Theorem.. Consider an arbitrary configuration N of n nodes in the plane. Assume that the set {a ij } is isometrically l -embeddable. With no channel state information (CSI) at the nodes a ij C {aij } < P i. (5) ( + r ij ) δ With full CSI at the nodes C {aij } < ik= j= ij= { } (a ij a kj ) Pi P k + ( + r ij ) δ ( + r kj ) δ ij= P i a ij. (6) ( + r ij ) δ Remark: Since the second term in (6) is exactly the no-csi bound in (5) the significance of the first term in (6) is that it is a bound on the communication gain of having CSI at all the nodes. The proof of Theorem. is relegated to Appendix A.. Examples of Linear Functionals.. Rate Coefficients as Functions of Distance If we substitute a ij = r ij the Euclidean distance (l distance) between the pair of nodes (ij) we see that expression (6) is a strengthening of expression (6) in Theorem. of [4]: the improvement in the bound comes from using a single fixed distribution of network inputs for all possible cuts of the network (see Appendix A). The bound given in (5) remains the same as expression (5) in Theorem. of [4]. For this special choice of coefficients a ij = r ij we can then use a random line as in [4] to geographically partition the network so that the probability that any pair of nodes is cut by the line is proportional to the Euclidean distance between the nodes. Since a set of distances that are embeddable in the l metric space are isometrically embeddable in the l metric space (Prop []) we can cast the utility of the random line construction in [4] as a special case of the Lemma. above. In particular the probability that a pair 6

7 of nodes (ij) is cut using the random line is (cf. (0) in [4]) P [ i C + j C ] = r ij πd n (7) where d n is the radius of a circle that contains all the n points in the network. To arrive at the statement of Theorem. we choose the probabilities of the cuts explicitly so that (7) is replaced by the implication from Lemma.: P [ i C + j C ] = a ij A (8) for some constant A chosen such that the quantity on the left side of the equation above summed over all possible cuts sums to unity. The proof of expression (6) in Theorem. uses these observations and is given in Appendix A. An important class of coefficients {a ij } that is isometrically l -embeddable is the following ([] p. 4): a ij = r α ij 0 α. (9) In particular α = 0 corresponds to a ij = for each pair of nodes (ij) and thus the corresponding linear functional is simply the sum capacity of the network. Further for any density function g( ) a ij = 0 r α ij g(α) dα is also isometrically embeddable; this is a special case of the earlier observation that nonnegative linear combinations of isometrically l embeddable coefficients also are isometrically l embeddable. We use this result to study the scaling law behavior of generalized transport capacity in Section 3... Extension to an Arbitrary Metric Space Up until now we have required that the finite metric space whose distances are given by {a ij } be isometrically embeddable into an l space i.e. that the distances be exactly preserved. However if we allow embeddings that introduce some relative distortion in the distances we can extend our upper bounds to any linear functional as long as its coefficients are distances in some metric space. Lemma.3 (Bourgain 985 see [] Theorem 0..). Suppose {a ij } is the distance between x i and x j in some n point metric space N. There exists an embedding f : N R m such that f(x i ) f(x j ) a ij c 0 log n f(x i ) f(x j ) 7

8 for all xy N where denotes the l norm and c 0 < 9 is a constant. This theorem allows us to state the following corollary to Theorem.: Corollary.. Consider an arbitrary configuration N of n nodes in the plane. Assume that the set {a ij } represents distances in some metric space. With no channel state information (CSI) at the nodes With full CSI at the nodes C {aij } < c 0 log n ik= C {aij } < c 0 log n j= ij= P i a ij ( + r ij ) δ. { } (a ij a kj ) Pi P k + c ( + r ij ) δ ( + r kj ) δ 0 log n ij= P i a ij ( + r ij ) δ. The proof of this corollary follows the proof of Theorem. (Appendix A) along with the following observation: by Lemma.3 ij R ija ij c 0 log n ij R ijã ij where ã ij := f(x i ) f(x j ). Now Lemma. guarantees that there exists a distribution on the cut-sets (C + C ) for which P [i C + j C ] is proportional to ã ij. Averaging over this distribution and using the left-hand inequality in Lemma.3 we obtain the desired result...3 Metric Spaces Defined on Planar Graphs Lemma. states that it is possible to embed any metric space into l with distortion at most O(log n). However if the metric space in question is defined on a certain type of planar graph there exist l embeddings with distortion that is independent of n. In particular a graph metric 3 defined on any treewidth- planar graph can be embedded into l with distortion of at most 4 (see Theorem 4. of [9]). Hence for such metric spaces we can strengthen the statement of Corrollary. by replacing the log n factor with the constant 4. The long-standing conjecture is that every metric defined on a planar graph can be embedded into l with constant distortion. Moreover the set of all planar graphs whose metrics are isometrically l embeddable (i.e. embeddable with unit distortion) is exactly the set of planar graphs that do not 3 The distance between any two nodes is the smallest sum of (non-negative) weights on any path between them. 8

