Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information
|
|
- Candice Hoover
- 5 years ago
- Views:
Transcription
1 Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information Fabio E. Lapiccirella, Zhi Ding and Xin Liu Electrical and Computer Engineering University of California, Davis, California Abstract We explore a flexible and non-intrusive opportunistic spectrum access control mechanism for cognitive radios that goes beyond the standard Listen-Before-Talk (LBT) strategy. We exploit the bi-directional nature of many primary communication systems to control cognitive radio access that is based on both spectral sensing and primary receiver acknowledgements. In this work, we limit our attention on the ACK/NAK messages in primary data-link-control. We use partially observable Markovdecision processes to devise an optimized admission control policy. Our new method achieves high cognitive network throughput while offering robust protection of primary user signals. I. INTRODUCTION Cognitive radio access delineates a new paradigm for dynamically alleviating the spectrum scarcity problem. Cognitive radios are designed to access a bandwidth already allocated to a primary user network under the constraint that the primary user communication quality of service is not heavily impaired. Cognitive radio access control has been a popular topic of research, for example, the authors of [1] devised distributed spectrum sensing and access strategies under an energy constraint on secondary users. In [2] and [3], the design of sensing policies for tracking spectrum opportunities is explored. The authors of [4] applied a partially observable Markov decision framework to devise an optimal sensing and channel selection policy in a multi-channel opportunistic communication system. The authors of [5] and [6] studied the challenge of SNR threshold below which the sensing outcome is severely impaired regardless of the sensing time. The authors of [7] derived an optimal sensing policy for exponential idle time whereas in [8] they addressed optimal sensing strategies for continuous time systems, exploiting acknowledgement signals from the SU-Rx. Also, the authors of [9] presented a cognitive radio system that varies transmission power according to all the information available to the spectrum sensor. It should be noted that, thus far, listen-before-talk (LBT) is the state-ofthe-art opportunistipectrum access approach to cognitive radio. LBT simply relies on spectrum sensing, thereby enabling a secondary user (SU) to access the spectrum of a primary user (PU) only after sensing the PU spectrum unoccupied band. LBT is natural and practical, not requiring any modification to the existing PU infrastructure. However, LBT only senses primary transmission activities and it is unaware of the actual receiver conditions. More specifically, it neither solves the hidden receiver problem nor utilizes any capacity that robust interference-resistant PU networks may provide. To expand the applications and to improve the efficiency of cognitive radios, we enhance the LBT learning capability by leveraging the feedback information typically available in duplex PU links. Feedback signals for data-link-control are available in many systems such as HSDPA [] and WiMAX [11] in the form of ACK/NAK packets and downlink/uplink profiles. Such information allows the SU to more accurately infer the effect of the SU activity on the PU receivers (PU-Rx). In this work, we emphasize that advanced cognition should require the SUs to learn about primary network characteristics and user interaction. Similar concept of cognition has been discussed in [12] where a SU transmits probing signals to observe the PU transmission power changes in response to better estimate the SU to PU channel gain. Specifically, we utilize the ACK/NAK signals transmitted by the packet receivers for data-link-control. Exploiting the ACK/NAK signals from the PU-Rx allows the SUs to detect the presence of any hidden PU-Rx and to assess the quality of the PU-Rx reception, thereby better providing the necessary PU protection. It also makes it possible for the SU transmitter (SU-Tx) to optimize its access policy by estimating the PU-Rx reception quality under the SU-Tx access control policy, therefore allowing the SU-Tx to better exploit any PU excess capacity. This paper is an extension of our preliminary work [13] where we presented an optimal channel access scheme based PU ACK/NAK information overhearing. The rest of this manuscript is divided into three sections. Section II presents the description of the problem and the basic formulation of the cognitive spectrum access based on acknowledgement information. Section III presents the development of our optimized spectrum access policy. Section IV presents our test results of our access algorithm. Section V summarizes our conclusions and future directions under pursuit. II. SYSTEM MODEL Fig. 1 illustrates a wireless scenario under investigation that involves the co-existence of a primary and a secondary link. The PU access is time-slotted for packet transmissions. The high priority PU may transmit the available packets at the beginning of each slot. We assume that the SU uses that same
