Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
|
|
- Primrose Parrish
- 6 years ago
- Views:
Transcription
1 1206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH 2009 Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong Wong, Yonghong Zeng, and Rui Zhang Abstract This paper considers a scenario in which a secondary user (SU) opportunistically accesses a channel allocated to some primary network (PN) that switches between idle and active states in a time-slotted manner. At the beginning of each time slot, SU can choose to stay idle or to carry out spectrum sensing to detect the state of PN. If PN is detected to be idle, SU can carry out data transmission. Spectrum sensing consumes time and energy and introduces false alarms and mis-detections. The objective is to dynamically decide, for each time slot, whether SU should stay idle or carry out sensing, and if so, for how long, to maximize the expected reward. We formulate this as a partially observable Markov decision process and prove important properties of the optimal control policies. Heuristic control policies with low complexity and good performance are also proposed. Numerical results show the significant performance gain of our dynamic control approach for opportunistic spectrum access. Index Terms Cognitive radio, spectrum sensing, false alarms, mis-detections, energy constraint, POMDP. I. INTRODUCTION THE traditional approach of fixed radio spectrum allocation leads to under-utilization. It has been reported in recent studies by the US FCC that there are vast temporal and spatial variations in the usage of allocated spectrum [1]. This motivates the concepts of opportunistic spectrum access (OSA), which allows secondary cognitive radio (CR) systems to opportunistically exploit the under-utilized spectrum. We consider a secondary user (SU) making opportunistic use of a channel allocated to some primary network (PN). PN operates in a time-slotted manner and switches between idle and active states according to a stationary Markovian process. At the beginning of each time slot, SU needs to decide whether to stay idle or to carry out spectrum sensing to detect the state of PN. If SU chooses to carry out sensing, it needs to decide the duration of the sensing period and to meet a minimum detection probability. Subsequently, if spectrum sensing indicates that PN is idle, SU transmits data during the rest of the slot. There are important trade-offs when SU makes the above control decisions. By staying idle in a particular time slot, the user conserves energy, but suffers increase in delay and reduction in throughput. By carrying out spectrum sensing, SU consumes time and energy to acquire knowledge of the state of the primary network, and stands a chance to transmit data if PN is idle. Furthermore, when the required probability Manuscript received June ; revised as a transactions letter October ; accepted October The associate editor coordinating the review of this paper and approving it for publication was T. Hou. The authors are with the Institute for Infocomm Research, A STAR, 1 Fusionopolis Way, #21-01 Connexis, Singapore ( athoang, ycliang, wongtc, yhzeng, rzhang}@i2r.a-star.edu.sg). Digital Object Identifier /TWC /09$25.00 c 2009 IEEE of detection is fixed, increasing the sensing time reduces the probability of false alarm and therefore increases the probability of transmission for SU. However, increasing the sensing time also reduces the time available for transmission. For SU, given the delay cost associated with staying idle in a time slot, the energy costs associated with spectrum sensing and data transmission, and the throughput gain associated with a successful transmission, we consider the problem of finding an optimal policy which decides the idle and sensing modes, together with spectrum sensing time, to maximize the expected net reward. Here, the reward is defined as a function of delay and energy costs and throughput gain. We analyze this problem using the framework of partially observable Markov decision processes (POMDP) and prove important properties of the optimal policies. Heuristic control policies with low complexity and good performance are also proposed. Recent works on controlling spectrum-sensing in OSA systems can roughly be classified into two groups, i.e., those that focus on the control within each time slot, when the status of a primary network is more or less static [2] [4] and those that focus on the time dynamics of the control problem [5], [6]. In [2] [4], the control objective is to trade off between sensing accuracy and time available for communications, i.e., the longer the sensing duration, the lower the false alarm probability and the longer the sensing duration, the less time is available for communications. However, the dynamics of primary networks is not taken into account in [2] [4]. In [5], Zhao et al. consider a spectrum access scenario similar to ours and prove the important separation principle which decouples the sensing policy from spectrum access policy. However, in [5], energy consumption and sensing duration are not part of the control problem. The work in [6] does take into account the energy consumption but assume that spectrum sensing is perfect. This paper bridges the gap between the problems considered in [2] [4] and in [5], [6]. The rest of this paper is organized as follows. In Section II, we describe the system model and the control problem. Important properties of the optimal control policies are discussed in Section III. In Section IV, heuristic policies are proposed. Numerical results are presented in Section V. Finally, we conclude the paper in Section VI. II. SYSTEM MODEL A. Primary Network We assume that PN is either active or idle in each time slot of duration T and, from one time slot to the next, randomly switches states according to a stationary Markovian process. The process is specified by two parameters b and g, whereb is the probability that PN becomes active in the next time slot, given that it is idle in the current slot and g is the probability