9 contain K 3 as a or (see Proposition 3. of [9]). For such metric spaces we can directly apply Theorem.. weight= weight= Figure : It can be shown (see [] Example 6.3.) that the metric space generated by this complete bipartite graph (also known as K 3 ) is not isometrically embeddable in l. 3 Scaling Laws for Generalized Transport Capacity Our upper bound to the extremum of linear functionals of the capacity region was for arbitrary network topologies. Here we focus on a specific network topology imum distance networks to study the scaling law behavior of generalized transport capacity. We consider both linear and planar networks with imum distance between the nodes denoted by r > 0. Suppose the average power constraint of each radio is uniformly upper bounded by P. Our main result is the following: the generalized transport capacity scales linearly with the number of nodes n provided:. the function f(r) grows sublinearly with the Euclidean distance r i.e. α f (cf. ()) and. the channel decays fast enough relative to the growth of the function f(r). Theorem 3.. Suppose the nodes lie on a line at a distance of at least r > 0 from each other.. With no CSI at the nodes the generalized transport capacity is upper bounded by for all δ > +α f and α f. C f < Pζ (δ α f) n r δ α f 9

10 . With full CSI at the nodes the generalized transport capacity is upper bounded by C f < P r δ α f as long as δ > + α f 4 and α f. {G(α f δ) + ζ (δ α f )} n Here we have defined the constant def G(α f δ) = ( {ζ (δ α f ) + K (α f δ) ζ δ α f ) [ ( + δ α f 4 ζ δ α ) ( ( f + K (α f δ) c (α f δ) ζ δ α ) ( f ζ δ α f ))]} 4 4 where ζ (δ) def = i= i δ is the Riemann-Zeta function (a finite number for δ > ) ( c (α f δ) def ) ( = 3 α f δ+ 3 4 α f δ+ ) and K (α f δ) def = (δ 3α f ). Theorem 3.. For planar networks with a distance of at least r > 0 between any two nodes the scaling law is similar:. With no CSI at the nodes the generalized transport capacity is upper bounded by for δ > + α f and α f. C f < (π + )Pζ (δ α f ) n r δ α f. With full CSI at the nodes the generalized transport capacity is upper bounded by C f < P r δ α f for δ > + α f 4 and α f. Here we have defined the constant H(α f δ) + δ α f 4 def [ ζ {H(α f δ) + (π + )ζ (δ α f )} n { ( ζ δ α f 3 ) = (π + ) 3 ( δ α ) f 4 + K (α f δ) c (α f δ)ζ (δ α f ) + K (α f δ) ζ (δ αf ) ]} where ζ(δ) is as defined in Theorem 3. K (α f δ) def = ( δ 3α f ) and c (α f δ) def = ( ) ( ) 3 α. f δ+ 3 4 α f δ+ 0

11 The first step in the proofs of the above two theorems an upper bound to the linear functional of interest has been generalized for a class of coefficients {a ij } in Theorem.. Since the choice of coefficients a ij = r α ij for α is isometrically l -embeddable (see (9)) the bound in Theorem. can be used to evaluate an upper bound to the generalized transport capacity for functions of the form f(r) = r α for α. The proof of the full-csi cases is given in Appendix B and C. The no-csi case is treated very similarly to Corollaries 3. and 3. in [4] except that the conditions on the signal decay parameter δ now depend α f. Remark : For the special case of a ij = r ij the result of Theorem. is a strict improvement over the previous results on the scaling behavior of transport capacity [4 7]: the bounds therein require at least δ >.5 for linear networks and δ >.5 for planar networks with full CSI for linear scaling to hold. Remark : When a ij = for all ij we establish the optimality of multihop with respect to sum-capacity of the network for δ > in a linear and δ > in a planar network. Sum capacity bounds for a particular traffic pattern (across a single cut of the network) have been studied in [5]. Our results hold regardless of the assumptions on the traffic pattern. Remark 3: Exaing the origin of the constant factors in the bounds of Theorems 3. and 3. we observe that it is the communication between near-by nodes that deteres the requirement on the path-loss parameter for linear scaling to hold. This vicinity is quantified in the proofs. So far we have only considered functions f( ) that are sub-linear in n. What happens when the function is super-linear in n? It turns out that in this case the generalized transport capacity can grow faster than the number of nodes in the network. The communication strategy that achieves this is coherent multi-stage relaying and interference cancellation described in Theorem 4.3 of [7]. The following statement based directly on Theorem 3.6 of [7] makes this precise: Proposition 3.. The generalized transport capacity for linear imum-distance networks can grow super-linearly with the number of nodes n according to Ω(n α f/δ ) as long as α f > δ. This scaling law is also optimal when < δ < and α f > δ. A Proof of the full-csi case in Theorem. The cut-set bound (Theorem 4.0. of []) applied to a network N with the channel model given in (3) and with full CSI at all the nodes can be stated in the following way:

12 There exists a n n covariance matrix Q (with (Q) ii P i for all i N) such that the sum-rate at which the nodes in C + can reliably communicate to the nodes in C satisfies i C + j C R ij < log det(i + H C Q C H C ) for every disjoint partition C = (C + C ) of N where the C + C + matrix Q C is obtained by retaining only the elements lying in the rows and columns of Q that are indexed by i C + (i.e. it is a principal submatrix) and where the C C + matrix H C is obtained by retaining only the rows and columns of H that are indexed by j C and i C + respectively. The entries (H) ij are independent zero mean random variables with variance (+r ij. Note that the principal submatrix Q ) δ C is always positive semi-definite. We can then further upper-bound the sum-rate by using the Hadamard bound in the log-det expression followed by the inequality log( + x) x: log det(i + H C Q C H C ) ) ( + h j (C)Q C h j (C) j C log = log + h ji (Q) ik h jk j C ik C + (Q) ik h ji h jk {i C + k C + j C }. ik= Here we have used h j (C) to denote the j-th row of the submatrix H C and { } to denote the indicator function. Thus we obtain an upper-bound on C {aij }: [ [ ]] C {aij } < A E H max E C (Q) ik h ji h jk {i C + k C + j C } Q 0: (Q) ii P i ik= j= [ ] = A E H max (Q) ik h ji h (a ji a jk ) jk (0) Q 0: (Q) ii P i A ik= j= [ ] E H Pi P k h ji h jk (a ji a jk ) () ik= j= [ = Pi P k E H h ji h ] jk (a ji a jk ) + P i E H h ji a ji () j= j= ik= i k { Pi P k ik= i k j= j= } (a ji a jk ) + ( + r ji ) δ ( + r jk ) δ i= ij= P i a ji (3) ( + r ji ) δ

13 where we have used E H to denote expectation with respect to the channel statistics and E C to denote the expectation with respect to the distribution of the cuts. Observe that (0) follows from (8) and () follows from the fact that (Q) ii (Q) jj (Q) ij since every principal or of a positive semidefinite matrix is non-negative. Equality () is obtained by sumg over i k and i = k separately. Inequality (3) is obtained by applying Jensen s inequality to the concave function x x / and making use of the independence of the {h s ij} as well as their zero-mean property. This concludes the proof of (6) in Theorem.. B Proof of the full-csi case in Theorem 3. Let P = max i N P i. We focus on the case where a ij = r α ij for α. Then we can express the first term in (6) as CSI gain C{a ij } P { ik= j= Pn k= + (r α jir α jk ) ( + r ji ) δ ( + r jk ) δ j: r ji >r jk r jk >r ki k= } ( + r ji ) δ ( + r jk ) δ α j: r ji >r jk r jk <r ki ( + r ji ) δ ( + r jk ) δ α (4) where i = i := n yields the largest inner sum (over k and j) in (). 4. Since the summations over j are symmetric around the mid-point between node k and node i there is a factor of multiplying both of the inner sums (over j) above. In additon to splitting the above summations we have also used the inequality (a + b) a + b. Henceforth we will use B and B to denote the first and second terms respectively in expression (4). We first focus on the term B above and observe that r ji > r jk and r jk > r ki that r ji > r ki so imply ( + r ji ) δ ( + r jk ) α ( + rki ) δ α (5) 4 Since we are deriving upper bounds we can always add another node to make n odd 3

14 as long as δ > α. Substituting this calculation and using the fact that δα 0 we get 4 that B < (6) < k= k= j: r ji >r jk r jk >r ki ( + r ki ) δ α 4 ( + r ki ) δ α ( + r jk ) δ α+ α j: r jk >r ki ( + r jk ) δ α+ α Now let l ki := r ki /r and l jk := r jk /r. Clearly for a given i l ki for all k N and for a given k l jk for all j N. The largest number of nodes k which have a common value l ki is simply since no two nodes can be closer than r and they all lie on a line. Thus B < l ki = ( + r l ki ) δ α 4 l jk =l ki ( + r l jk ) δ α+ α Note that the inner summation (over l jk ) in the above expression is simply a lower Riemann sum. Thus we can further upper bound it as follows: l jk =l ki ( + r l jk ) δ 3 α < = < r δ 3 4 α r δ 3 4 α r δ 3 4 α { dx + l δ 3 α ki l ki { K (αδ) + l δ 3 α ki l δ 3 α ki x δ 3 α } { } K (αδ) + l δ 3 4 α ki l δ 3 4 α ki } where we have used the notation K (αδ) := (δ 3 α ). Substituting this calculation in (8) we obtain the bound B < ( {ζ (δ α) + K r δ α (αδ) ζ δ α )} where ζ(δ) def = i= i δ is the Riemann-Zeta function and is finite for δ >. Thus the above bound on B is valid for δ > 3 + α. 4 (7) (8) 4

15 Now turning to term B in (4) we see that r ji > r jk and r jk < r ki imply that so inequality (5) becomes r ji > r ki and the bound on B is given by B < < ( + r ji ) δ ( + r jk ) α ( k= l ki = + r ki ) δ α 4 +δ α 4 ( + r l ki ) δ α 4 ( + rki j: r jk <r ki l ki l jk = ) δ α (9) ( + r jk ) δ α+ α ( + r l jk ) δ 3 α Again upper bounding the lower Riemann sum over l jk by its integral we get l ki l jk = ( + r r jk ) δ 3 α r δ 3 4 α { lki + dx x δ 3 α }. (0) () = r δ 3 4 α r δ 3 4 α { + l 3 α δ+ ki 3 + } α δ + ( l 3 α δ+ ) ki ( δ 3 α ) () where the last line holds when δ > + 3α. Now we would like to find a number c 4 (αδ) ) ( ) independent of l such that ( l 3 α δ+ c (αδ) l 3 4 α δ+ for all l =... Observe that for l = the inequality is satisfied with c (αδ) =. Also the function ) ( ( ) l 3 α δ+ l 3 4 α δ+ is monotonically decreasing with l. Thus we can choose c (αδ) def = B < 3 +δ α 4 r δ α ) ( ( ) 3 α δ α δ+ Substituting this calculation in () we hence upper-bound term B in (0) as follows: { ( ζ δ α ) + K (αδ) c (αδ) 4 [ ( ζ δ α ) ( ζ δ α )]} 4 We note that the above bound on B is valid only for δ > + α. Observe that if δ > + α 4 4 then δ > + 3 α thus () is well defined in this regime. 4 5