2 PU Tx Fig. 1. Forward link Reverse link SU Tx PU Rx SU learning environment. slot length and that the SU actions are in synchronization with the PU time slot. The PU traffic is randomly busy or idle, irrespective of the SU action. The random BUSY/IDLE durations are independent distributed with probability mass functions, respectively, p B (k) = P[D B = k] p I (k) = P[D I = k]. (1) Here D B and D I are discrete random variables denoting the BUSY and IDLE periods, respectively. SUs are aware of the IDLE/BUSY distribution (from prior measurement). We use partially observable Markov decision processes to devise an optimal admission control policy. Our time horizon is infinite. At the start time t of every slot, we define the binary variable s t via: {, when the PU channel is BUSY; s t = (2) 1, when the PU channel is IDLE. The SU-Tx can take one of three possible actions: I, ; a t = S, ; (3) T,. To take action S, the SU-Tx uses an energy detector to detect whether the PU-Tx spectrum is IDLE or BUSY. The detection (sensing) is not perfect and is characterized by a false-alarm probability P F and a missed-detection probability P M. False alarm means declaring an IDLE primary channel to be BUSY, while a missed detection means declaring a BUSY primary channel to be IDLE. Since the state s t is not directly observable to the SU, we define ρ t = P[s t = 1], and p t as the estimate of ρ t by the SU-Tx from its observations up to time t. We will refer to p t as the information state of the SU-Tx. When the PU is BUSY, it corresponds to packet error rates of Q 1 and Q 2, in the presence and the absence of SU-Tx transmissions, respectively. Naturally, Q 1 < Q 2. We let both Q 1 and Q 2 be known to the SUs a priori from measurements before deploying access control. We assume that the SU-Tx can either correctly decode a feedback message from the PU- Rx or cannot decode it at all. We define as the probability that the SU-Tx can correctly decode a feedback signal from the PU-Rx. To optimize the access control, we need to define the perstage reward/cost function. Let p t = q and the action a t = ν, then: r T c T P[NAK], for ν=t; R(q, ν) = c S, for ν=s; (4), for ν=i; where r T is a reward the SU-Tx gets for each packet transmission, c T and c S are the cost of a packet collision with the PUs and the cost of sensing the PU spectrum, respectively. P[NAK] = (1 q) Q 2 is the prior probability of PU-Rx sending a NAK. In what follows, we will define τ j (t) as the estimated transition instant to state j {; 1} from state 1 j based on observation up to time t. τ j (t) is needed in order to tackle the information state update from one time slot to another. Our algorithm development assumes that the SU-Tx knows the starting point of the first PU BUSY cycle. For simplicity and without loss of generality we will assume the first BUSY cycle starts at time. The access control policy we seek consists of a sequence of functions π = {µ, µ 1,...,µ t,...} where each function µ t (.) maps the information state p t into an action s t {I, S, T}. At time t, upon taking action a t, the SU-Tx uses the current and past observations to determine a maximum-a-posteriori (MAP) estimation of the next PU-traffic transition moment. Given a policy π we define the value function of the SU-Tx from time t s = as: + V π (q, t s, τ (t s )) = E π [ α t r(p t, a t ) p ts = q]. (5) t=t s The optimized access policy is an admissible policy π that maximizes the expected value function (5): DATA Feedback π = argmax{v π (q, t s, τ (t s )))}. (6) π III. OPTIMIZED SPECTRUM ACCESS CONTROL time a = S 1 2 O {I, Ia, In, B, Ba, Bn} O2 {I, B } O3 = PU activity SU activity O4 {ACK, NAK, } a1 = I a2 = S a3 = T Fig. 2. a4 = T Sequences of spectrum access. time
3 Fig. 2 shows a possible sequence of PU/SU activities in time. Clearly, no observation is associated to the action ν = I. At time t, for action a t = T, we have: O T t Ω T = {ACK, NAK, }; (7) where ACK stands for the event of receiving an ACK from the PU-Rx, NAK denotes the event of receiving a NAK packet from the PU-Rx, possibly caused by the SU interference, whereas stands for the case of SU-Tx failing to decode any feedback from the PU-Rx. This may be due to either high noise/interference level at the SU-Tx or an idle PU. For action a t = S, the SU-Tx observes O S t. Specifically, O S t ΩS = {I, I A, I N, B, B A, B N }; (8) where I denotes an IDLE observation while the SU-Tx does not decode any feedback message from the PU-Rx, I A denotes IDLE observation while an ACK is correctly decoded at the end of the time slot; I N represents IDLE sensing while a NAK from the PU-Rx is correctly decoded. The symbol B follows the same convention to represent the three cases when the PU channel has been sensed as BUSY. The SU stores the past observations since the latest PU traffic pattern transition in the vector O t. For example, if at time t the latest transition epoch is τ (t), the vector O t will be: [ ] O t = O a τ (t) τ,..., (t) Oat 1. (9) Recall that τ j (t 1) denotes the last estimated transition instant at t 1. After collecting a new O ν t, the SU-Tx estimates the j 1 j transition instant τ 1 j (t) via the MAP principle τ 1 j (t) = MAP(τ 1 j (t) O ν t,o t, τ j (t 1)) () = argmax {ln(p[ot ν,o t τ 1 j (t) = x]) + ln(p[τ 1 j (t) = x)}. x>τ j(t 1) (11) There are two possibilities for τ i (t): 1) τ j (t 1) < τ 1 j (t) < t: the estimated transition from state j to 1 j happened before t. In this case, the traffic distribution used to calculate the information state p t will change from p j (k) = P[D j = k] to p 1 j (k) = P[D 1 j = k]. Moreover, the SU-Tx will erase the stale O t and create a new one associated to τ 1 j (t). 