Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel
|
|
- Robyn Hutchinson
- 5 years ago
- Views:
Transcription
1 /33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid, 10/05/2017
2 2/33 Our Focus: Decentralized Broadcast Channel with Imperfect CSIT Sharing sharing/caching of user s data symbols Imperfect CSI sharing x 1=w 1(H (1) )s x 3=w 3(H (3) )s x 2=w 2(H (2) )s
3 3/33 Broadcast Channel (JP-CoMP, Network MIMO) Some simplifying asumptions: (i) K single-antenna TXs and K single-antennas RXs (ii) Perfect CSI at the RX (iii) Gaussian data symbols (iv) Block fading channel A key asumption: User s data symbols are available at all TXs
4 3/33 Broadcast Channel (JP-CoMP, Network MIMO) Some simplifying asumptions: (i) K single-antenna TXs and K single-antennas RXs (ii) Perfect CSI at the RX (iii) Gaussian data symbols (iv) Block fading channel A key asumption: User s data symbols are available at all TXs Received signal at user i Received signal at user i {}}{ y i = h H i x + η i
5 3/33 Broadcast Channel (JP-CoMP, Network MIMO) Some simplifying asumptions: (i) K single-antenna TXs and K single-antennas RXs (ii) Perfect CSI at the RX (iii) Gaussian data symbols (iv) Block fading channel A key asumption: User s data symbols are available at all TXs Received signal at user i y i = Channel from all TXs to user i (1 K) {}}{ hi H x + η i
6 3/33 Broadcast Channel (JP-CoMP, Network MIMO) Some simplifying asumptions: (i) K single-antenna TXs and K single-antennas RXs (ii) Perfect CSI at the RX (iii) Gaussian data symbols (iv) Block fading channel A key asumption: User s data symbols are available at all TXs Received signal at user i y i = h H i Multi-user multi-tx transmit signal (K 1) {}}{ x +η i with {x} j sent from TX j
7 3/33 Broadcast Channel (JP-CoMP, Network MIMO) Some simplifying asumptions: (i) K single-antenna TXs and K single-antennas RXs (ii) Perfect CSI at the RX (iii) Gaussian data symbols (iv) Block fading channel A key asumption: User s data symbols are available at all TXs Received signal at user i y i = h H i x + Additive white Gaussian Noise N C (0, 1) {}}{ η i
8 3/33 Broadcast Channel (JP-CoMP, Network MIMO) Some simplifying asumptions: (i) K single-antenna TXs and K single-antennas RXs (ii) Perfect CSI at the RX (iii) Gaussian data symbols (iv) Block fading channel A key asumption: User s data symbols are available at all TXs Received signal at user i y i = h H i x + Additive white Gaussian Noise N C (0, 1) {}}{ η i For a given transmit power P, let C(P) denote the sum capacity Our figure of merit will be the Degrees-of-Freedom: C(P) DoF lim P log 2 (P)
9 4/33 Is DoF Useful? Rate First order approximation in the SNR R = DoF log 2 (SNR) + o(log 2 (SNR)) + Closed form results + New insights and new paradigms + First step towards capacity DoF SNR DoF Generalized DoF Finite Gap Results Capacity - Inaccurate if strong pathloss differences - Results not always relevant at finite SNR Very successful to discover new approaches/insights (MIMO [Telatar, 1999, ETC], IA [Cadambe and Jafar, 2008, TIT], delayed CSIT [Maddah-Ali and Tse, 2012, TIT],...)
10 /33 DoF and Pathloss A short Parenthesis (1) Example 2-user IC, single-antenna nodes, α 2 = 10 12, H i,j N C (0, 1) TX 1 TX 2 P P α H 21 α H 12 H 11 H 22 RX 1 RX 2 DoF analysis: DoF = 1 [Etkin et al., 2008, TIT] Not the expected behaviour
11 /33 Generalized DoF A short Parenthesis (2) With Generalized DoF, model the pathloss difference Generalized DoF (GDoF) then defined as Example continued: For P = 20dB, E[ H i,j 2 ]. = P γ i,j C(P, {γ i,j } i,j ) DoF ({γ i,j } i,j ) lim P log 2 (P) γ 1,2 = γ 2,1 = 6 and Expected behaviour! DoF ({γ i,j } i,j ) = 2 Remark GDoF not discussed here but extension for the 2 users case in [Bazco et al., 2017, ISIT]
12 7/33 Centralized VS Distributed CSI Centralized TX Independent : Conventional model Cloud RAN =H+σN Distributed TX Dependent : Our focus here H (1) =H+σ (1) N (1) H (2) =H+σ (2) N (2) H (3) =H+σ (3) N (3)
13 /33 Review of the Perfect CSIT Configuration Outline 1 Review of the Perfect CSIT Configuration 2 Review of the Centralized CSIT Configuration 3 Towards the Distributed CSIT Configuration 4 Warming up: The 2-User Case 5 The K-user Case
14 /33 Review of the Perfect CSIT Configuration DoF with Perfect CSIT Remark All TXs have perfect knowledge of H: Optimal DoF is DoF PCSI = K DoF-optimal transmission scheme is Zero Forcing: Received signal is H 1 x = P H 1 F y i = s 1.. s K P H 1 F s i + η i SNR scales in P: asymptotically possible to decode s i with the rate log 2 (P) bits Importantly, x can also be chosen as x = K i=1 beamformer/precoder t i C K 1 is P K t i = Π h 1,,h i 1,h i+1,...,h K h i t i t i s i where the