16 Combining the two bounds on B and B we establish the scaling of the first term in expression (6). The second term exactly corresponds to the no-csi bound of (5) whose scaling law is directly obtained from [4] Corollary 3.. Hence we obtain the scaling law of C f when f(r) = r α α for linear imum distance networks. To extend this to generalized transport capacity we make the following observation: For any general f( ) with α f < we have f(r) r α f+ɛ for all r sufficiently large for every ɛ > 0. Choosing ɛ small enough such that α f + ɛ < we can upper bound the generalized transport capacity C f of a imum distance network by C r α f +ɛ multiplied by a constant that does not depend on the number of nodes n. Since α f + ɛ we can now use the scaling law result for polynomial functions of the Euclidean distance derived above to upper bound the scaling law behavior of C f : the scaling law behavior of C f is the same as that when f(r) = r α f+ɛ. Since ɛ > 0 can be chosen arbitrarily small this completes the proof of Theorem 3.. C Proof of the full-csi case in Theorem 3. As in the proof of Theorem 3. we first focus on the case where a ij = rij α for α but we consider arbitrary imum distance networks on the plane. We focus on bounding the first term in (6) and follow exactly the same steps up until inequality (8). Here we observe that (see [4] Corollary 3.) since we are dealing with networks on a plane there are at most (π + )l jk nodes j that share a common value of l jk for fixed k and similarly there are at most (π + )l ki nodes k that share a common value of l ki for fixed i. 5 Thus expression (8) now becomes B < r δ α l ki = (π + )l ki ( + r l ki ) δ α 4 l jk =l ki (π + )l jk ( + r l jk ) δ 3 α Following the same steps as in the proof of Theorem 3. we obtain 3 { ( (π + ) B < ζ δ α 3 ) + K (αδ) ζ (δ α ) }. (3) where K (αδ) := ( δ 3α ). The above bound on B is valid for δ > 3 + α. We can make similar observations for bounding the term B to obtain: B < δ α 4 + (π + ) 3 { ζ (δ α ) } r δ α 4 + K (αδ) c (αδ)ζ (δ α ) 5 Similarly to the linear case i is here set to be the center node. We can always add more nodes to the configuration to make any node we choose the center node. 6

17 where c (αδ) def ) = ( ( ) 3 α δ+ 3 4 α δ+ and the bound is valid for δ > + α. 4 Combining the two bounds on B and B we establish the scaling of the first term in expression (6). The second term exactly corresponds to the no-csi bound of (5) whose scaling law is directly obtained from [4] Corollary 3.. Hence we obtain the scaling law of C f when f(r) = r α α for planar imum distance networks. To extend this to generalized transport capacity we make the same observation as in the proof of Theorem 3.. Hence we establish Theorem 3. D Acknowledgements The authors thank Devavrat Shah for an interesting discussion; in particular this led to the development in Section... References [] T. M. Cover and J. Thomas Elements of Information Theory John Wiley 99 [] M. M. Deza and M. Laurent Geometry of Cuts and Metrics Encyclopedia of Mathematics and its applications Reading MA: Addison Wesley 976 Volume. [3] P. Gupta and P. R. Kumar Capacity of wireless networks IEEE Trans. on Information Theory Vol. 46() pp Mar 000. [4] A. Jovičić P. Viswanath and S. R. Kulkarni Upper Bounds to Transport Capacity of Wireless Networks IEEE Trans. on Information Theory Vol. 50 No. pp November 004. [5] O. Lévêque and E. Telatar Information theoretic upper bounds on the capacity of large extended ad hoc wireless networks IEEE Transactions on Information Theory Vol. 5 No. 3 pp March 005. [6] R. T. Rockafellar Convex Analysis Princeton University Press 97. [7] L.-L Xie and P. R. Kumar A Network Information Theory for Wireless Communication: Scaling Laws and Optimal Operation IEEE Transactions on Information Theory Vo. 50(5) pp May

18 [8] F. Xue L.-L. Xie and P. R. Kumar The transport capacity of wireless networks over fading channels IEEE Transactions on Information Theory Vol. 5 No. 3 pp March 005 [9] A. Gupta I. Newman Y. Rabinovich and A. Sinclair Cuts trees and l -embeddings of graphs Combinatorica 4 (004) pp

On Network Interference Management

On Network Interference Management On Network Interference Management Aleksandar Jovičić, Hua Wang and Pramod Viswanath March 3, 2008 Abstract We study two building-block models of interference-limited wireless networks, motivated by the

More information

Interactive Interference Alignment

Interactive Interference Alignment Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,

More information

Multiuser Capacity in Block Fading Channel

Multiuser Capacity in Block Fading Channel Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver

More information

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

WE study the capacity of peak-power limited, single-antenna,

WE study the capacity of peak-power limited, single-antenna, 1158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 3, MARCH 2010 Gaussian Fading Is the Worst Fading Tobias Koch, Member, IEEE, and Amos Lapidoth, Fellow, IEEE Abstract The capacity of peak-power

More information

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra. DS-GA 1002 Lecture notes 0 Fall 2016 Linear Algebra These notes provide a review of basic concepts in linear algebra. 1 Vector spaces You are no doubt familiar with vectors in R 2 or R 3, i.e. [ ] 1.1

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

Geometric Constraints II

Geometric Constraints II Geometric Constraints II Realizability, Rigidity and Related theorems. Embeddability of Metric Spaces Section 1 Given the matrix D d i,j 1 i,j n corresponding to a metric space, give conditions under which

More information

Selected Examples of CONIC DUALITY AT WORK Robust Linear Optimization Synthesis of Linear Controllers Matrix Cube Theorem A.

Selected Examples of CONIC DUALITY AT WORK Robust Linear Optimization Synthesis of Linear Controllers Matrix Cube Theorem A. . Selected Examples of CONIC DUALITY AT WORK Robust Linear Optimization Synthesis of Linear Controllers Matrix Cube Theorem A. Nemirovski Arkadi.Nemirovski@isye.gatech.edu Linear Optimization Problem,

More information

K User Interference Channel with Backhaul

K User Interference Channel with Backhaul 1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University

More information

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of

More information

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2)

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2) IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 361 Uplink Downlink Duality Via Minimax Duality Wei Yu, Member, IEEE Abstract The sum capacity of a Gaussian vector broadcast channel

More information

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 2005 Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters Alkan

More information

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu

More information

Lecture Notes 1: Vector spaces

Lecture Notes 1: Vector spaces Optimization-based data analysis Fall 2017 Lecture Notes 1: Vector spaces In this chapter we review certain basic concepts of linear algebra, highlighting their application to signal processing. 1 Vector

More information

Wideband Fading Channel Capacity with Training and Partial Feedback

Wideband Fading Channel Capacity with Training and Partial Feedback Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu

More information

Cooperative Communication with Feedback via Stochastic Approximation

Cooperative Communication with Feedback via Stochastic Approximation Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 11 Luca Trevisan February 29, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 11 Luca Trevisan February 29, 2016 U.C. Berkeley CS294: Spectral Methods and Expanders Handout Luca Trevisan February 29, 206 Lecture : ARV In which we introduce semi-definite programming and a semi-definite programming relaxation of sparsest

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks

The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks 1 The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks Urs Niesen, Piyush Gupta, and Devavrat Shah Abstract arxiv:0809.1344v3 [cs.it] 24 Jun 2009 We consider the question of determining

More information

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Pramod Viswanath, Venkat Anantharam and David.C. Tse {pvi, ananth, dtse}@eecs.berkeley.edu

More information

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems 2382 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 5, MAY 2011 Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems Holger Boche, Fellow, IEEE,

More information

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 In the last lecture, we described an O(log k log D)-approximation

More information

ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat

ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS Michael G. Rabbat Dept. of Electrical and Computer Engineering McGill University, Montréal, Québec Email: michael.rabbat@mcgill.ca ABSTRACT This paper

More information

Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding

Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding RadioVetenskap och Kommunikation (RVK 08) Proceedings of the twentieth Nordic Conference on Radio

More information

AN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES

AN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES AN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES JOEL A. TROPP Abstract. We present an elementary proof that the spectral radius of a matrix A may be obtained using the formula ρ(a) lim

More information

An Achievable Rate for the Multiple Level Relay Channel

An Achievable Rate for the Multiple Level Relay Channel An Achievable Rate for the Multiple Level Relay Channel Liang-Liang Xie and P. R. Kumar Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University of Illinois, Urbana-Champaign

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Interference Channels with Source Cooperation

Interference Channels with Source Cooperation Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL

More information

Basic Properties of Metric and Normed Spaces

Basic Properties of Metric and Normed Spaces Basic Properties of Metric and Normed Spaces Computational and Metric Geometry Instructor: Yury Makarychev The second part of this course is about metric geometry. We will study metric spaces, low distortion

More information

On the Capacity of the Multiple Antenna Broadcast Channel

On the Capacity of the Multiple Antenna Broadcast Channel DIMACS Series in Discrete Mathematics and Theoretical Computer Science On the Capacity of the Multiple Antenna Broadcast Channel David Tse and Pramod Viswanath Abstract. The capacity region of the multiple

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Embeddings of finite metric spaces in Euclidean space: a probabilistic view

Embeddings of finite metric spaces in Euclidean space: a probabilistic view Embeddings of finite metric spaces in Euclidean space: a probabilistic view Yuval Peres May 11, 2006 Talk based on work joint with: Assaf Naor, Oded Schramm and Scott Sheffield Definition: An invertible

More information

Delay-Based Connectivity of Wireless Networks

Delay-Based Connectivity of Wireless Networks Delay-Based Connectivity of Wireless Networks Martin Haenggi Abstract Interference in wireless networks causes intricate dependencies between the formation of links. In current graph models of wireless