2) τ 1 j (t) t: the MAP estimator does not detect a transition before t. The SU-Tx assumes the PU channel state to remain in state j and will discard the estimate τ 1 j (t). A. Information state update equations At time t, the SU-Tx takes action a t = ν and uses O ν t and O t to determine the next PU traffic transitions via a MAP estimator. Since the MAP estimator is error-prone, the SU- Tx will base its channel admission control on the information state p t to fine-tune the PU channel state. Let τ j (t) be the latest estimated PU traffic transition at t, the information vector is defined t > : p t = P[s t = 1 O at 1 t 1, τ j(t 1)]; (12) The SU-Tx updates p t following two steps: 1) Determining the posterior probability: ˆp t = P[s t = 1 O ν t, τ j (t 1)]. (13) In order to find ˆp t of (13), the SU-Tx determines first the probabilities v 1 = P[O ν t s t = 1], v = P[O ν t s t = ]. (14) It then uses (14) to calculate the observation probability p(o ν t ) = v 1 p t +v (1 p t ). The posterior probability (13) is defined as: ˆp t = v 1 p t v 1 p t + v (1 p t ). (15) 2) Updating the information vector p t+1. Let K j be the number of time slots the PU channel has been in state j {; 1}. Its probability of being still in state j at time t + 1 is: P[s t+1 = j {s t = j,..., s t Kj = j}] = P[D j K j + 1 D j K j ] = P[Dj Kj+1] P[D j K j] ; (16) where D j is a random variable denoting the number of time slots in state j. For computational tractability, we assume that since the last τ j (t), at most one transition may take place. To update the probability estimate that s t+1 = 1, we need to define this probability: K j w = p[d j = k] (1 P[D 1 j K j k + 1] ). P[D 1 j K j k] k=1 (17) Hence, the updated information vector is p t+1 = P[Dj Kj+1] P[D j K j] ˆp t + w (1 ˆp t ). (18) For the sake of simplicity, we will refer this update procedure as a function: p t+1 = UPDATE(O at t, p t, t, τ j (t)). (19) B. Optimal value function and policy calculation We define V (p, t, τ j (t)) as the maximum expected discounted value function that the SU-Tx can get at time slot t, with the information state p assuming that the latest PU traffic transition was to state j. From the Bellman equation: V (p, t, τ j (t)) = max {V a (p, t, τ j (t))}; () a {I, T, S} where V I (p, t, τ j (t)), V S (p, t, τ j (t)), V T (p, t, τ j (t)) are the value function associated with actions,,
4 and, respectively. They are defined as V I (p, t, τ j (t)) = R(p, I) + α V (q = UPDATE({ }, p, t, τ j (t))); V S (p, t, τ j (t)) = R(p, S) + α P[O S ]V (q = UPDATE(O S, p, t, τ j (t))); O S Ω S V T (p, t, τ j (t)) = R(p, T) (21) + α P[O T ]V (q = UPDATE(O T, p, t, τ j (t))); O T Ω T where the set Ω ν is defined in (7) and (8), for action ν = {T,S} respectively; R(p, ν) is the per-stage reward function associated with the action ν, and q = UPDATE(O ν, p, t, τ j (t))) is the information state-update procedure earlier. We omitted the time indices of the current and next state for simplicity. IV. SIMULATION RESULTS We now test our optimized SU access policy through computer simulations. In the test, we let BUSY and IDLE durations be uniformly distributed over [1, ] and [1, ], respectively. Our performance metrics are the PU packet collision probability (P coll ) and the SU throughput T t= SU th = I(a t = T) (22) (T + 1) where I( ) is the indicator function and T is the test duration. In all our tests, we set T =. To examine the effect of cost/reward on the SU behavior, we test 2 different settings of costs and reward shown below. The sensing cost in setting B is much lower than in setting A. We let Q 1 =.1 and Q 2 =.99, implying that a collision between simultaneous PU-SU transmissions will almost certainly lead to a NAK from the PU-Rx. Total Transmission, Sense, Idle time % Total Transmission, Sense, Idle time % Fig. 3. Total percentage of sensing, transmission and idle time as varies: under setting A; under setting B. SU th set A vs. set A % =5 =.5 set A r T = 5 c T = 15 c S = 5 set B r T = 5 c T = c S = Figure 3 compares the SU behavior as a function of under the two different cost/reward settings. The transmission percentage can also be regarded as a throughput metric. As the decoding probability increases, the feedback information becomes more reliable. Therefore, the SU throughput increases and the percentage of time spent in the idle state decreases. Since setting A represents a high sensing cost, the SU-Tx senses the spectrum more frequently compared to setting B. In both cases, as increases which leads to higher ACK/NAK reliability, the transmission time increases. Fig. 4 provides an SU throughput comparison between the two settings, where as Fig. 4 illustrates the corresponding collision rate under the same conditions. When =, then the optimal decision is based solely on the sensing outcome. In this case, SU-Tx shows a higher throughput under setting B, whose lower sensing cost allows the SU-Tx to sense more Fig. 4. Collision prob % =5 =.5 Comparison of: SU th and PU collision rate. and transmit more. When the ACK/NAK decoding is less reliable (.1.35), the SU throughput associated to