15 0/33 Review of the Centralized CSIT Configuration Outline 1 Review of the Perfect CSIT Configuration 2 Review of the Centralized CSIT Configuration 3 Towards the Distributed CSIT Configuration 4 Warming up: The 2-User Case 5 The K-user Case
16 11/33 Review of the Centralized CSIT Configuration Imperfect CSIT in the Centralized Case Conventional high SNR parameterization s1,s2,s3 hˆ h i i P δ i α [0, 1] is called the CSIT quality exponent. Intuitively, equal to the ratio between the available CSIT over the needed CSIT α = 0 no CSIT α = 1 perfect CSIT Some practical motivation: Quantization noise with VQ for B >> 1, with B = # quantization bits, If B = α(m 1) log 2 (P), α [0, 1] σ 2 2 M 1 B σ 2 P α
17 Review of the Centralized CSIT Configuration DoF Analysis of the Centralized Configuration DoF CCSI (α) = 1 + (K 1)α Outerbound recently proven in [Davoodi and Jafar, 2016, TIT] Achievable scheme in [Jindal, 2006, TIT][Hao et al., 2015, TCOM] K DoF / α
18 3/33 Review of the Centralized CSIT Configuration DoF-Optimal Scheme for the Centralized Case (1) [Jindal, 2006, TIT][Hao et al., 2015, TCOM] DoF-optimal scheme: Zero-Forcing (ZF) + Rate Splitting (RS) P TX 1 TX 2 P α P -α P -α y 1 = [ ] Ph1 H 1 s 0 0 }{{} RX 1. Common symbol = P RX 2 + P α h1 H t1 ZF s 1 }{{} +. private symbol = P α Pα h H 1 t ZF 2 s 2 }{{} interference. = P 0 with t ZF i = Π hī h i Π h hī i and with h1 H t2 ZF 2 = ĥh 1 t2 ZF + P }{{} α δ1 H t2 ZF 2 0 = P α δ H 1 t ZF 2 2
19 4/33 Review of the Centralized CSIT Configuration DoF-Optimal Scheme for the Centralized Case (2) [Jindal, 2006, TIT][Hao et al., 2015, TCOM] P TX 1 TX 2 P α P -α P -α y 1 = [ ] Ph1 H 1 s 0 0 }{{} RX 1. Common symbol = P RX 2 + P α h1 H t1 ZF s 1 }{{} +. private symbol = P α Pα h H 1 t ZF 2 s 2 }{{} interference. = P 0 Successive Decoding Decode first s 0 with rate (1 α) log 2 (P) bits (SNR. = P 1 α ) Decode then s 1 with rate α log 2 (P) bits (SNR. = P α ) Sum DoF is (1 α) + Kα
20 5/33 Towards the Distributed CSIT Configuration Outline 1 Review of the Perfect CSIT Configuration 2 Review of the Centralized CSIT Configuration 3 Towards the Distributed CSIT Configuration 4 Warming up: The 2-User Case 5 The K-user Case
21 6/33 Towards the Distributed CSIT Configuration Distributed CSIT Configuration With imperfect CSIT sharing extends to s 1,s 2,s 3 hˆ (1) h P (1) δ (1) hˆ (3) h s 1,s 2,s 3 P (3) δ (3) hˆ (2) h P (2) s 1,s 2,s 3 CSIT configuration characterized by 1 α (1) α (2)... α (K) 0 Remark Arbitrary CSIT configuration δ (2)
22 7/33 Towards the Distributed CSIT Configuration An Intuitive Outerbound [de Kerret and Gesbert, 2016, ISIT] Theorem (The Centralized Outerbound) DoF DCSI (α) 1 + (K 1) max j {1,...,K} α(j) }{{} =α (1) DoF upperbounded by DoF achieved by full CSIT exchange Having Ĥ α(1),...,..., Ĥ α(k) doesn t help over having just best CSIT Ĥ α(1) K DoF 2 1 Centralized outer-bound 0 1 α (1)
23 Towards the Distributed CSIT Configuration Conventional Zero Forcing [de Kerret and Gesbert, 2012, TIT] First idea: Use ZF (DoF-optimal for Centralized CSIT) DoF ZF = 1 + (K 1) min j {1,...,K} }{{} =α (K) Very inefficient! Why? Goal is to design T 1 and T 2 such that [ ] T1 0, (Zero Forcing constraint at RX 1) h H 1 T 2 i.e., find a vector orthogonal to h H 1 α (j) T 2 * T 2 *+n T 2 18/33 h 1 H T 1 * T 1
24 19/33 Towards the Distributed CSIT Configuration Problem Statement K DoF 2 Optimal DoF? 1 Centralized outer-bound ZF 0 1 α (1)
25 0/33 Warming up: The 2-User Case Outline 1 Review of the Perfect CSIT Configuration 2 Review of the Centralized CSIT Configuration 3 Towards the Distributed CSIT Configuration 4 Warming up: The 2-User Case 5 The K-user Case
26 21/33 Warming up: The 2-User Case Active-Passive Zero-Forcing (AP-ZF) [de Kerret and Gesbert, 2012, TIT] Main Idea: Less informed TX generates interference, more informed TX removes it {(h (1) 1 )H } 1T 1 + {(h (1) 1 )H } 2T 2 = 0 T 1 = {(h(1) 1 )H } 2 T {(h (1) 2 1 )H } 1 T 2 * T 2 T 2 APZF =c T 1 APZF T 1 * T 1 Achieves the DoF DoF APZF = 1 + α (1)
27 2/33 Warming up: The 2-User Case Active-Passive Zero-Forcing (AP-ZF) Achieves the DoF DoF APZF = 1 + α (1) DoF 2 1 Centralized outer-bound AP-ZF 0 1 α (1) Remark In fact achieves also Generalized DoF [Bazco et al., 2017]
28 3/33 The K-user Case Outline 1 Review of the Perfect CSIT Configuration 2 Review of the Centralized CSIT Configuration 3 Towards the Distributed CSIT Configuration 4 Warming up: The 2-User Case 5 The K-user Case
29 4/33 The K-user Case Generalization of AP-ZF? Problem: AP-ZF doesn t help much with more users Need for a different approach Main Idea DoF APZF = 1 + (K 1)α (K 1) Exploit interference as side information: Interference useful for both the interfered user and the desired user Analogy to the use of delayed CSIT [Maddah-Ali and Tse, 2012, TIT]
30 25/33 The K-user Case A Multi-layer Transmission Scheme [de Kerret and Gesbert, 2016, ISIT] 1 All TXs serve all users with power P α(1) using Active-Passive ZF Generate interferences of power P α(1) K x = P α(1) T APZF i s i i=1 TX 1 TX 2 TX 3 AP-ZF Interferences P α(1) RX 1 RX 2 RX 3