More information

Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels

Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels Özgür Oyman ), Rohit U. Nabar ), Helmut Bölcskei 2), and Arogyaswami J. Paulraj ) ) Information Systems Laboratory, Stanford

More information

Stability and Sensitivity of the Capacity in Continuous Channels. Malcolm Egan

Stability and Sensitivity of the Capacity in Continuous Channels. Malcolm Egan Stability and Sensitivity of the Capacity in Continuous Channels Malcolm Egan Univ. Lyon, INSA Lyon, INRIA 2019 European School of Information Theory April 18, 2019 1 / 40 Capacity of Additive Noise Models

More information

Near-Potential Games: Geometry and Dynamics

Near-Potential Games: Geometry and Dynamics Near-Potential Games: Geometry and Dynamics Ozan Candogan, Asuman Ozdaglar and Pablo A. Parrilo January 29, 2012 Abstract Potential games are a special class of games for which many adaptive user dynamics

More information

Scaling Laws of Single-Hop Cognitive Networks

Scaling Laws of Single-Hop Cognitive Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 8, AUGUST 2009 4089 Scaling Laws of Single-Hop Cognitive Networks Mai Vu and Vahid Tarokh Abstract We consider a cognitive network consisting of

More information

Approximating sparse binary matrices in the cut-norm

Approximating sparse binary matrices in the cut-norm Approximating sparse binary matrices in the cut-norm Noga Alon Abstract The cut-norm A C of a real matrix A = (a ij ) i R,j S is the maximum, over all I R, J S of the quantity i I,j J a ij. We show that

More information

Copositive Plus Matrices

Copositive Plus Matrices Copositive Plus Matrices Willemieke van Vliet Master Thesis in Applied Mathematics October 2011 Copositive Plus Matrices Summary In this report we discuss the set of copositive plus matrices and their

More information

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Alp Simsek Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Asuman E.

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University

More information

Lecture 18: March 15

Lecture 18: March 15 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 18: March 15 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may

More information

The Graph Realization Problem

The Graph Realization Problem The Graph Realization Problem via Semi-Definite Programming A. Y. Alfakih alfakih@uwindsor.ca Mathematics and Statistics University of Windsor The Graph Realization Problem p.1/21 The Graph Realization

More information

Polar codes for the m-user MAC and matroids

Polar codes for the m-user MAC and matroids Research Collection Conference Paper Polar codes for the m-user MAC and matroids Author(s): Abbe, Emmanuel; Telatar, Emre Publication Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-005997169

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

CSC Linear Programming and Combinatorial Optimization Lecture 10: Semidefinite Programming

CSC Linear Programming and Combinatorial Optimization Lecture 10: Semidefinite Programming CSC2411 - Linear Programming and Combinatorial Optimization Lecture 10: Semidefinite Programming Notes taken by Mike Jamieson March 28, 2005 Summary: In this lecture, we introduce semidefinite programming

More information

New Coherence and RIP Analysis for Weak. Orthogonal Matching Pursuit

New Coherence and RIP Analysis for Weak. Orthogonal Matching Pursuit New Coherence and RIP Analysis for Wea 1 Orthogonal Matching Pursuit Mingrui Yang, Member, IEEE, and Fran de Hoog arxiv:1405.3354v1 [cs.it] 14 May 2014 Abstract In this paper we define a new coherence

More information

Fréchet embeddings of negative type metrics

Fréchet embeddings of negative type metrics Fréchet embeddings of negative type metrics Sanjeev Arora James R Lee Assaf Naor Abstract We show that every n-point metric of negative type (in particular, every n-point subset of L 1 ) admits a Fréchet

More information

Theorem 2.1 (Caratheodory). A (countably additive) probability measure on a field has an extension. n=1

Theorem 2.1 (Caratheodory). A (countably additive) probability measure on a field has an extension. n=1 Chapter 2 Probability measures 1. Existence Theorem 2.1 (Caratheodory). A (countably additive) probability measure on a field has an extension to the generated σ-field Proof of Theorem 2.1. Let F 0 be

More information

Appendix B Information theory from first principles

Appendix B Information theory from first principles Appendix B Information theory from first principles This appendix discusses the information theory behind the capacity expressions used in the book. Section 8.3.4 is the only part of the book that supposes

More information

An Alternative Proof of Primitivity of Indecomposable Nonnegative Matrices with a Positive Trace

An Alternative Proof of Primitivity of Indecomposable Nonnegative Matrices with a Positive Trace An Alternative Proof of Primitivity of Indecomposable Nonnegative Matrices with a Positive Trace Takao Fujimoto Abstract. This research memorandum is aimed at presenting an alternative proof to a well

More information

Minimum Mean Squared Error Interference Alignment

Minimum Mean Squared Error Interference Alignment Minimum Mean Squared Error Interference Alignment David A. Schmidt, Changxin Shi, Randall A. Berry, Michael L. Honig and Wolfgang Utschick Associate Institute for Signal Processing Technische Universität

More information

Near-Potential Games: Geometry and Dynamics

Near-Potential Games: Geometry and Dynamics Near-Potential Games: Geometry and Dynamics Ozan Candogan, Asuman Ozdaglar and Pablo A. Parrilo September 6, 2011 Abstract Potential games are a special class of games for which many adaptive user dynamics