5 setting A is higher because its higher sensing cost does not encourage sensing whereas some correctly decoded feedback information from the PU-Rx may encourage transmission in lieu of sensing. On the other hand, =.5 allows the SU- Tx to be more conservative and to transmit only when it is confident of the PU channel state. This is reflected by the P coll shown in Fig. 4 where it is clear that sensing more frequently leads to less collisions with the PUs. When PU- Tx signals become more reliable ( >.35) the SU th in both settings have similar throughput results, as the SU can rely more on the PU-Tx feedback and less on sensing. When =.5 and the sensing cost is low, the P coll varies little between 5% and 8%. In this case, sensing is more desirable than getting ACK/NACK feedback ( > ) as ACK/NAK does little to improve the performance versus no feedback ( = ). More sensing leads to lower of SU th as less time is devoted to transmission. On the other hand, when = 5, reliable feedback information help reduce the P coll from 15% to 5%. This means that when pure sensing is expensive or unreliable, feedback from the PU-Rx constitutes a reliable observation signal for PU protection. Transmission, Sense, Idle time % in a PU Idle cycle Transmission, Sense, Idle time % in a PU Idle cycle Fig. 5. SU sensing, transmission and idle time percentage during a PU Idle period as a function of under: setting A; setting B. Fig. 5 shows the percentage of the three possible actions during a PU idle period for the two test cases of high versus low sensing cost. Since the T action allows the SU-Tx to listen on the reverse channel and update its information state through the observation of the feedback, when the sensing cost is higher, it is preferable for the SU-Tx to either transmit or stay idle, as shown in Fig. 5. Fig. 5 shows that when the sensing cost decreases, the SU-Tx changes its behavior and senses the PU channel more frequently. In both cases, when the SU-Tx is able to decode almost all its feedback messages ( >.99), the data-link-control feedback message represents a very reliable indicator of spectrum opportunity that allows the SU-Tx to reach throughput of nearly 9%. V. CONCLUSIONS AND FUTURE WORKS We investigated means of improving the basic LBT access strategy for cognitive radio systems. Exploiting data-linkcontrol messages that can be overheard by the SU-Tx, our new approach can enhance the traditional spectral sensing and more accurately determine the operating conditions of the primary reception for protection. Based on the simple ACK/NAK signals from the PU-Rx and the prior knowledge of the PU idle-busy probability distribution, we applied partially observable Markov-decision processes to devise an optimal channel access control strategy in order to maximize the secondary user utility. Our future works include investigating means for SU capacity enhancement by detecting the robust mode of the PU-Rx under SU interference as well as developing more versatile ways of SU access such as multi-level power access. REFERENCES [1] Y. Chen; Q. Zhao; A. Swami, Distributed Spectrum and Access in Cognitive Radio Networks With Energy Constraint, IEEE Trans. Signal Processing, 57(2): , Feb. 9. [2] Q. Zhao; L Tong; A Swami and Yunxia Chen, Decentralized cognitive MAC for opportunistipectrum access in ad hoc networks: A POMDP framework, IEEE Journal Selected Areas in Communications,25(3):589-, April 7. [3] Y. Chen; Q. Zhao; A. Swami, Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Errors, IEEE Trans. Info. Theory, 54(5):53-71, May 8. [4] Q. Zhao; B. Krishnamachari; K. Liu, On myopiensing for multichannel opportunistic access: structure, optimality, and performance, IEEE Trans Wireless Comm., 7(12): , Dec. 8. [5] A. Sahai, N. Hoven, and R. Tandra, Some fundamental limits on cognitive radio, 42th Allerton, 4. [6] R. Tandra and A. Sahai, Fundamental limits on detection in low SNR under noise uncertainty, IEEE WirelessCom Symp. on Emerging Networks, Technologies and Standards, Hawaii, June 5. [7] S. Huang; X. Liu; Z. Ding, Short Paper: On Optimal and Transmission Strategies for Dynamic Spectrum Access, 3rd IEEE Intl. Symp. on New Frontiers in Dynamic Spectrum Access Networks, 8. [8] S. Huang; X. Liu; Z. Ding, Optimal -Transmission Structure for Dynamic Spectrum Access, IEEE INFOCOM, April 9. [9] S. Srinivasa and S. Jafar, Soft sensing and optimal power control for cognitive radio, IEEE GLOBECOM, Nov. 7. [] 3GPP Technical Specification Group Radio Access Network Physical layer procedures (FDD) (Release 5), 3rd Generation Partnership Project Std. S V5.11., 5. [11] Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std , 4. [12] R. Zhang and Y. C. Liang, Exploiting hidden power feedbacks in cognitive radio networks, 3rd IEEE Intl. Symp. on New Frontiers in Dynamic Spectrum Access Networks, 8. [13] F. E. Lapiccirella; S. Huang; X. Liu; Z. Ding, Feedback-based access and power control for distributed multiuser cognitive networks, Info. Theory and Applications Workshop, pp.85-89, Feb. 9.