2 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH Slots PU idle idle active idle active SU s trans. ack s quiet s quiet idle s trans. ack time out Fig. 1. Operations of a primary network and secondary user. PN switches between active and idle according to a Markovian process. SU must carry out spectrum sensing before transmitting in each time slot. Sensing can introduces false alarms (e.g. in slot 2) and mis-detections (e.g. in slot 5). that PN becomes idle in the next time slot, given that it is active in the now. The stationary probabilities of being idle and active for PN are π i = g/(b + g) and π a = b/(b + g), respectively. We further assume that μ =1 b g>0, i.e., the switching process contains positive memory [7]. B. Opportunistic Spectrum Access SU opportunistically accesses the channel by first synchronizing with the slot structure of PN and then carrying out the following mechanism (illustrated in Fig. 1). 1) Spectrum Sensing: If SU wishes to transmit in a particular slot, it first spends a duration τ to carry out spectrum sensing, i.e., a binary hypothesis test: H 0 : the primary network is idle, (1) versus H 1 : the primary network is active. Let θ denote the outcome of the above binary hypothesis test, where θ =0means H 0 is detected and θ =1otherwise. Associated with the spectrum sensing activity are probability of false alarm, i.e., mistaking H 0 for H 1, and probability of mis-detection, i.e., mistaking H 1 for H 0.ItisassumedthatSU must meet a fixed probability of detection P d. Then, the probability of false alarm is a function of the sensing time τ and is denoted by P fa (τ). The sensing duration τ must be within the interval [τ min,τ max ],where0 <τ min τ max <T.Itis assumed that for the given range of τ, 0 <P fa (τ) <P d < 1 and P fa (τ) is continuous, differentialbe, and decreasing in τ. 2) Data transmission: If the sensing outcome is θ =0,SU proceeds to transmit data in the rest of the time slot. Otherwise, it must stay quiet and wait until the next time slot to try again. 3) Acknowledgment: Even though θ = 0, this can be due to a mis-detection. Mis-detections result in collisions between primary and secondary transmissions. We assume that if SU transmission is carried out when the primary network is actually idle, a positive acknowledgment (ACK) is returned, otherwise, collisions can be detected based on ACK time out. C. POMDP Formulation Our control problem can be classified as a discrete-time POMDP with the following components. 1) Belief State: It is well known ( [8]) that for each POMDP, all information that is useful for making decisions can be encapsulated in the posterior distribution vector of the system states. In our control problem, at the beginning of each time slot, based on previous actions and observations, SU can calculate the probability that the primary network is idle in the time slot. We denote this probability by p and name it the belief state. After each time slot, depending on the action taken by SU and the corresponding outcome, p can be updated according to one of the following four cases. Case 1: SU stays idle and does not carry out spectrum sensing. Then, the next belief state, i.e., the probability that PN is idle in the next time slot is: L 1 (p) =p(1 b)+(1 p)g = p(1 b g)+g. (2) Case 2: SU senses the channel for the duration τ, obtains θ =1, i.e., PN is active, and therefore keeps quiet in the rest of the time slot. Using Bayes rule, the belief state in the next time slot is: L 2 (p, τ) = pp fa(τ)(1 b)+(1 p)p d g. (3) pp fa (τ)+(1 p)p d Case 3: SU senses the channel for the duration τ, obtains θ = 0, carries out transmission, and subsequently receives an ACK at the end of the slot. The ACK implies that PN is actually idle during the current time slot and therefore, the belief state in the next time slot is L 3 =1 b. Case 4: All the same as Case 3, except that an ACK is not received at the end of the slot. This implies that PN is active in the current time slot but is mis-detected by SU. Therefore, the belief state in the next time slot is L 4 = g. As can be noted, L 3 and L 4 do not depend on p and τ. However, to simplify the notation, we use L 1 (p, τ), L 3 (p, τ), L 4 (p, τ) interchangeable for L 1 (p), L 3, L 4. Also, letting Q i (p, τ), i =2, 3, 4 denote the probabilities that Case i above happens, we have: Q 2 (p, τ) =pp fa (τ)+(1 p)p d, Q 3 (p, τ) =p(1 P fa (τ)) Q 4 (p, τ) =(1 p)(1 P d ). 2) Properties of L i (p, τ): From (2) and the assumption that the state-transition matrix M has positive memory, i.e., 1 b g>0, it follows that L 1 (p) is increasing in p. From (3), L 2 (p, τ) p (4) = (1 b g)p dp fa (τ) [P d p(p d P fa (τ))] 2. (5) Furthermore, as 1 b g>0 and P d >P fa (τ) > 0, L2(p,τ ) p is positive and increasing in p. Therefore, L 2 (p, τ) is convex and increasing in p. It can also be easily verified that L 4 (p) L 2 (p, τ) L 3 (p) for all τ.
3 1208 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH ) Costs, Reward, and Control Objective: We assume that the energy cost of carrying out spectrum sensing for τ units of time is a continuous, non-negative and increasing function in τ and is denoted by c s (τ). Letr t and c t respectively be the gain in throughput and the energy cost, both are measured per unit of transmission time. It is reasonable to assume that r t >c t 0, otherwise, there is no justification for SU to carry out transmission. Note that SU can also choose to stay idle during a time slot to conserve energy. However, doing so negatively affect throughput and latency. We assume that, for SU, the cost of staying idle during each time slot is c i, c i 0. We assume that the slot duration T is much longer than ACK time/time-out so that this effect can be ignored. In a particular time slot, given that the probability of PN being idle is p and SU carries out sensing for τ units of time, the expected net gain for SU can be calculated as: G(p, τ) =p(1 P fa (τ))(t τ)(r t c t ) (6) (1 p)(1 P d )(T τ)c t c s (τ). It can be verified that G(p, τ) is continuous and increasing in p and G(p, τ) is also continuous in τ. To simplify the notation, we use τ =0to represent that SU chooses to stay idle. We then have the following expected reward when the sensing decision is set to τ. ci τ =0 R(p, τ) = (7) G(p, τ), τ min τ τ max. We are interested in the following problem. Definition 1: Let p n denote the probability that the primary network is idle during time slot n, select the sensing time τ n, τ n 0, [τ min,τ max ]}, to maximize the following discounted reward function E N 1 n=0 α n R(p n,τ n ) } p0 = p, (8) where 0 <α<1 is a discounting factor, and 1 N is the control horizon. In general, discounted reward is reasonable when SU values the reward obtained now more than what it can get in the future. Also, there is a close relationship between averagereward and discounted-reward problems, i.e., when α is closed enough to 1, then an optimal solution to the α-discounted problem is also optimal for an average-reward problem [8]. For the control problem in Definition 1, we can set p 0 = π i, where π i is definedinsectionii.a. III. STRUCTURE OF OPTIMAL POLICIES A. Monotonicity and Convexity of Value Functions When N<, letv N (p) denote the maximum achievable discounted reward function in Definition 1, V N (p) satisfies the following Bellman equation ( [8]): V N (p) = max c i + αv N 1 (L 1 (p)), G(p, τ)+α } (9) Q i (p, τ)v N 1 (L i (p, τ)), N > 1, where V 1 (p) = max ci, G(p, τ) }. (10) When N =, letv (p) denote the maximum achievable discounted reward function in Definition 1, V (p) satisfies the following Bellman equation ( [8]): V (p) = max c i + αv (L 1 (p)), G(p, τ)+α } Q i (p, τ)v (L i (p, τ)). (11) It can be shown ( [8]) that V N (p) and V (p) are continuous in p and lim n V n (p) =V (p). Proposition 1: V N (p) and V (p) are nondecreasing and convex in p. Due to limited space, we omit the proof. We note that the