31 26/33 The K-user Case A Multi-layer Transmission Scheme [de Kerret and Gesbert, 2016, ISIT] 2 TX 1 estimates and quantizes the interference terms before their generations K x = P α(1) T APZF i s i i=1 Estimate & quantize at TX 1 TX 1 TX 2 TX 3 AP-ZF Interferences P α(1) RX 1 RX 2 RX 3
32 27/33 The K-user Case A Multi-layer Transmission Scheme [de Kerret and Gesbert, 2016, ISIT] 3 TX 1 then transmits them via a common data symbol at the same time as the private data symbols x = [ ] 1 K P s P α(1) T APZF i s i K 1 i=1 Estimate & quantize Broadcast at TX 1 TX 1 TX 2 TX 3 AP-ZF Interferences Multicast using superposition coding Common signal P P α(1) RX 1 RX 2 RX 3
33 28/33 The K-user Case Signal Processing at TX 1 1 Interference estimation at TX 1: α(1) P (ĥ(1) 1 )H T APZF 2 s 2 = P = α(1) (ĥ(1) 1 + P α(1) h H 1 T APZF P α(1) δ (1) 2 s 2 + P α(1) (δ (1) 1 )H T APZF 2 s 2 1 )H T APZF 2 s 2 } {{ } O(1) TX 1 can compute DoF-perfect estimate of the interference terms! 2 Interference quantization: Use α (1) log 2 (P) bits to quantize the signal scaling in P α(1) Quantization error scaling in P 0 [Cover and Thomas, 2006] 3 Transmit 3α (1) log 2 (P) bits to all users
34 9/33 The K-user Case Signal Processing at RX 1 (w.l.o.g.) User 1 has received y 1 = [ ] Ph1 H 1 s 0 0 K 1 }{{}.=P + P α(1) h1 H T APZF 1 s 1 }{{}.=P α(1) + P α(1) h1 H T APZF 2 s 2 P }{{} α(1) h1 H T APZF 3 s 3 }{{}.=P α(1) + User 1 decodes s 0 and obtains then α(1) P (ĥ(1) 1 )H T APZF 2 s 2, Useful: Remove interference α(1) P (ĥ(1) 2 )H T APZF 3 s 3, Useless (for RX 1) α(1) P (ĥ(1) 3 )H T APZF 1 s 1, Useful: Desired data Achieved DoF: If 3α (1) 1 α (1), achieves DoF DoF = 6α (1) }{{} 2α (1) per user + (1 α (1) ) 3α (1) }{{} multicast DoF after retransmitting interference.=p 0
35 DoF The K-user Case Weak CSIT Regime Theorem If max j {1,...,K} α (j) 1 (weak CSIT regime), 1+K(K 2) DoF DCSI (α) 1 + (K 1) max j {1,...,K} α(j) 3 Weak CSIT Regime [ISIT 16] 2 1 Conventional ZF Active-Passive ZF [ISIT 16] Centralized outerbound [ISIT 16] α1 0/33 Figure: DoF as a function of α (1) for α (2) = 2 3 α(1) and α (3) = 0
36 31/33 DoF The K-user Case Take Home Message DoF analysis allows to develop new schemes/insights with simple linear algebra Role of each TX adapts to the full multi-tx CSIT configuration Multi-layer transmission scheme: Estimate, Qantize & transmit interference at the most informed user Many extensions: Developed a new Hierarchical Zero-Forcing to extend optimality region Extend further? Improving the centralized-outerbound Going beyond the DoF 3 Weak CSIT Regime [ISIT 16] 2 1 Conventional ZF Active-Passive ZF [ISIT 16] Centralized outerbound [ISIT 16] α1
37 32/33 The K-user Case References I Antonio. Bazco, P. de Kerret, D. Gesbert, and N. Gresset. Generalized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed CSIT. to be published IEEE International Symposium on Information Theory (ISIT), V. R. Cadambe and S. A. Jafar. Interference alignment and degrees of freedom of the K-user interference channel. IEEE Trans. Inf. Theory, 54(8): , Aug T. Cover and A. Thomas. Elements of information theory. Wiley-Interscience, Jul A. Gholami Davoodi and S. A. Jafar. Aligned image sets under channel uncertainty: Settling conjectures on the collapse of Degrees of Freedom under finite precision CSIT. IEEE Trans. Inf. Theo., 62(10): , Oct P. de Kerret and D. Gesbert. Degrees of freedom of the network MIMO channel with distributed CSI. IEEE Trans. Inf. Theory, 58(11): , Nov P. de Kerret and D. Gesbert. Network MIMO: Transmitters with no CSI Can Still be Very Useful. In Proc. IEEE International Symposium on Information Theory (ISIT), P. de Kerret, Bazco A., and D. Gesbert. Enforcing Coordination in Network MIMO with Unequal CSIT. In Proc. IEEE Asilomar Conference on Signals, Systems and Computers (ACSSC), 2016a. P. de Kerret, D. Gesbert, J. Zhang, and P. Elia. Optimally bridging the gap from delayed to perfect CSIT in the K-user MISO BC. In Proc. IEEE Information Theory Workshop (ITW), 2016b. R.H. Etkin, D.N.C. Tse, and H. Wang. Gaussian interference channel capacity to within one bit. IEEE Trans. Inf. Theory, 54(12): , Dec C. Hao, Y. Wu, and B. Clerckx. Rate analysis of two-receiver MISO Broadcast Channel with finite rate feedback: A rate-splitting approach. IEEE Trans. on Commun., 63(9): , Sept N. Jindal. MIMO Broadcast Channels with finite-rate feedback. IEEE Trans. Inf. Theory, 52(11): , Nov M.A. Maddah-Ali and D. Tse. Completely stale transmitter channel state information is still very useful. IEEE Trans. Inf. Theory, 58(7): , Jul I. Emre Telatar. Capacity of multi-antenna Gaussian channels. European Transaction on Communications, 10: , 1999.