On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels
On the Optimality of Myopic Sensing 1 in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels Kehao Wang, Lin Chen arxiv:1103.1784v1 [cs.it] 9 Mar 2011 Abstract Recent works ([1],
More informationA POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation
A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New
More informationDynamic spectrum access with learning for cognitive radio
1 Dynamic spectrum access with learning for cognitive radio Jayakrishnan Unnikrishnan and Venugopal V. Veeravalli Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University
More informationSTRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS
STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS Qing Zhao University of California Davis, CA 95616 qzhao@ece.ucdavis.edu Bhaskar Krishnamachari University of Southern California
More informationOptimal Sensing-Transmission Structure for Dynamic Spectrum Access
Optimal Sensing-Transmission Structure for Dynamic Spectrum Access Senhua Huang, Xin Liu, and Zhi Ding University of California, Davis, CA 9566, USA Abstract In cognitive wireless networks where secondary
More informationPerformance of Round Robin Policies for Dynamic Multichannel Access
Performance of Round Robin Policies for Dynamic Multichannel Access Changmian Wang, Bhaskar Krishnamachari, Qing Zhao and Geir E. Øien Norwegian University of Science and Technology, Norway, {changmia,
More informationTransmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback
IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of
More informationOpportunistic Spectrum Access for Energy-Constrained Cognitive Radios
1206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH 2009 Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong Wong,
More informationOPPORTUNISTIC Spectrum Access (OSA) is emerging
Optimal and Low-complexity Algorithms for Dynamic Spectrum Access in Centralized Cognitive Radio Networks with Fading Channels Mario Bkassiny, Sudharman K. Jayaweera, Yang Li Dept. of Electrical and Computer
More informationOptimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks. Senhua Huang, Xin Liu, and Zhi Ding
1 Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks Senhua Huang, Xin Liu, and Zhi Ding Abstract Cognitive radio offers a promising technology to mitigate spectrum
More informationCooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints
Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong
More informationDistributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users
Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users Mario Bkassiny and Sudharman K. Jayaweera Dept. of Electrical and Computer Engineering University of New
More informationOpportunistic Channel-Aware Spectrum Access for Cognitive Radio Networks with Interleaved Transmission and Sensing
1 Opportunistic Channel-Aware Spectrum Access for Cognitive Radio Networks with Interleaved Transmission and Sensing Sheu-Sheu Tan, James Zeidler, and Bhaskar Rao Department of Electrical and Computer
More informationOptimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio
More informationStability Analysis in a Cognitive Radio System with Cooperative Beamforming
Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1
More informationResidual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010
Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-30 June 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science
More informationResidual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010
Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-6 March 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science
More informationOFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter
OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback Prof. Phil Schniter T. H. E OHIO STATE UNIVERSITY Joint work with Mr. Rohit Aggarwal, Dr. Mohamad Assaad, Dr. C. Emre Koksal September
More informationAlgorithms for Dynamic Spectrum Access with Learning for Cognitive Radio
Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Jayakrishnan Unnikrishnan, Student Member, IEEE, and Venugopal V. Veeravalli, Fellow, IEEE 1 arxiv:0807.2677v2 [cs.ni] 21 Nov 2008
More informationOnline Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel
Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel Yanting Wu Dept. of Electrical Engineering University of Southern California Email: yantingw@usc.edu Bhaskar Krishnamachari
More informationABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013
ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical
More informationEE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing
EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a
More informationPower Allocation over Two Identical Gilbert-Elliott Channels
Power Allocation over Two Identical Gilbert-Elliott Channels Junhua Tang School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University, China Email: junhuatang@sjtu.edu.cn Parisa
More informationModeling and Simulation NETW 707
Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides
More informationarxiv:cs/ v1 [cs.ni] 27 Feb 2007
Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors Yunxia Chen, Qing Zhao, and Ananthram Swami Abstract arxiv:cs/0702158v1 [cs.ni] 27 Feb 2007 We
More informationMulti-Armed Bandit: Learning in Dynamic Systems with Unknown Models
c Qing Zhao, UC Davis. Talk at Xidian Univ., September, 2011. 1 Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models Qing Zhao Department of Electrical and Computer Engineering University
More informationThe Capacity Region of the Gaussian Cognitive Radio Channels at High SNR
The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract
More informationCooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks
Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks by Nagwa Shaghluf B.S., Tripoli University, Tripoli, Libya, 2009 A Thesis Submitted in Partial Fulfillment of the Requirements
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationAnalysis of opportunistic spectrum access in cognitive radio networks using hidden Markov model with state prediction
Wang and Adriman EURASIP Journal onwireless Communications and Networking (2015) 2015:10 DOI 10.1186/s13638-014-0238-5 RESEARCH Open Access Analysis of opportunistic spectrum access in cognitive radio
More informationChannel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting
1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University
More informationSPECTRUM resource scarcity motivates researchers to
1 A Neural Network Prediction Based Adaptive Mode Selection Scheme in Full-Duplex Cognitive Networks Yirun Zhang Qirui Wu Jiancao Hou Vahid Towhidlou and Mohammad Shikh-Bahaei arxiv:1904.06222v1 [eess.sp]
More informationarxiv: v3 [cs.lg] 4 Oct 2011
Reinforcement learning based sensing policy optimization for energy efficient cognitive radio networks Jan Oksanen a,, Jarmo Lundén a,b,1, Visa Koivunen a a Aalto University School of Electrical Engineering,
More informationAlgorithms for Dynamic Spectrum Access with Learning for Cognitive Radio
Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Jayakrishnan Unnikrishnan, Student Member, IEEE, and Venugopal V. Veeravalli, Fellow, IEEE 1 arxiv:0807.2677v4 [cs.ni] 6 Feb 2010
More informationSpectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy
Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012
More informationOptimal Transmission-Sensing-Reception Strategies for Full-duplex Dynamic Spectrum Access
This is a technical report for our published paper in IEEE yspan 24 Optimal Transmission-Sensing-Reception Strategies for Full-duplex ynamic Spectrum Access Wessam Afifi and Marwan Krunz epartment of Electrical
More informationSensing for Cognitive Radio Networks
Censored Truncated Sequential Spectrum 1 Sensing for Cognitive Radio Networks Sina Maleki Geert Leus arxiv:1106.2025v2 [cs.sy] 14 Mar 2013 Abstract Reliable spectrum sensing is a key functionality of a
More informationDecentralized Cognitive Radio Control based on Inference from Primary Link Control Information
Decentralized Cognitive Radio Control based on Inference from Primary Link Control Information 1 Senhua Huang, Xin Liu, and Zhi Ding University of California, Davis Davis, CA 95616, USA Abstract This work
More informationWIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationStability analysis of a cognitive multiple access channel with primary QoS constraints
tability analysis of a cognitive multiple access channel with primary o constraints J. Gambini 1,2,O.imeone 1, U. pagnolini 2,.Bar-Ness 1 andungsooim 3 1 CWCR, NJIT, Newark, New Jersey 07102-1982, UA 2
More informationOptimal Transmission-Sensing-Reception Strategies for Full-duplex Dynamic Spectrum Access
This is a technical report for our submitted paper to IEEE yspan 24 in November 23 Optimal Transmission-Sensing-Reception Strategies for Full-duplex ynamic Spectrum Access Wessam Afifi and Marwan Krunz
More informationSequential Opportunistic Spectrum Access with Imperfect Channel Sensing
Sequential Opportunistic Spectrum Access with Imperfect Channel Sensing Tao Shu and Marwan Krunz Department of Computer Science and Engineering Oakland University, Rochester, MI Department of Electrical
More informationOptimality of Myopic Sensing in Multi-Channel Opportunistic Access
Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Tara Javidi, Bhasar Krishnamachari, Qing Zhao, Mingyan Liu tara@ece.ucsd.edu, brishna@usc.edu, qzhao@ece.ucdavis.edu, mingyan@eecs.umich.edu
More informationCooperative Eigenvalue-Based Spectrum Sensing Performance Limits Under different Uncertainty
Cooperative Eigenvalue-Based Spectrum Sensing Performance Limits Under different Uncertainty A. H.Ansari E&TC Department Pravara Rural Engineering College Loni B. A.Pangavhane E&TC Department Pravara Rural
More informationAdaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems
Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems HyeJeong Lee, Woon-Young Yeo and Dong-Ho Cho Korea Advanced Institute of Science and Technology Abstract The cdma2000 1xEV-DO standard
More informationPrediction Based Cognitive Spectrum Access 1