convexity and nondecreasing property of the value functions in the belief state is quite well-known in the POMDP literature [9], [10]. Remark 1: Proposition 1 states intuitively that, the higher the probability p that PN is idle at the beginning of the control process, the higher the maximum achievable expected reward V N (p) and V (p). Furthermore,asV N (p) and V (p) are convex, V N (p) and V (p) increase at least linearly in p. B. Properties of Optimal Policies Let us explore some useful structural properties of the optimal control policies. Letting G (p) = max G(p, τ), (12) as G(p, τ) is increasing in p, so is G (p). We state the following property of the optimal control policies. Proposition 2: Let p be the minimum value of p such that G (p ) > c i. If, in a particular time slot, the probability of PN being idle is p such that p p, then an optimal policy must carry out spectrum sensing in that time slot. Proof: Let us prove for the case when N < }. We have V 1 (p) = max τ [τmin,τ max] c i, G(p, τ) = max c i,g (p)}, whereg (p) G (p ) > c i, therefore, spectrum sensing should be carried out when N =1. For N > 1, equation (9) applied. Next, notice that Q i(p, τ) = 1 and Q i(p, τ)l i (p, τ) = L 1 (p). Then, as V N 1 (p) is convex, V N 1 (L 1 (p)) Q i (p, τ)v N 1 (L i (p, τ)), τ. (13) From (9) and (13), and the fact that G (p) G (p ) > c i, it is clear that the system should carry out spectrum sensing in the current time slot. The proof for N = is similar. Remark 2: Proposition 2 gives a sufficient condition on the value of p, i.e., p p, for carrying out spectrum sensing. However, this may not be a necessary condition. In general, the optimal policies for POMDP may not possess the thresholdbased structure in the belief state (see exceptions in [9], [10]).
4 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH A natural question is, when sensing is carried out, how the optimal time τ would vary with p. Let F N (p, τ) =α Q i (p, τ)v N 1 (L i (p, τ)) (14) be the expected discounted future reward given the belief state in a particular time slot is p and sensing is carried out for a duration τ. Similarly, for infinite control horizon, define F (p, τ) =α Q i (p, τ)v (L i (p, τ)), τ min τ τ max. (15) The following statement highlights the effect of increasing the spectrum sensing time τ. Proposition 3: F N (p, τ) and F (p, τ) are nondecreasing in τ. Due to limited space, we omit the proof. Essentially, Proposition 3 makes concrete the intuition that the more sensing being carried out in the current time slot, the better the expected reward in the future time slots. This is because increasing the sensing time gives the secondary user more accurate knowledge of the state of the primary network, which in turn improves future control. To further study the effect of varying the sensing time, we need to make the following assumptions. A1: The probability of false alarm, i.e., P fa (τ), isconvex and decreasing in τ, τ min τ τ max. A2: The energy cost of sensing, i.e., c s (τ), is convex and increasing in τ. For assumption A1, the justification can be found in [2] while for A2, we give an example of energy detection. Energy detection comprises of three main steps, i.e., i) to take K samples of the signal; ii) to calculate the average power of the K samples; and iii) to compare the average power to a certain threshold. The complexity of the first and second steps is linear in K. Furthermore,K is linear in τ, soc s (τ) can be assumed linear in τ when energy detection is employed. It can be easily verified that, when P fa (τ) is convex and decreasing while c s (τ) is convex and increasing in τ, G(p, τ) is concave in τ. Now, as G(p, τ) is concave, continuous, and has a strictly decreasing first order derivative for all τ in [τ min,τ max ], there exists an unique maximum point for G(p, τ). Letting τ (p) = arg max G(p, τ), (16) τ min τ τ max the following proposition relates the optimal sensing time to τ (p). Proposition 4: Given assumptions A1 and A2, if at the beginning of a particular time slot, the probability of the primary network being idle is p and sensing is carried out, then the optimal sensing time τ opt is greater than or equal to τ (p). Proof: We prove for N =, the case when N < is similar. The proof is by contradiction. Suppose the optimal sensing time τ opt < τ (p). Due to the concavity of G(p, τ opt ) <G(p, τ (p)). Furthermore, from Proposition 3, we have F (p, τ opt ) F (p, τ (p)), therefore G(p, τ opt )+F (p, τ opt ) <G(p, τ (p)) + F (p, τ (p)), (17) which contradicts to the fact that τ opt is the optimal sensing time given p. This completes the proof. Remark 3: Proposition 4 states that when the probability of the primary network being idle is p and sensing is carried out, then the lower bound of the optimal sensing time is τ (p). It can also be further proved that the lower bound τ (p) is always monotonic in p. IV. HEURISTIC POLICIES Directly solving the POMDP described in Section III can be computational challenging. In this section, suboptimal control policies that can be obtained at lower complexity are discussed. A. Grid-based Approximation Grid-based approximation is a widely-used approach for approximating solutions to POMDPs. In this approach, the value function is approximated at a finite number of belief points on a grid, using standard value iteration algorithm [8]. The value function at belief points not belonging to the grid is subsequently evaluated using interpolation. In this paper, we employ the fixed-resolution, regular-grid approach proposed by Lovejoy [11]. B. Myopic Policy ζ m (.) Proposition 2 identifies the sufficient condition on the probability that PN is idle for sensing to be carried out. Furthermore, Proposition 4 gives the lower bound on the optimal sensing time. Based on these, we consider the myopic policy that set the sensing time in slot n as τ n = ζ m (p n ) where ζ m (p) =τ (p) if p p and ζ m (p) =0otherwise. Setting the sensing time τ = ζ m (p) myopically maximizes the instantaneous gain when the belief state is p. Note that while the grid-based policy mentioned above requires the use of value iteration, this myopic policy can be directly calculated. C. Static Policy ζ s (.) Consider a static spectrum access policy that always carries out sensing with a fixed sensing duration. Note that the stationary probability of the primary network being idle is π i = b b+g. We can calculate τ (π i ) = arg max G (π i,τ). τ min τ τ max Then, for every time slot, sensing is carried out for the duration of τ (π i ). We term this policy ζ s (.). D. Genie s Policy We are going to normalize the performance of different control policies to that of the following so called Genie s policy. Suppose that at the beginning of each time slot, a genie tells the secondary user exactly what the state of the primary network is. Then, the best action for the secondary user is to carry out transmission if the primary network is idle, and to stay idle if the primary network is active.