38 33/33 The K-user Case Conventional precoding 05 décembre 2013.gwb - 1/4-13 déc :49:58
39 34/33 DoF The K-user Case Extension of the Weak CSIT Regime for K = 3 [de Kerret et al., 2016a, Asilomar] Improved scheme building on a new Hierarchical ZF precoding paradigm 3 Weak CSIT Regime [ISIT 16] Extension of Weak CSIT Regime [Asilomar 16] 2 1 Conventional ZF Multi-layer scheme [ISIT 16] Multi-layer with HZF [Asilomar 16] Centralized outerbound [ISIT 16] α 1 Figure: DoF as a function of α (1) for α (2) = 2 3 α(1) and α (3) = 0
40 35/33 The K-user Case Beyond the Weak CSIT Regime Definition (Weak CSIT regime) 1 α (1) α(2) 0.75 Definition (Heterogeneous CSIT regime) α (1) > min (2α (2), ) α(2) α (2) 0.5 Extension of weak CSIT regime Intermediate CSIT regime Definition (Intermediate CSIT regime) weak CSIT regime [ISIT16] Heterogeneous CSIT regime α(2) < α (1) 2α (2) α (1)
41 6/33 The K-user Case Achievable DoF [de Kerret et al., 2016a, Asilomar] Theorem In the 3-user MIMO BC with D-CSIT, it holds that 1 + 2α (1) (Weak CSIT) DoF DCSI 3 (α) (1 + 2 α(2) ) (Intermediate CSIT) 1+α (1) + 3α(1) (1 α (1) )+α (2) (5α (1) 3α (2) 1) (Heterogeneous CSIT) 9α (1) 8α (2) Can be achieved building on new precoding scheme: Hierarchical zero-forcing
42 7/33 The K-user Case Hierarchical ZF with K = 3: Main Property Lemma Let t HZF 3 be the HZF beamformer towards user 3 with average power P. Then: TX 1 TX 2 TX 3 h H 1 t HZF 3 2 P 1 α(1) h H 2 t HZF 3 2 P 1 α(2) 1- α(1) P P 1-α(2) compared with conventional ZF RX 1 RX 2 RX 3 TX 1 TX 2 TX 3 P 1-α(2) P 1-α(2) RX 1 RX 2 RX 3
43 8/33 The K-user Case Roadmap of Hierarchical ZF 1 Make CSIT hierarchical 2 Split precoding in layers 3 Design layer k to reduce interference at user k without reducing interference reduction already realized
44 9/33 The K-user Case (1) Make CSIT Hierarchical Example Example for two transmitters TX1, TX2 with α (1) α (2) Let Q α (2) be our Hierarchical quantizer using α (2) log 2 (P) bits Let us define Ĥ (1) (Ĥ(1) ) Q α (2) α (2) Ĥ (2) α (2) Q α (2) (Ĥ(2) ) Then, there exists a quantizer Q α (2) such that [de Kerret et al., 2016b, ITW] : lim {Ĥ Pr (1) = Ĥ (2) = 1 P α (2) [ ] E Ĥ (j) H 2 α (2) F P α(2), j = 1, 2 α (2) } TX 1 can obtain Ĥ (2) α (2) : CSIT configuration has been made hierarchical More generally, TX i knows what TX i + 1 knows (post quantizing)
45 40/33 The K-user Case (1) Make CSIT Hierarchical (2) H Ĥ (2) Ĥ (1) (1) (1) (2) Q α(1) Q α(2) Q α(3) (1) (2) (3)
46 1/33 The K-user Case (2) Split Precoding in Layers t HZF 3 aimed at user 3 decomposed as t HZF t3 HZF 3 (1) = (2)} 1 3 (2)} {t HZF {t HZF {t3 HZF (3)} 1 {t3 HZF (3)} 2 {t3 HZF (3)} 3 e.g., TX 2 needs to be able to compute the 2th row: t HZF t3 HZF 3 (1) {t3 HZF (2)} 1 {t = 0 + {t 3 HZF 3 HZF (3)} 1 (2)} 2 + {t3 HZF (3)} {t3 HZF (3)} 3
47 42/33 The K-user Case (3) Hierarchical ZF for K = 3 First layer (at TX 1, TX 2 and TX 3) t HZF 3 (3) = λ HZF Ĥ (3)H (Ĥ (3) (Ĥ (3) ) H + 1 P I3 ) 1 e 3 TX 1 TX 2 TX 3 Interfered Users Served user RX 1 RX 2 RX 3
48 42/33 The K-user Case (3) Hierarchical ZF for K = 3 First layer (at TX 1, TX 2 and TX 3) t HZF 3 (3) = λ HZF Ĥ (3)H (Ĥ (3) (Ĥ (3) ) H + 1 P I3 ) 1 e 3 Second layer (at TX 1 and TX 2) TX 1 TX 2 TX 3 t3 HZF (2)= Ĥ (2)H [1:2,1:2] (Ĥ (2) [1:2,1:2] Ĥ(2)H [1:2,1:2] + 1 ) 1Ĥ P I2 (2) [1:2,1:3] thzf 3 (3) P 1-α(2) P 1-α(2) RX 1 RX 2 RX 3
49 42/33 The K-user Case (3) Hierarchical ZF for K = 3 First layer (at TX 1, TX 2 and TX 3) t HZF 3 (3) = λ HZF Ĥ (3)H (Ĥ (3) (Ĥ (3) ) H + 1 P I3 ) 1 e 3 Second layer (at TX 1 and TX 2) t3 HZF (2)= Ĥ (2)H [1:2,1:2] (Ĥ (2) [1:2,1:2] Ĥ(2)H [1:2,1:2] + 1 ) 1Ĥ P I2 (2) [1:2,1:3] thzf 3 (3) TX 1 TX 2 TX 3 Third layer (at TX 1) ( t3 HZF (1)= Ĥ (1)H 1,1 Ĥ (1) 1, ) 1 ([ ] ĥ (1)H t HZF 3 (2) 1 P 0 ) +t3 HZF (3) 1- α(1) P RX 1 P 1-α(2) RX 2 RX 3
50 The K-user Case (3) Hierarchical ZF for K = 3 First layer (at TX 1, TX 2 and TX 3) t HZF 3 (3) = λ HZF Ĥ (3)H (Ĥ (3) (Ĥ (3) ) H + 1 P I3 ) 1 e 3 Second layer (at TX 1 and TX 2) t3 HZF (2)= Ĥ (2)H [1:2,1:2] (Ĥ (2) [1:2,1:2] Ĥ(2)H [1:2,1:2] + 1 ) 1Ĥ P I2 (2) [1:2,1:3] thzf 3 (3) TX 1 TX 2 TX 3 Third layer (at TX 1) ( t3 HZF (1)= Ĥ (1)H 1,1 Ĥ (1) 1, ) 1 ([ ] ĥ (1)H t HZF 3 (2) 1 P 0 ) +t3 HZF (3) 1- α(1) P RX 1 P 1-α(2) RX 2 RX 3 Main Intuition of the Proof Does not increase interference at user 2 when reducing interference at user 1 because 42/33 t HZF 3 (1) 2 P 1 α(2)
51 43/33 The K-user Case Transmission Scheme P Common data symbols HZF data symbols P α(1) P α(1)-α(2) BC s1 s2 s3 RX1 BC s1 s2 s3 RX2 BC s1 s2 s3 Interferences TextText RX3 Less interference bits to convey in second layer More information bits can be squeezed in first layer
Generalized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed CSIT
207 IEEE IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 207 DOI: 009/ECCE2078096480 Generalized Degrees-of-Freedom of the 2-User Case MISO Broadcast Channel with Distributed
More informationarxiv: v2 [cs.it] 27 Aug 2016
GDoF of the MISO BC: Bridging the Gap between Finite Precision and Perfect CSIT arxiv:1602.02203v2 [cs.it 27 Aug 2016 Arash Gholami Davoodi, Bofeng Yuan and Syed A. Jafar Center for Pervasive Communications