Prediction Based Cognitive Spectrum Access 1 Boris Oklander Department of Electrical Engineering Technion Israel Institute of Technology Haifa, Israel oklander@tx.technion.ac.il Moshe Sidi Department of
More informationHalf-Duplex Gaussian Relay Networks with Interference Processing Relays
Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras
More informationNovel spectrum sensing schemes for Cognitive Radio Networks
Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced
More informationOn the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels
On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationMultiaccess Communication
Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationP e = 0.1. P e = 0.01
23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function
More informationMultiple-Level Power Allocation Strategy for
Multiple-Level Power Allocation Strategy for 1 Secondary Users in Cognitive Radio Networks Zhong Chen, Feifei Gao, Zhenwei Zhang, James C. F. Li, and Ming Lei arxiv:137.158v2 [cs.i] 12 Dec 213 Abstract
More informationNOMA: Principles and Recent Results
NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationHarnessing Interaction in Bursty Interference Networks
215 IEEE Hong Kong-Taiwan Joint Workshop on Information Theory and Communications Harnessing Interaction in Bursty Interference Networks I-Hsiang Wang NIC Lab, NTU GICE 1/19, 215 Modern Wireless: Grand
More informationInformation Theory Meets Game Theory on The Interference Channel
Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University
More informationHYPOTHESIS TESTING OVER A RANDOM ACCESS CHANNEL IN WIRELESS SENSOR NETWORKS
HYPOTHESIS TESTING OVER A RANDOM ACCESS CHANNEL IN WIRELESS SENSOR NETWORKS Elvis Bottega,, Petar Popovski, Michele Zorzi, Hiroyuki Yomo, and Ramjee Prasad Center for TeleInFrastructure (CTIF), Aalborg
More informationContinuous Power Allocation for Sensing-based Spectrum Sharing. Xiaodong Wang
Continuous Power Allocation for Sensing-based Spectrum Sharing Xiaodong Wang Electrical Engineering Department Columbia University, New York joint work with Z. Chen X. Zhang Y. Yılmaz Z. Guo EUSIPCO 13
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationAdministration. CSCI567 Machine Learning (Fall 2018) Outline. Outline. HW5 is available, due on 11/18. Practice final will also be available soon.
Administration CSCI567 Machine Learning Fall 2018 Prof. Haipeng Luo U of Southern California Nov 7, 2018 HW5 is available, due on 11/18. Practice final will also be available soon. Remaining weeks: 11/14,
More informationMarkovian Decision Process (MDP): theory and applications to wireless networks
Markovian Decision Process (MDP): theory and applications to wireless networks Philippe Ciblat Joint work with I. Fawaz, N. Ksairi, C. Le Martret, M. Sarkiss Outline Examples MDP Applications A few examples
More informationANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM
ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway
More informationExpectation propagation for signal detection in flat-fading channels
Expectation propagation for signal detection in flat-fading channels Yuan Qi MIT Media Lab Cambridge, MA, 02139 USA yuanqi@media.mit.edu Thomas Minka CMU Statistics Department Pittsburgh, PA 15213 USA
More informationA Restless Bandit With No Observable States for Recommendation Systems and Communication Link Scheduling
2015 IEEE 54th Annual Conference on Decision and Control (CDC) December 15-18, 2015 Osaka, Japan A Restless Bandit With No Observable States for Recommendation Systems and Communication Link Scheduling
More informationFinding the best mismatched detector for channel coding and hypothesis testing
Finding the best mismatched detector for channel coding and hypothesis testing Sean Meyn Department of Electrical and Computer Engineering University of Illinois and the Coordinated Science Laboratory
More informationChannel Probing in Communication Systems: Myopic Policies Are Not Always Optimal
Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matthew Johnston, Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,
More informationUsing Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing
Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Mihir Laghate and Danijela Cabric Department of Electrical Engineering, University of California, Los Angeles Emails:
More informationOptimality of Myopic Sensing in Multi-Channel Opportunistic Access
Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Tara Javidi, Bhasar Krishnamachari,QingZhao, Mingyan Liu tara@ece.ucsd.edu, brishna@usc.edu, qzhao@ece.ucdavis.edu, mingyan@eecs.umich.edu
More informationReliable Cooperative Sensing in Cognitive Networks
Reliable Cooperative Sensing in Cognitive Networks (Invited Paper) Mai Abdelhakim, Jian Ren, and Tongtong Li Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI
More informationMorning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland
Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop
More informationDistributed Power Control for Time Varying Wireless Networks: Optimality and Convergence
Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Tim Holliday, Nick Bambos, Peter Glynn, Andrea Goldsmith Stanford University Abstract This paper presents a new