More information

Intensity Analysis of Spatial Point Patterns Geog 210C Introduction to Spatial Data Analysis

Intensity Analysis of Spatial Point Patterns Geog 210C Introduction to Spatial Data Analysis Intensity Analysis of Spatial Point Patterns Geog 210C Introduction to Spatial Data Analysis Chris Funk Lecture 5 Topic Overview 1) Introduction/Unvariate Statistics 2) Bootstrapping/Monte Carlo Simulation/Kernel

More information

1 The independent set problem

1 The independent set problem ORF 523 Lecture 11 Spring 2016, Princeton University Instructor: A.A. Ahmadi Scribe: G. Hall Tuesday, March 29, 2016 When in doubt on the accuracy of these notes, please cross chec with the instructor

More information

Inderjit Dhillon The University of Texas at Austin

Inderjit Dhillon The University of Texas at Austin Inderjit Dhillon The University of Texas at Austin ( Universidad Carlos III de Madrid; 15 th June, 2012) (Based on joint work with J. Brickell, S. Sra, J. Tropp) Introduction 2 / 29 Notion of distance

More information

On the Duality between Multiple-Access Codes and Computation Codes

On the Duality between Multiple-Access Codes and Computation Codes On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch

More information

Computing and Communicating Functions over Sensor Networks

Computing and Communicating Functions over Sensor Networks Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]

More information

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING Applied Probability Trust (7 May 2015) STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California,

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Capacity optimization for Rician correlated MIMO wireless channels

Capacity optimization for Rician correlated MIMO wireless channels Capacity optimization for Rician correlated MIMO wireless channels Mai Vu, and Arogyaswami Paulraj Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford, CA

More information

Some Expectations of a Non-Central Chi-Square Distribution With an Even Number of Degrees of Freedom

Some Expectations of a Non-Central Chi-Square Distribution With an Even Number of Degrees of Freedom Some Expectations of a Non-Central Chi-Square Distribution With an Even Number of Degrees of Freedom Stefan M. Moser April 7, 007 Abstract The non-central chi-square distribution plays an important role

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Xiaojun Lin, and Ness B. Shroff Abstract In this paper, we characterize the performance

More information

Notes taken by Costis Georgiou revised by Hamed Hatami

Notes taken by Costis Georgiou revised by Hamed Hatami CSC414 - Metric Embeddings Lecture 6: Reductions that preserve volumes and distance to affine spaces & Lower bound techniques for distortion when embedding into l Notes taken by Costis Georgiou revised

More information

Convex Analysis and Economic Theory AY Elementary properties of convex functions

Convex Analysis and Economic Theory AY Elementary properties of convex functions Division of the Humanities and Social Sciences Ec 181 KC Border Convex Analysis and Economic Theory AY 2018 2019 Topic 6: Convex functions I 6.1 Elementary properties of convex functions We may occasionally

More information

On the Secrecy Capacity of the Z-Interference Channel

On the Secrecy Capacity of the Z-Interference Channel On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer

More information

Math 341: Convex Geometry. Xi Chen

Math 341: Convex Geometry. Xi Chen Math 341: Convex Geometry Xi Chen 479 Central Academic Building, University of Alberta, Edmonton, Alberta T6G 2G1, CANADA E-mail address: xichen@math.ualberta.ca CHAPTER 1 Basics 1. Euclidean Geometry

More information

The general programming problem is the nonlinear programming problem where a given function is maximized subject to a set of inequality constraints.

The general programming problem is the nonlinear programming problem where a given function is maximized subject to a set of inequality constraints. 1 Optimization Mathematical programming refers to the basic mathematical problem of finding a maximum to a function, f, subject to some constraints. 1 In other words, the objective is to find a point,

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 10, OCTOBER 2003 Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels Sriram Vishwanath, Student Member, IEEE, Nihar

More information

THEOREMS, ETC., FOR MATH 515

THEOREMS, ETC., FOR MATH 515 THEOREMS, ETC., FOR MATH 515 Proposition 1 (=comment on page 17). If A is an algebra, then any finite union or finite intersection of sets in A is also in A. Proposition 2 (=Proposition 1.1). For every

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

Radio Number for Square of Cycles

Radio Number for Square of Cycles Radio Number for Square of Cycles Daphne Der-Fen Liu Melanie Xie Department of Mathematics California State University, Los Angeles Los Angeles, CA 9003, USA August 30, 00 Abstract Let G be a connected

More information

Sum Rate of Multiterminal Gaussian Source Coding

Sum Rate of Multiterminal Gaussian Source Coding DIMACS Series in Discrete Mathematics and Theoretical Computer Science Sum Rate of Multiterminal Gaussian Source Coding Pramod Viswanath Abstract We characterize the sum rate of a class of multiterminal

More information

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems MATHEMATICS OF OPERATIONS RESEARCH Vol. 35, No., May 010, pp. 84 305 issn 0364-765X eissn 156-5471 10 350 084 informs doi 10.187/moor.1090.0440 010 INFORMS On the Power of Robust Solutions in Two-Stage

More information

Lecture Semidefinite Programming and Graph Partitioning

Lecture Semidefinite Programming and Graph Partitioning Approximation Algorithms and Hardness of Approximation April 16, 013 Lecture 14 Lecturer: Alantha Newman Scribes: Marwa El Halabi 1 Semidefinite Programming and Graph Partitioning In previous lectures,