More informationHarnessing Interaction in Bursty Interference Networks
215 IEEE Hong Kong-Taiwan Joint Workshop on Information Theory and Communications Harnessing Interaction in Bursty Interference Networks I-Hsiang Wang NIC Lab, NTU GICE 1/19, 215 Modern Wireless: Grand
More informationOn the Degrees of Freedom of the Finite State Compound MISO Broadcast Channel
On the Degrees of Freedom of the Finite State Compound MISO Broadcast Channel Invited Paper Chenwei Wang, Tiangao Gou, Syed A. Jafar Electrical Engineering and Computer Science University of California,
More informationThe Optimality of Beamforming: A Unified View
The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationA Systematic Approach for Interference Alignment in CSIT-less Relay-Aided X-Networks
A Systematic Approach for Interference Alignment in CSIT-less Relay-Aided X-Networks Daniel Frank, Karlheinz Ochs, Aydin Sezgin Chair of Communication Systems RUB, Germany Email: {danielfrank, karlheinzochs,
More informationThe Capacity Region of the Gaussian Cognitive Radio Channels at High SNR
The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract
More informationNash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels
Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,
More informationK User Interference Channel with Backhaul
1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University
More informationApproximate Ergodic Capacity of a Class of Fading Networks
Approximate Ergodic Capacity of a Class of Fading Networks Sang-Woon Jeon, Chien-Yi Wang, and Michael Gastpar School of Computer and Communication Sciences EPFL Lausanne, Switzerland {sangwoon.jeon, chien-yi.wang,
More informationMulti-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong
Multi-User Gain Maximum Eigenmode Beamforming, and IDMA Peng Wang and Li Ping City University of Hong Kong 1 Contents Introduction Multi-user gain (MUG) Maximum eigenmode beamforming (MEB) MEB performance
More informationApproximately achieving the feedback interference channel capacity with point-to-point codes
Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used
More informationMinimum Mean Squared Error Interference Alignment
Minimum Mean Squared Error Interference Alignment David A. Schmidt, Changxin Shi, Randall A. Berry, Michael L. Honig and Wolfgang Utschick Associate Institute for Signal Processing Technische Universität
More informationDegrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling
Degrees-of-Freedom for the -User SISO Interference Channel with Improper Signaling C Lameiro and I Santamaría Dept of Communications Engineering University of Cantabria 9005 Santander Cantabria Spain Email:
More informationThe Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel
The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department
More informationInterference Alignment at Finite SNR for TI channels
Interference Alignment at Finite SNR for Time-Invariant channels Or Ordentlich Joint work with Uri Erez EE-Systems, Tel Aviv University ITW 20, Paraty Background and previous work The 2-user Gaussian interference
More informationInterference, Cooperation and Connectivity A Degrees of Freedom Perspective
Interference, Cooperation and Connectivity A Degrees of Freedom Perspective Chenwei Wang, Syed A. Jafar, Shlomo Shamai (Shitz) and Michele Wigger EECS Dept., University of California Irvine, Irvine, CA,
More informationCooperative Interference Alignment for the Multiple Access Channel
1 Cooperative Interference Alignment for the Multiple Access Channel Theodoros Tsiligkaridis, Member, IEEE Abstract Interference alignment (IA) has emerged as a promising technique for the interference
More informationAchievable Outage Rate Regions for the MISO Interference Channel
Achievable Outage Rate Regions for the MISO Interference Channel Johannes Lindblom, Eleftherios Karipidis and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the original
More informationMode Selection for Multi-Antenna Broadcast Channels
Mode Selection for Multi-Antenna Broadcast Channels Gill November 22, 2011 Gill (University of Delaware) November 22, 2011 1 / 25 Part I Mode Selection for MISO BC with Perfect/Imperfect CSI [1]-[3] Gill
More informationTwo-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems
Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario,
More informationCHANNEL FEEDBACK QUANTIZATION METHODS FOR MISO AND MIMO SYSTEMS
CHANNEL FEEDBACK QUANTIZATION METHODS FOR MISO AND MIMO SYSTEMS June Chul Roh and Bhaskar D Rao Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA 9293 47,
More informationDEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE
DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE Daohua Zhu, A. Lee Swindlehurst, S. Ali A. Fakoorian, Wei Xu, Chunming Zhao National Mobile Communications Research Lab, Southeast
More informationOn the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation
On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang 1 arxiv:1308.3310v1 [cs.it] 15 Aug 2013
More informationEfficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers
Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers Johannes Lindblom, Eleftherios Karipidis and Erik G. Larsson Linköping
More informationOn the Duality of Gaussian Multiple-Access and Broadcast Channels
On the Duality of Gaussian ultiple-access and Broadcast Channels Xiaowei Jin I. INTODUCTION Although T. Cover has been pointed out in [] that one would have expected a duality between the broadcast channel(bc)
More informationJoint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation
Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information
More informationLow-High SNR Transition in Multiuser MIMO
Low-High SNR Transition in Multiuser MIMO Malcolm Egan 1 1 Agent Technology Center, Faculty of Electrical Engineering, Czech Technical University in Prague, Czech Republic. 1 Abstract arxiv:1409.4393v1
More informationVector Channel Capacity with Quantized Feedback
Vector Channel Capacity with Quantized Feedback Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 9697-65 Email: syed@ece.uci.edu,
More informationPrimary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel
Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Stefano Rini, Ernest Kurniawan and Andrea Goldsmith Technische Universität München, Munich, Germany, Stanford University,
More informationUpper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints
Upper Bounds on IO Channel Capacity with Channel Frobenius Norm Constraints Zukang Shen, Jeffrey G. Andrews, Brian L. Evans Wireless Networking Communications Group Department of Electrical Computer Engineering
More informationL interférence dans les réseaux non filaires
L interférence dans les réseaux non filaires Du contrôle de puissance au codage et alignement Jean-Claude Belfiore Télécom ParisTech 7 mars 2013 Séminaire Comelec Parts Part 1 Part 2 Part 3 Part 4 Part
More informationUSING multiple antennas has been shown to increase the
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak
More informationMulti-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems
Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User
More informationDiversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007
Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT ECE 559 Presentation Hoa Pham Dec 3, 2007 Introduction MIMO systems provide two types of gains Diversity Gain: each path from a transmitter
More informationDirty Paper Coding vs. TDMA for MIMO Broadcast Channels
TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University
More informationOn the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels
On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels Giuseppe Caire University of Southern California Los Angeles, CA, USA Email: caire@usc.edu Nihar
More informationSum Capacity of General Deterministic Interference Channel with Channel Output Feedback
Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Achaleshwar Sahai Department of ECE, Rice University, Houston, TX 775. as27@rice.edu Vaneet Aggarwal Department of
More informationSpatial and Temporal Power Allocation for MISO Systems with Delayed Feedback
Spatial and Temporal ower Allocation for MISO Systems with Delayed Feedback Venkata Sreekanta Annapureddy and Srikrishna Bhashyam Department of Electrical Engineering Indian Institute of Technology Madras
More informationTitle. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels
Title Equal Gain Beamforming in Rayleigh Fading Channels Author(s)Tsai, Shang-Ho Proceedings : APSIPA ASC 29 : Asia-Pacific Signal Citationand Conference: 688-691 Issue Date 29-1-4 Doc URL http://hdl.handle.net/2115/39789
More informationThe Diversity Multiplexing Tradeoff for Interference Networks
The Diversity Multiplexing Tradeoff for Interference Networks Aydin Sezgin Ruhr-Universität Bochum Chair of Digital Communication Systems email:aydin.sezgin@rub.de Abstract The diversity-multiplexing tradeoff
More informationSingle-User MIMO systems: Introduction, capacity results, and MIMO beamforming
Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Multiplexing,
More informationMulti-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems
Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User
More informationNOMA: Principles and Recent Results
NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve
More informationFeasibility Conditions for Interference Alignment
Feasibility Conditions for Interference Alignment Cenk M. Yetis Istanbul Technical University Informatics Inst. Maslak, Istanbul, TURKEY Email: cenkmyetis@yahoo.com Tiangao Gou, Syed A. Jafar University
More informationApproximate Capacity of Fast Fading Interference Channels with no CSIT
Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called
More informationInformation Theory Meets Game Theory on The Interference Channel
Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University
More informationI. Introduction. Index Terms Multiuser MIMO, feedback, precoding, beamforming, codebook, quantization, OFDM, OFDMA.