5 1210 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH μ=0.5 Normalized V(p) p (prob. of primary network being idle) Fig. 2. Normalized optimal reward function. Optimal reward function V (p) is convex and increasing in p. P d =10%, c i =0, s =1, c t =2, r t =3, and µ =0.9. The optimal reward function is normalized by the reward of Genie s Policy. V. NUMERICAL RESULTS AND DISCUSSION In this section, we present numerical results that illustrate our theoretical analysis. We focus on the infinite control horizon scenario, i.e., when N =. A. Model for Numerical Studies We assume that PN operates on a channel with bandwidth of B =6MHz. Time slot duration is T =10msecs. SU employs energy detection for spectrum sensing, with channel being oversampled at rate f s = 7/8B. Given the required probability of detection P d = 10%, the sensing SNR of γ = 15dB, and the sensing duraration τ, the probability of false alarm can be calculated by ( [2]): P fa (τ) =Q( 2γ +1Q 1 (P d )+ τf s γ), (18) where Q(.) is the complementary distribution function of a standard Gaussian variable. We assume that the sensing cost is linear in sensing time, i.e., c s (τ) =sτ, s>0. The memory of PN switching process, i.e., μ =1 b g, is varied from 0.1 to While doing so, we always set b = g =(1 μ)/2. B. Characteristics of Optimal Policies To obtain optimal solutions to our POMDP, we use the solver package provided by A. Cassandra [12]. 1) Optimal reward function is convex and nondecreasing: In Fig. 2, we plot the optimal reward function V (p) versus the initial belief state p. As stated in Proposition 1, V (p) is convex and nondecreasing in p. As can be seen, for high value of p, V (p) is close to a linear function. This can be explained by the fact that the optimal control action does not vary much for high value of p (refer to Figs. 3 and 4). 2) Optimal sensing time τ opt (p): In Figs. 3 and 4, we plot the sensing time versus the probability of PN being idle for different control policies, i.e., optimal, grid-based approximation, myopic, and static. It can be observed that there is a threshold value for the belief state p above which it τ/t Optimal Grid 0.02 ζ m (.) ζ s (.) p (prob. of primary network being idle) Fig. 3. Sensing times for different policies when the memory of primary user switching process is set to µ =0.5. P d =10%, c i =0, s =1, c t =2, r t =3. τ/t μ=0.9 Optimal Grid 0.02 ζ m (.) ζ s (.) p (prob. of primary network being idle) Fig. 4. Sensing times for different policies when the memory of primary user switching process is set to µ =0.9, P d =10%, c i = 1000, s =1, c t =2, r t =3. is optimal for the secondary user to carry out spectrum sensing and below which it is optimal to stay idle. In other words, the optimal sensing strategies tend to exhibit the threshold-based characteristic. From Fig. 3, it can also be observed that for a relatively low value of memory of PN switching process (μ =0.5), both the grid-based and myopic policies approximate the optimal sensing durations well. However, in Fig. 4, when the memory increases (μ = 0.9), while the grid-based policy is close to optimal, myopic policy is significantly different from the optimal policy for low value of p. This difference can be explained by the fact that the myopic policy only focuses on instantaneous gain and ignores future effects. As a result, it is not able to exploit the memory in PN states. Comparing Fig. 3 and 4, it is evident that when the memory of of the PN switching process increases, the optimal sensing time also increases. This is because the higher the memory,
6 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH Normalized reward Optimal Grid (20 points) Grid (10 points) ζ m (.) ζ s (.) 10 point grid approximation 20 point grid approximation μ (memory of primary network switching process) Fig. 5. Normalized rewards achieved by different control policies. The rewards achieved by different policies are normalized by that of the Genie s Policy. c i =1000, c s =1, c t =2, r t =3. the slower the change in status of the primary network and therefore, the more useful the sensing activity for predicting the future state of the primary network. Also, in Fig. 4, when the cost of staying idle is increased to c i = 1000, sensingis carried out given smaller value of probability that PN is idle. C. Performance Comparison In Fig. 5, we plot the expected reward versus the memory μ of PN switching process for optimal, grid-based, myopic, and static policies, normalized to that of Genie s policy. As can be seen, the performance of the optimal, grid-based and myopic polices all improves with increase in memory μ. This is because the higher the memory, the more slowly PN switches state, which implies the more useful sensing activities for future control. On the other hand, the performance of the static policy (ζ s (.)) does not change with μ. This is because when μ is varied, we always keeps the stationary probability of PN being active or idle unchanged (π i =0.5) sothatin every time slot, ζ s (.) always carries out sensing for a fixed duration. It is also important to note that, at relatively high value of μ, both grid-based and myopic policies, which employ our approach of dynamically controlling the sensing/channelaccess operation of SU, achieve significant performance gain compared to the static policy. It can be observed that for the low range of memory, the performance of both grid-based and myopic policies are close to that of the optimal policy. On the other hand, for higher value of memory, i.e., when PN switches state more slowly, only grid-based policy can approximate the performance of the optimal policy. The explanation for this is the same as for the difference in the sensing time in Figs. 3 and 4. In particular, for low memory, both myopic and grid-based policies can approximate the optimal decisions well. However, for high value of memory, only grid-based policy has decisions close to optimal. It is also evident that the performance of a 10- point grid-based approximation is very close to optimal, i.e., grid-based approximation can be employed without loss of performance in our POMDP problem. VI. CONCLUSION In this paper, we study spectrum-sensing policies that take into account the dynamics of the primary networks and determine the spectrum sensing duration in order to optimize secondary users performance. As such, this paper bridges the gap between the two groups of existing spectrum-sensing/control literature that either focus on adapting to the dynamics of the primary networks or on optimizing the spectrum-sensing duration, but not on both. We present theoretical analysis and numerical results to highlight the effectiveness of our control approach. REFERENCES [1] FCC, Spectrum policy task force report, FCC , Nov [2] Y. C. Liang, Y. H. Zeng, E. Peh, and A. T. Hoang, Sensing-throughput tradeoff for cognitive radio networks, IEEE Trans. Wireless Commun., vol. 7, no. 4, pp , Apr [3] A. Ghasemi and E. Sousa, Optimization of spectrum sensing for opportunistic spectrum access in cognitive radio networks, in Proc. 4th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, USA, Jan [4] Y. Pei, A. T. Hoang, and Y.