More information

IN THE last several years, there has been considerable

IN THE last several years, there has been considerable IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 8, AUGUST 2002 2291 Unitary Signal Constellations Differential Space Time Modulation With Two Transmit Antennas: Parametric Codes, Optimal Designs,

More information

IN this paper, we show that the scalar Gaussian multiple-access

IN this paper, we show that the scalar Gaussian multiple-access 768 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 5, MAY 2004 On the Duality of Gaussian Multiple-Access and Broadcast Channels Nihar Jindal, Student Member, IEEE, Sriram Vishwanath, and Andrea

More information

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control 962 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control Junshan Zhang, Student Member, IEEE, and Edwin

More information

Compressibility of Infinite Sequences and its Interplay with Compressed Sensing Recovery

Compressibility of Infinite Sequences and its Interplay with Compressed Sensing Recovery Compressibility of Infinite Sequences and its Interplay with Compressed Sensing Recovery Jorge F. Silva and Eduardo Pavez Department of Electrical Engineering Information and Decision Systems Group Universidad

More information

The Fading Number of a Multiple-Access Rician Fading Channel

The Fading Number of a Multiple-Access Rician Fading Channel The Fading Number of a Multiple-Access Rician Fading Channel Intermediate Report of NSC Project Capacity Analysis of Various Multiple-Antenna Multiple-Users Communication Channels with Joint Estimation

More information

A Unified Theorem on SDP Rank Reduction. yyye

A Unified Theorem on SDP Rank Reduction.   yyye SDP Rank Reduction Yinyu Ye, EURO XXII 1 A Unified Theorem on SDP Rank Reduction Yinyu Ye Department of Management Science and Engineering and Institute of Computational and Mathematical Engineering Stanford

More information

ONE of the main applications of wireless sensor networks

ONE of the main applications of wireless sensor networks 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 Coverage by Romly Deployed Wireless Sensor Networks Peng-Jun Wan, Member, IEEE, Chih-Wei Yi, Member, IEEE Abstract One of the main

More information

Multivariate Statistics Random Projections and Johnson-Lindenstrauss Lemma

Multivariate Statistics Random Projections and Johnson-Lindenstrauss Lemma Multivariate Statistics Random Projections and Johnson-Lindenstrauss Lemma Suppose again we have n sample points x,..., x n R p. The data-point x i R p can be thought of as the i-th row X i of an n p-dimensional

More information

Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution 1 2

Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution 1 2 Submitted to IEEE Trans. Inform. Theory, Special Issue on Models, Theory and odes for elaying and ooperation in ommunication Networs, Aug. 2006, revised Jan. 2007 esource Allocation for Wireless Fading

More information

Multiple Antennas in Wireless Communications

Multiple Antennas in Wireless Communications Multiple Antennas in Wireless Communications Luca Sanguinetti Department of Information Engineering Pisa University luca.sanguinetti@iet.unipi.it April, 2009 Luca Sanguinetti (IET) MIMO April, 2009 1 /

More information

The Skorokhod reflection problem for functions with discontinuities (contractive case)

The Skorokhod reflection problem for functions with discontinuities (contractive case) The Skorokhod reflection problem for functions with discontinuities (contractive case) TAKIS KONSTANTOPOULOS Univ. of Texas at Austin Revised March 1999 Abstract Basic properties of the Skorokhod reflection

More information

Lebesgue Measure on R n

Lebesgue Measure on R n CHAPTER 2 Lebesgue Measure on R n Our goal is to construct a notion of the volume, or Lebesgue measure, of rather general subsets of R n that reduces to the usual volume of elementary geometrical sets

More information

On Comparability of Multiple Antenna Channels

On Comparability of Multiple Antenna Channels On Comparability of Multiple Antenna Channels Majid Fozunbal, Steven W. McLaughlin, and Ronald W. Schafer School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 30332-0250

More information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith

More information

LECTURE 3. Last time:

LECTURE 3. Last time: LECTURE 3 Last time: Mutual Information. Convexity and concavity Jensen s inequality Information Inequality Data processing theorem Fano s Inequality Lecture outline Stochastic processes, Entropy rate

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

Towards control over fading channels

Towards control over fading channels Towards control over fading channels Paolo Minero, Massimo Franceschetti Advanced Network Science University of California San Diego, CA, USA mail: {minero,massimo}@ucsd.edu Invited Paper) Subhrakanti

More information

Overlapping Variable Clustering with Statistical Guarantees and LOVE

Overlapping Variable Clustering with Statistical Guarantees and LOVE with Statistical Guarantees and LOVE Department of Statistical Science Cornell University WHOA-PSI, St. Louis, August 2017 Joint work with Mike Bing, Yang Ning and Marten Wegkamp Cornell University, Department

More information

Maximizing Capacity with Power Control under Physical Interference Model in Simplex Mode

Maximizing Capacity with Power Control under Physical Interference Model in Simplex Mode Maximizing Capacity with Power Control under Physical Interference Model in Simplex Mode Peng-Jun Wan, Chao Ma, Shaojie Tang, and Boliu Xu Illinois Institute of Technology, Chicago, IL 60616 Abstract.

More information