Zero-Forcing Beamforming Codebook Design for MU- MIMO OFDM Systems Erdem Bala, Member, IEEE, yle Jung-Lin Pan, Member, IEEE, Robert Olesen, Member, IEEE, Donald Grieco, Senior Member, IEEE InterDigital
More informationOn Network Interference Management
On Network Interference Management Aleksandar Jovičić, Hua Wang and Pramod Viswanath March 3, 2008 Abstract We study two building-block models of interference-limited wireless networks, motivated by the
More informationOn the Optimality of Treating Interference as Noise in Competitive Scenarios
On the Optimality of Treating Interference as Noise in Competitive Scenarios A. DYTSO, D. TUNINETTI, N. DEVROYE WORK PARTIALLY FUNDED BY NSF UNDER AWARD 1017436 OUTLINE CHANNEL MODEL AND PAST WORK ADVANTAGES
More informationInterference Alignment under Training and Feedback Constraints
Interference Alignment under Training and Feedbac Constraints Baile Xie, Student Member, IEEE, Yang Li, Student Member, IEEE, Hlaing Minn, Senior Member, IEEE, and Aria Nosratinia, Fellow, IEEE The University
More informationFundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes
Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Jingjing Zhang and Osvaldo Simeone arxiv:72.04266v4 [cs.it] 2 Mar 208 Abstract In fog-aided cellular systems,
More informationAchievable rates of MIMO downlink beamforming with non-perfect CSI: a comparison between quantized and analog feedback
Achievable rates of MIMO downlink beamforming with non-perfect CSI: a comparison between quantized and ana feedback Giuseppe Caire University of Sourthern California Los Angeles CA, 989 USA Nihar Jindal
More informationExploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless
Exploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless SPAWC 2003 Rome, Italy June 18, 2003 E. Yoon, M. Vu and Arogyaswami Paulraj Stanford University Page 1 Outline Introduction
More informationCapacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming
Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming Authors: Christian Lameiro, Alfredo Nazábal, Fouad Gholam, Javier Vía and Ignacio Santamaría University of Cantabria,
More informationMIMO Broadcast Channels with Finite Rate Feedback
IO Broadcast Channels with Finite Rate Feedbac Nihar Jindal, ember, IEEE Abstract ultiple transmit antennas in a downlin channel can provide tremendous capacity ie multiplexing gains, even when receivers
More informationto be almost surely min{n 0, 3
1 The DoF Region of the Three-Receiver MIMO Broadcast Channel with Side Information and Its Relation to Index Coding Capacity Behzad Asadi, Lawrence Ong, and Sarah J Johnson arxiv:160803377v1 [csit] 11
More informationAnatoly Khina. Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT
Network Modulation: Transmission Technique for MIMO Networks Anatoly Khina Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT ACC Workshop, Feder Family Award
More informationInteractive Interference Alignment
Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,
More information2-user 2-hop Networks
2012 IEEE International Symposium on Information Theory roceedings Approximate Ergodic Capacity of a Class of Fading 2-user 2-hop Networks Sang-Woon Jeon, Chien-Yi Wang, and Michael Gastpar School of Computer
More informationFeedback Capacity of the Gaussian Interference Channel to Within Bits: the Symmetric Case
1 arxiv:0901.3580v1 [cs.it] 23 Jan 2009 Feedback Capacity of the Gaussian Interference Channel to Within 1.7075 Bits: the Symmetric Case Changho Suh and David Tse Wireless Foundations in the Department
More informationOutage Probability of Multiple-Input. Single-Output (MISO) Systems with Delayed Feedback
Outage Probability of Multiple-Input 1 Single-Output (MISO Systems with Delayed Feedback Venkata Sreekanta Annapureddy 1, Devdutt V. Marathe 2, T. R. Ramya 3 and Srikrishna Bhashyam 3 1 Coordinated Science
More informationTrust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems
Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and
More informationOn Gaussian MIMO Broadcast Channels with Common and Private Messages
On Gaussian MIMO Broadcast Channels with Common and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ersen@umd.edu
More informationDistributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient
Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and
More informationSpatial and Temporal Power Allocation for MISO Systems with Delayed Feedback
Spatial and Temporal Power Allocation for MISO Systems with Delayed Feedback Venkata Sreekanta Annapureddy 1 Srikrishna Bhashyam 2 1 Department of Electrical and Computer Engineering University of Illinois
More informationOutage-Efficient Downlink Transmission Without Transmit Channel State Information
1 Outage-Efficient Downlink Transmission Without Transmit Channel State Information Wenyi Zhang, Member, IEEE, Shivaprasad Kotagiri, Student Member, IEEE, and J. Nicholas Laneman, Senior Member, IEEE arxiv:0711.1573v1
More informationLimited Feedback in Wireless Communication Systems
Limited Feedback in Wireless Communication Systems - Summary of An Overview of Limited Feedback in Wireless Communication Systems Gwanmo Ku May 14, 17, and 21, 2013 Outline Transmitter Ant. 1 Channel N
More informationMaxime GUILLAUD. Huawei Technologies Mathematical and Algorithmic Sciences Laboratory, Paris
1/21 Maxime GUILLAUD Alignment Huawei Technologies Mathematical and Algorithmic Sciences Laboratory, Paris maxime.guillaud@huawei.com http://research.mguillaud.net/ Optimisation Géométrique sur les Variétés
More informationSecure Multiuser MISO Communication Systems with Quantized Feedback
Secure Multiuser MISO Communication Systems with Quantized Feedback Berna Özbek*, Özgecan Özdoğan*, Güneş Karabulut Kurt** *Department of Electrical and Electronics Engineering Izmir Institute of Technology,Turkey
More informationIN this paper, we show that the scalar Gaussian multiple-access
768 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 5, MAY 2004 On the Duality of Gaussian Multiple-Access and Broadcast Channels Nihar Jindal, Student Member, IEEE, Sriram Vishwanath, and Andrea
More informationThe Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference
The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference Soheyl Gherekhloo, Anas Chaaban, and Aydin Sezgin Chair of Communication Systems RUB, Germany Email: {soheyl.gherekhloo,
More informationSpace-Time Coding for Multi-Antenna Systems
Space-Time Coding for Multi-Antenna Systems ECE 559VV Class Project Sreekanth Annapureddy vannapu2@uiuc.edu Dec 3rd 2007 MIMO: Diversity vs Multiplexing Multiplexing Diversity Pictures taken from lectures
More informationBroadcast Channels with Delayed Finite-Rate Feedback: Predict or Observe?