-C. Liang, Sensing-throughput tradeoff in cognitive radio networks: How frequently should spectrum sensing be carried out? in Proc. 18th IEEE PIMRC, Athens, Greece, Sept [5] Q. Zhao, L. Tong, A. Swami, and Y. Chen, Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: a pomdp framework, IEEE J. Select. Areas Commun., vol. 25, no. 3, pp , Apr [6] A. T. Hoang and Y.-C. Liang, Adaptive scheduling of spectrum sensing periods in cognitive radio networks, in Proc. 50th IEEE Global Telecommunications Conference (Globecom), Washington DC, USA, Nov [7] M. Mushkin and I. Bar-David, Capacity and coding for the Gilbert- Elliott channels, IEEE Trans. Inform. Theory, vol. 35, no. 6, pp , Nov [8] D. P. Bertsekas, Dynamic Programming and Optimal Control, 2nd ed., vols. 1 and 2. Athena Scientific, [9] S. C. Albright, Structural results for partially observable markov decision processes, Operations Research, vol. 27, no. 5, pp , Sept./Oct [10] W. S. Lovejoy, Some monotonicity results for partially observable markov decision processes, Operations Research, vol. 35, no. 5, pp , Sept./Oct [11] W. Lovejoy, Computationally feasible bounds for partially observed markov decision processes, Operations Research, vol. 39, no. 1, pp , Jan./Feb [12] A. R. Cassandra, Tony s pomdp page, website edu/research/ai/pomdp/.
Dynamic spectrum access with learning for cognitive radio
1 Dynamic spectrum access with learning for cognitive radio Jayakrishnan Unnikrishnan and Venugopal V. Veeravalli Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University
More informationOn the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels
On the Optimality of Myopic Sensing 1 in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels Kehao Wang, Lin Chen arxiv:1103.1784v1 [cs.it] 9 Mar 2011 Abstract Recent works ([1],
More informationSTRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS
STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS Qing Zhao University of California Davis, CA 95616 qzhao@ece.ucdavis.edu Bhaskar Krishnamachari University of Southern California
More informationOPPORTUNISTIC Spectrum Access (OSA) is emerging
Optimal and Low-complexity Algorithms for Dynamic Spectrum Access in Centralized Cognitive Radio Networks with Fading Channels Mario Bkassiny, Sudharman K. Jayaweera, Yang Li Dept. of Electrical and Computer
More informationPerformance of Round Robin Policies for Dynamic Multichannel Access
Performance of Round Robin Policies for Dynamic Multichannel Access Changmian Wang, Bhaskar Krishnamachari, Qing Zhao and Geir E. Øien Norwegian University of Science and Technology, Norway, {changmia,
More informationarxiv:cs/ v1 [cs.ni] 27 Feb 2007
Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors Yunxia Chen, Qing Zhao, and Ananthram Swami Abstract arxiv:cs/0702158v1 [cs.ni] 27 Feb 2007 We
More informationOptimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio
More informationA POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation
A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New
More informationCognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information
Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information Fabio E. Lapiccirella, Zhi Ding and Xin Liu Electrical and Computer Engineering University of California, Davis, California
More informationBayesian Congestion Control over a Markovian Network Bandwidth Process
Bayesian Congestion Control over a Markovian Network Bandwidth Process Parisa Mansourifard 1/30 Bayesian Congestion Control over a Markovian Network Bandwidth Process Parisa Mansourifard (USC) Joint work
More informationDistributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users
Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users Mario Bkassiny and Sudharman K. Jayaweera Dept. of Electrical and Computer Engineering University of New
More informationPower Allocation over Two Identical Gilbert-Elliott Channels
Power Allocation over Two Identical Gilbert-Elliott Channels Junhua Tang School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University, China Email: junhuatang@sjtu.edu.cn Parisa
More informationOptimality of Myopic Sensing in Multi-Channel Opportunistic Access
Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Tara Javidi, Bhasar Krishnamachari, Qing Zhao, Mingyan Liu tara@ece.ucsd.edu, brishna@usc.edu, qzhao@ece.ucdavis.edu, mingyan@eecs.umich.edu
More informationOptimal Sensing-Transmission Structure for Dynamic Spectrum Access
Optimal Sensing-Transmission Structure for Dynamic Spectrum Access Senhua Huang, Xin Liu, and Zhi Ding University of California, Davis, CA 9566, USA Abstract In cognitive wireless networks where secondary
More informationAlgorithms for Dynamic Spectrum Access with Learning for Cognitive Radio
Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Jayakrishnan Unnikrishnan, Student Member, IEEE, and Venugopal V. Veeravalli, Fellow, IEEE 1 arxiv:0807.2677v2 [cs.ni] 21 Nov 2008
More informationChannel Allocation Using Pricing in Satellite Networks
Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract
More informationBayesian Congestion Control over a Markovian Network Bandwidth Process: A multiperiod Newsvendor Problem
Bayesian Congestion Control over a Markovian Network Bandwidth Process: A multiperiod Newsvendor Problem Parisa Mansourifard 1/37 Bayesian Congestion Control over a Markovian Network Bandwidth Process:
More informationOptimality of Myopic Sensing in Multi-Channel Opportunistic Access
Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Tara Javidi, Bhasar Krishnamachari,QingZhao, Mingyan Liu tara@ece.ucsd.edu, brishna@usc.edu, qzhao@ece.ucdavis.edu, mingyan@eecs.umich.edu
More informationOpportunistic Channel-Aware Spectrum Access for Cognitive Radio Networks with Interleaved Transmission and Sensing
1 Opportunistic Channel-Aware Spectrum Access for Cognitive Radio Networks with Interleaved Transmission and Sensing Sheu-Sheu Tan, James Zeidler, and Bhaskar Rao Department of Electrical and Computer
More informationTransmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback
IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of
More informationMorning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland
Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable
More informationMultiple-Level Power Allocation Strategy for
Multiple-Level Power Allocation Strategy for 1 Secondary Users in Cognitive Radio Networks Zhong Chen, Feifei Gao, Zhenwei Zhang, James C. F. Li, and Ming Lei arxiv:137.158v2 [cs.i] 12 Dec 213 Abstract
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationNovel spectrum sensing schemes for Cognitive Radio Networks
Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced
More informationA Restless Bandit With No Observable States for Recommendation Systems and Communication Link Scheduling
2015 IEEE 54th Annual Conference on Decision and Control (CDC) December 15-18, 2015 Osaka, Japan A Restless Bandit With No Observable States for Recommendation Systems and Communication Link Scheduling
More informationMARKOV DECISION PROCESSES (MDP) AND REINFORCEMENT LEARNING (RL) Versione originale delle slide fornita dal Prof. Francesco Lo Presti
1 MARKOV DECISION PROCESSES (MDP) AND REINFORCEMENT LEARNING (RL) Versione originale delle slide fornita dal Prof. Francesco Lo Presti Historical background 2 Original motivation: animal learning Early
More informationMaximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks
Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks Shuang Li, Student Member, IEEE, Zizhan Zheng, Member, IEEE, Eylem Ekici, Senior Member, IEEE, and Ness Shroff, Fellow, IEEE
More informationCooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints
Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong
More informationThis is the Pre-Published Version
Copyright 2013 IEEE. Reprinted from "Sun, X. & Tsang, D.H.K. (2013). Energy-efficient cooperative sensing scheduling for multi-band cognitive radio networks. IEEE Transactions on Wireless Communications,
More informationAlgorithms for Dynamic Spectrum Access with Learning for Cognitive Radio
Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Jayakrishnan Unnikrishnan, Student Member, IEEE, and Venugopal V. Veeravalli, Fellow, IEEE 1 arxiv:0807.2677v4 [cs.ni] 6 Feb 2010
More informationCooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks
Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks by Nagwa Shaghluf B.S., Tripoli University, Tripoli, Libya, 2009 A Thesis Submitted in Partial Fulfillment of the Requirements
More informationOnline Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel
Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel Yanting Wu Dept. of Electrical Engineering University of Southern California Email: yantingw@usc.edu Bhaskar Krishnamachari
More informationInterference Reduction In Cognitive Networks via Scheduling
1 Interference Reduction In Cognitive Networks via Scheduling Patrick Mitran, Member, IEEE Abstract In this letter, we first define a cognitive network to be useful if at least one node can be scheduled
More informationPerformance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks
Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless
More informationOFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter
OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback Prof. Phil Schniter T. H. E OHIO STATE UNIVERSITY Joint work with Mr. Rohit Aggarwal, Dr. Mohamad Assaad, Dr. C. Emre Koksal September
More informationOptimal Power Control in Decentralized Gaussian Multiple Access Channels
1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017
More informationarxiv: v3 [cs.lg] 4 Oct 2011
Reinforcement learning based sensing policy optimization for energy efficient cognitive radio networks Jan Oksanen a,, Jarmo Lundén a,b,1, Visa Koivunen a a Aalto University School of Electrical Engineering,
More informationPrediction Based Cognitive Spectrum Access 1
Prediction Based Cognitive Spectrum Access 1 Boris Oklander Department of Electrical Engineering Technion Israel Institute of Technology Haifa, Israel oklander@tx.technion.ac.il Moshe Sidi Department of
More informationChannel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting
1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University
More informationAnalysis of opportunistic spectrum access in cognitive radio networks using hidden Markov model with state prediction
Wang and Adriman EURASIP Journal onwireless Communications and Networking (2015) 2015:10 DOI 10.1186/s13638-014-0238-5 RESEARCH Open Access Analysis of opportunistic spectrum access in cognitive radio
More informationSequential Opportunistic Spectrum Access with Imperfect Channel Sensing
Sequential Opportunistic Spectrum Access with Imperfect Channel Sensing Tao Shu and Marwan Krunz Department of Computer Science and Engineering Oakland University, Rochester, MI Department of Electrical
More informationWIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department
More informationMaximizing System Throughput Using Cooperative Sensing in Multi-Channel Cognitive Radio Networks
!"#$%&'''%()*+,-,*.,%)*%/,.0#0)*%*2%()*$-)3 /,.,45,-%"67"89%:6":;%?009%@AB Maximizing System Throughput Using Cooperative Sensing in Multi-Channel Cognitive Radio Networks Shuang Li, Zizhan Zheng,
More informationChannel Probing in Communication Systems: Myopic Policies Are Not Always Optimal
Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matthew Johnston, Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,
More information4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016
4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 Online Power Control Optimization for Wireless Transmission With Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member,
More informationA State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels
A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano Abstract We consider scheduling over a wireless
More informationRetrospective Spectrum Access Protocol: A Completely Uncoupled Learning Algorithm for Cognitive Networks
Retrospective Spectrum Access Protocol: A Completely Uncoupled Learning Algorithm for Cognitive Networks Marceau Coupechoux, Stefano Iellamo, Lin Chen + TELECOM ParisTech (INFRES/RMS) and CNRS LTCI + University
More informationDistributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security
Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationOnline Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks
1 Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng, Qingsi Wang, Peter Auer arxiv:1709.10128v3 [cs.ni]
More informationWireless Channel Selection with Restless Bandits
Wireless Channel Selection with Restless Bandits Julia Kuhn and Yoni Nazarathy Abstract Wireless devices are often able to communicate on several alternative channels; for example, cellular phones may
More informationOptimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network
Optimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network Kalpant Pathak and Adrish Banerjee Department of Electrical Engineering, Indian Institute of Technology Kanpur,
More information2176 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 4, APRIL 2014
2176 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 4, APRIL 2014 Multi-Channel Sensing and Access Game: Bayesian Social Learning with Negative Network Externality Chunxiao Jiang, Member, IEEE,
More informationArtificial Intelligence & Sequential Decision Problems
Artificial Intelligence & Sequential Decision Problems (CIV6540 - Machine Learning for Civil Engineers) Professor: James-A. Goulet Département des génies civil, géologique et des mines Chapter 15 Goulet
More informationResidual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010
Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-30 June 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science
More informationOptimal power-delay trade-offs in fading channels: small delay asymptotics
Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract
More informationResidual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010
Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-6 March 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science
More informationMarkovian Decision Process (MDP): theory and applications to wireless networks
Markovian Decision Process (MDP): theory and applications to wireless networks Philippe Ciblat Joint work with I. Fawaz, N. Ksairi, C. Le Martret, M. Sarkiss Outline Examples MDP Applications A few examples
More informationExploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks
Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks Wenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B. Shroff Department of Electrical and Computer Engineering The
More informationOptimal Power Allocation for Fading Channels in Cognitive Radio Networks: Ergodic Capacity and Outage Capacity
1 Optimal Power Allocation for Fading Channels in Cognitive Radio Networks: Ergodic Capacity and Outage Capacity Xin ang, Student Member, IEEE, Ying-Chang Liang, Senior Member, IEEE, arxiv:88.3689v2 [cs.it]
More informationRandom Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,
Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen
More informationWIRELESS systems often operate in dynamic environments
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 9, NOVEMBER 2012 3931 Structure-Aware Stochastic Control for Transmission Scheduling Fangwen Fu and Mihaela van der Schaar, Fellow, IEEE Abstract
More informationCooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game
IEEE ICC 202 - Wireless Networks Symposium Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game Yang Gao, Yan Chen and K. J. Ray Liu Department of Electrical and Computer
More informationADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria
ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS Jesus Perez and Ignacio Santamaria Advanced Signal Processing Group, University of Cantabria, Spain, https://gtas.unican.es/
More informationExploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks A Whittle s Indexability Analysis
1 Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks A Whittle s Indexability Analysis Wenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B Shroff Abstract We address
More informationGame Theoretic Approach to Power Control in Cellular CDMA
Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University
More information6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011
6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 On the Structure of Real-Time Encoding and Decoding Functions in a Multiterminal Communication System Ashutosh Nayyar, Student
More informationOptimal Control of Partiality Observable Markov. Processes over a Finite Horizon
Optimal Control of Partiality Observable Markov Processes over a Finite Horizon Report by Jalal Arabneydi 04/11/2012 Taken from Control of Partiality Observable Markov Processes over a finite Horizon by
More informationReliable Cooperative Sensing in Cognitive Networks
Reliable Cooperative Sensing in Cognitive Networks (Invited Paper) Mai Abdelhakim, Jian Ren, and Tongtong Li Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI
More informationIN conventional spectrum management, most of the spectrum
2164 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 5, JUNE 2011 A Two-Level AC Protocol Strategy for Opportunistic Spectrum Access in Cognitive Radio Networks Qian Chen, Student ember, IEEE,
More informationNOMA: Principles and Recent Results
NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve
More informationAn Improved Blind Spectrum Sensing Algorithm Based on QR Decomposition and SVM
An Improved Blind Spectrum Sensing Algorithm Based on QR Decomposition and SVM Yaqin Chen 1,(&), Xiaojun Jing 1,, Wenting Liu 1,, and Jia Li 3 1 School of Information and Communication Engineering, Beijing
More informationABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013
ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical
More informationAdaptive Distributed Algorithms for Optimal Random Access Channels
Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October, 2 Adaptive Distributed Algorithms for Optimal Random Access Channels Yichuan Hu and Alejandro Ribeiro
More informationOptimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters
Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,
More informationStochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks
1 Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks Bo Zhou, Ying Cui, Member, IEEE, and Meixia Tao, Senior Member, IEEE Abstract Caching at small base stations
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationABSTRACT WIRELESS COMMUNICATIONS. criterion. Therefore, it is imperative to design advanced transmission schemes to
ABSTRACT Title of dissertation: DELAY MINIMIZATION IN ENERGY CONSTRAINED WIRELESS COMMUNICATIONS Jing Yang, Doctor of Philosophy, 2010 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical
More informationMulti-Armed Bandit: Learning in Dynamic Systems with Unknown Models
c Qing Zhao, UC Davis. Talk at Xidian Univ., September, 2011. 1 Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models Qing Zhao Department of Electrical and Computer Engineering University
More informationPartially Observable Markov Decision Processes (POMDPs)
Partially Observable Markov Decision Processes (POMDPs) Geoff Hollinger Sequential Decision Making in Robotics Spring, 2011 *Some media from Reid Simmons, Trey Smith, Tony Cassandra, Michael Littman, and
More informationSum-Rate Capacity of Poisson MIMO Multiple-Access Channels
1 Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels Ain-ul-Aisha, Lifeng Lai, Yingbin Liang and Shlomo Shamai (Shitz Abstract In this paper, we analyze the sum-rate capacity of two-user Poisson
More informationMulti-channel Opportunistic Access: A Case of Restless Bandits with Multiple Plays
Multi-channel Opportunistic Access: A Case of Restless Bandits with Multiple Plays Sahand Haji Ali Ahmad, Mingyan Liu Abstract This paper considers the following stochastic control problem that arises
More informationElements of Reinforcement Learning
Elements of Reinforcement Learning Policy: way learning algorithm behaves (mapping from state to action) Reward function: Mapping of state action pair to reward or cost Value function: long term reward,
More informationThroughput-efficient Sequential Channel Sensing and Probing in Cognitive Radio Networks Under Sensing Errors
Throughput-efficient Sequential hannel Sensing and Probing in ognitive Radio Networks Under Sensing Errors Tao Shu and Marwan Krunz Department of Electrical and omputer Engineering, University of Arizona
More informationOptimal and Suboptimal Policies for Opportunistic Spectrum Access: A Resource Allocation Approach
Optimal and Suboptimal Policies for Opportunistic Spectrum Access: A Resource Allocation Approach by Sahand Haji Ali Ahmad A dissertation submitted in partial fulfillment of the requirements for the degree
More informationOptimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival
1 Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, arxiv:1711.07912v1 [cs.it] 21 Nov 2017 Zhisheng Niu, Fellow,
More informationOptimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks. Senhua Huang, Xin Liu, and Zhi Ding
1 Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks Senhua Huang, Xin Liu, and Zhi Ding Abstract Cognitive radio offers a promising technology to mitigate spectrum
More informationOpportunistic Cooperation in Cognitive Femtocell Networks
1 Opportunistic Cooperation in Cognitive Femtocell Networks Rahul Urgaonkar, Member, IEEE, and Michael J. Neely, Senior Member, IEEE Abstract We investigate opportunistic cooperation between secondary
More informationCompetitive Scheduling in Wireless Collision Channels with Correlated Channel State
Competitive Scheduling in Wireless Collision Channels with Correlated Channel State Utku Ozan Candogan, Ishai Menache, Asuman Ozdaglar and Pablo A. Parrilo Abstract We consider a wireless collision channel,
More informationNOWADAYS the demand to wireless bandwidth is growing
1 Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks Monireh Dabaghchian, Student Member, IEEE, Amir Alipour-Fanid, Student Member, IEEE, Kai Zeng, Member,
More informationDETERMINING the information theoretic capacity of
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 7, JULY 007 369 Transactions Letters Outage Capacity and Optimal Power Allocation for Multiple Time-Scale Parallel Fading Channels Subhrakanti
More informationMaximum Eigenvalue Detection: Theory and Application
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 008 proceedings Maximum Eigenvalue Detection: Theory and Application
More informationEnergy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications
Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,
More informationDecentralized Sequential Change Detection Using Physical Layer Fusion
Decentralized Sequential Change Detection Using hysical Layer Fusion Leena Zacharias ECE Department Indian Institute of Science Bangalore, India Email: zleena@ece.iisc.ernet.in ajesh Sundaresan ECE Department
More informationMarkov decision processes with threshold-based piecewise-linear optimal policies
1/31 Markov decision processes with threshold-based piecewise-linear optimal policies T. Erseghe, A. Zanella, C. Codemo Dept. of Information Engineering, University of Padova, Italy Padova, June 2, 213
More informationExploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks
1 Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks Wenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B. Shroff arxiv:1009.3959v6 [cs.ni] 7 Dec 2011 Abstract We
More informationOptimal Decentralized Control of Coupled Subsystems With Control Sharing
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 58, NO. 9, SEPTEMBER 2013 2377 Optimal Decentralized Control of Coupled Subsystems With Control Sharing Aditya Mahajan, Member, IEEE Abstract Subsystems that
More informationOptimal Sensing and Transmission in Energy Harvesting Sensor Networks
University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 2-206 Optimal Sensing and Transmission in Energy Harvesting Sensor Networks Xianwen Wu University of Arkansas, Fayetteville
More informationCan Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels?
Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels? Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, Zhisheng Niu, Fellow, IEEE {zhiyuan,
More information