More informationUplink HARQ for Cloud RAN via Separation of Control and Data Planes
1 Uplink HARQ for Cloud RAN via Separation of Control and Data Planes Shahrouz Khalili, Student Member, IEEE and Osvaldo Simeone, Fellow, IEEE arxiv:158.657v5 [cs.it] 5 Sep 16 Abstract The implementation
More informationEUSIPCO
EUSIPCO 3 569736677 FULLY ISTRIBUTE SIGNAL ETECTION: APPLICATION TO COGNITIVE RAIO Franc Iutzeler Philippe Ciblat Telecom ParisTech, 46 rue Barrault 753 Paris, France email: firstnamelastname@telecom-paristechfr
More informationWireless Internet Exercises
Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC
More informationMaximum Sum Rate of Slotted Aloha with Capture
Maximum Sum Rate of Slotted Aloha with Capture Yitong Li and Lin Dai, Senior Member, IEEE arxiv:50.03380v3 [cs.it] 7 Dec 205 Abstract The sum rate performance of random-access networks crucially depends
More informationFully-distributed spectrum sensing: application to cognitive radio
Fully-distributed spectrum sensing: application to cognitive radio Philippe Ciblat Dpt Comelec, Télécom ParisTech Joint work with F. Iutzeler (PhD student funded by DGA grant) Cognitive radio principle
More informationOptimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access
Optimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access ABSTRACT Nicholas B. Chang Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor,
More informationIEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) 1. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio
IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio Yulong Zou, Member, IEEE, Yu-Dong Yao, Fellow, IEEE, and Baoyu Zheng,
More informationPerformance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks
Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless
More informationMathematical Analysis of IEEE Energy Efficiency
Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.
More informationAdaptive Distributed Algorithms for Optimal Random Access Channels
Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October, 2 Adaptive Distributed Algorithms for Optimal Random Access Channels Yichuan Hu and Alejandro Ribeiro
More informationOnline Scheduling for Energy Harvesting Broadcast Channels with Finite Battery
Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,
More informationCommunication constraints and latency in Networked Control Systems
Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega
More informationOpportunistic Cooperation in Cognitive Femtocell Networks
1 Opportunistic Cooperation in Cognitive Femtocell Networks Rahul Urgaonkar, Member, IEEE, and Michael J. Neely, Senior Member, IEEE Abstract We investigate opportunistic cooperation between secondary
More informationA State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels
A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano Abstract We consider scheduling over a wireless
More informationQueueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "
Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals
More informationLearning Algorithms for Minimizing Queue Length Regret
Learning Algorithms for Minimizing Queue Length Regret Thomas Stahlbuhk Massachusetts Institute of Technology Cambridge, MA Brooke Shrader MIT Lincoln Laboratory Lexington, MA Eytan Modiano Massachusetts
More informationON THE CAPACITY REGION OF COGNITIVE MULTIPLE ACCESS OVER WHITE SPACE CHANNELS
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, OCT. 22 ON THE CAPACITY REGION OF COGNITIVE MULTIPLE ACCESS OVER WHITE SPACE CHANNELS Huazi Zhang, Zhaoyang Zhang, Member, IEEE, and Huaiyu
More informationEnergy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss
Energy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss M. Majid Butt, Eduard A. Jorswieck and Amr Mohamed Department of Computer Science and Engineering, Qatar University,
More informationPerformance Analysis of Spectrum Sensing Techniques for Future Wireless Networks
This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions
More informationApproximately achieving the feedback interference channel capacity with point-to-point codes
Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used
More informationLimited Feedback in Wireless Communication Systems
Limited Feedback in Wireless Communication Systems - Summary of An Overview of Limited Feedback in Wireless Communication Systems Gwanmo Ku May 14, 17, and 21, 2013 Outline Transmitter Ant. 1 Channel N
More informationA new analytic approach to evaluation of Packet Error Rate in Wireless Networks
A new analytic approach to evaluation of Packet Error Rate in Wireless Networks Ramin Khalili Université Pierre et Marie Curie LIP6-CNRS, Paris, France ramin.khalili@lip6.fr Kavé Salamatian Université
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationPower Controlled FCFS Splitting Algorithm for Wireless Networks
Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July
More informationDetecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis
Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu
More information