Broadcast Channels with Delayed Finite-Rate Feedback: Predict or Observe? 1 Jiaming Xu, Jeffrey G. Andrews, Syed A. Jafar arxiv:1105.3686v1 [cs.it] 18 May 2011 Abstract Most multiuser precoding techniques
More informationDistributed Power Control and lcoded Power Control
WiOpt, Paris, France Distributed Power Control and lcoded Power Control S. Lasaulce(*), joint work with [authors] (*) L2S (CNRS CentraleSupelec) lasaulce@lss.supelec.fr May 18, 2017 Coded Power Control
More informationOn the Rate Duality of MIMO Interference Channel and its Application to Sum Rate Maximization
On the Rate Duality of MIMO Interference Channel and its Application to Sum Rate Maximization An Liu 1, Youjian Liu 2, Haige Xiang 1 and Wu Luo 1 1 State Key Laboratory of Advanced Optical Communication
More informationTransmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback
IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of
More informationOn Feasibility of Interference Alignment in MIMO Interference Networks
On Feasibility of Interference Alignment in MIMO Interference Networks Cenk M. Yetis, Member, IEEE, Tiangao Gou, Student Member, IEEE, Syed A. Jafar Senior Member, IEEE and Ahmet H. Kayran, Senior Member,
More informationMinimum Repair Bandwidth for Exact Regeneration in Distributed Storage
1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,
More informationCompute-and-Forward for the Interference Channel: Diversity Precoding
Compute-and-Forward for the Interference Channel: Diversity Precoding Ehsan Ebrahimi Khaleghi, Jean-Claude Belfiore To cite this version: Ehsan Ebrahimi Khaleghi, Jean-Claude Belfiore. Compute-and-Forward
More informationInterference Decoding for Deterministic Channels Bernd Bandemer, Student Member, IEEE, and Abbas El Gamal, Fellow, IEEE
2966 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 Interference Decoding for Deterministic Channels Bernd Bemer, Student Member, IEEE, Abbas El Gamal, Fellow, IEEE Abstract An inner
More informationDuality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels
2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 10, OCTOBER 2003 Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels Sriram Vishwanath, Student Member, IEEE, Nihar
More informationOn the Capacity of the Interference Channel with a Relay
On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due
More informationCapacity of Memoryless Channels and Block-Fading Channels With Designable Cardinality-Constrained Channel State Feedback
2038 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 9, SEPTEMBER 2004 Capacity of Memoryless Channels and Block-Fading Channels With Designable Cardinality-Constrained Channel State Feedback Vincent
More informationRate Splitting for MIMO Wireless Networks: A Promising PHY-Layer Strategy for 5G
Rate Splitting for MIMO Wireless Networks: A Promising PHY-Layer Strategy for 5G Bruno Clerckx and Hamdi Joudeh Dept. of Electrical and Electronic Engineering Imperial College London Montreal, Canada,
More informationOn the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise
On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications
More informationInterference Channels with Source Cooperation
Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL
More informationarxiv: v2 [cs.it] 26 Feb 2013
Limited Feedback Design for Interference Alignment on MIMO Interference Networks with Heterogeneous Path Loss and Spatial Correlations 1 arxiv:1302.5978v2 [cs.it] 26 Feb 2013 Xiongbin Rao, Liangzhong Ruan,
More informationarxiv: v2 [cs.it] 22 Aug 2013
Degrees of Freedom of MIMO X Networks: Spatial Scale Invariance, One-Sided Decomposability and Linear Feasibility arxiv:12076137v2 [csit 22 Aug 2013 Hua Sun, Chunhua Geng, Tiangao Gou and Syed A Jafar
More informationHow Much Training and Feedback are Needed in MIMO Broadcast Channels?
How uch raining and Feedback are Needed in IO Broadcast Channels? ari Kobayashi, SUPELEC Gif-sur-Yvette, France Giuseppe Caire, University of Southern California Los Angeles CA, 989 USA Nihar Jindal University
More informationDiversity-Multiplexing Tradeoff of the Two-User Interference Channel
Diversity-Multiplexing Tradeoff of the Two-User Interference Channel arxiv:0905.0385v2 [cs.it] 8 Sep 2009 Adnan Raja and Pramod Viswanath April 9, 2018 Abstract Diversity-Multiplexing tradeoff DMT) is
More informationOn the Capacity of Fading MIMO Broadcast Channels with Imperfect Transmitter Side-Information
To be presented at the 43rd Annual Allerton Conference on Communication, Control, and Computing, September 8 30, 005. (Invited Paper) DRAFT On the Capacity of Fading MIMO Broadcast Channels with Imperfect
More informationWIRELESS networks with multiple users are interference-limited
4170 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 7, JULY 2014 On the Capacity and Degrees of Freedom Regions of Two-User MIMO Interference Channels With Limited Receiver Cooperation Mehdi Ashraphijuo,
More informationAn Outer Bound for the Gaussian. Interference channel with a relay.
An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il
More informationDiversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT
1 Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with artial CSIT Kaushi Josiam, Dinesh Rajan and Mandyam Srinath, Department of Electrical Engineering, Southern Methodist
More informationLattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm
Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm HongSun An Student Member IEEE he Graduate School of I & Incheon Korea ahs3179@gmail.com Manar Mohaisen Student Member IEEE
More informationto reprint/republish this material for advertising or promotional purposes
c 8 IEEE Personal use of this material is permitted However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution
More informationImproved MU-MIMO Performance for Future Systems Using Differential Feedback
Improved MU-MIMO Performance for Future 80. Systems Using Differential Feedback Ron Porat, Eric Ojard, Nihar Jindal, Matthew Fischer, Vinko Erceg Broadcom Corp. {rporat, eo, njindal, mfischer, verceg}@broadcom.com
More information1186 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 3, MARCH /$ IEEE
1186 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 3, MARCH 2008 Diversity Multiplexing Tradeoff Outage Performance for Rician MIMO Channels Won-Yong Shin, Student Member, IEEE, Sae-Young Chung,
More information